Your company is revising its security strategy to better protect its network against cyber threats. As a security analyst, you have been tasked with selecting appropriate controls that would actively identify and log security breaches in real-time. Which type of control should you implement to fulfill this requirement?
Intrusion detection systems
Security awareness training
Warning signs
Firewalls