An attack lifecycle is thought to be used by attackers to achieve their objectives. What detective and preventive controls can be put in place to protect against attacks based on the risk of loss?
a) Intrusion Detection Systems (IDS)
b) Encryption
c) Firewalls
d) Security Awareness Training