Summary
In this chapter, you learned about information security monitoring tools and techniques, such as firewall implementation and various types of IDSs and IPSs. This chapter will help the CISM candidate understand the important methods, tools, and techniques used to develop an effective and robust security program. You also explored digital signatures and encryption technology from an information security perspective.
The next chapter will provide an overview of incident management procedures.