Security controls available for Operating system

Security controls available for Operating systems

Week 4 discussion deals with security controls available for Operating systems and more specifically it deals with HIDS and AVs.

Based on your research, what are some of the most common issues with deployment of HIDS in an organization with 1000s of computers?

As far as viruses are concerned, are we fighting a losing battle? Are there too many and is the problem too rampant?

Solution preview for the order on security controls available for Operating systems

Security controls available for Operating systems

APA
368 words