You are a network security technician at a mid-sized company. Your employer is planning for significant growth and the CIO has tasked you with implementing a system to consolidate all critical network device logs to a central location. The system should support logs from all routers, firewalls, switches and business critical servers and should send alerts in the event of security issues. What type of solution would best meet these requirements?
Threats, Attacks and Vulnerabilities | |
Technologies and Tools | |
Architecture and Design | |
Identity and Access Management | |
Risk Management | |
Cryptography and PKI |