1.3 Monitor System Activity

System security largely depends on the following practices:

  • Good security protocols
  • Proper system configuration
  • System monitoring

The system needs to be constantly monitored from a monitoring tool.