Common Issues encountered when deploying HIDs
discussion deals with security controls available for Operating systems and more specifically it deals with HIDS and AVs.
- Based on your research, what are some of the most common issues with deployment of HIDS in an organization with 1000s of computers?
- As far as viruses are concerned, are we fighting a losing battle? Are there too many and is the problem too rampant?
People use HIDs to interact with the electronic information system, they do so by keying in data or giving output. HID devices vary from computer speakers, headsets, keyboards, mice and webcams. HIDs normally provide an interface between the computer……………………………