Your company is revising its security strategy to better protect its network against cyber threats. As a security analyst, you have been tasked with selecting appropriate controls that would actively identify and log security breaches in real-time. Which type of control should you implement to fulfill this requirement?
Firewalls
Warning signs
Intrusion detection systems
Security awareness training