Discussion Post
Discussion deals with security controls available for Operating systems and more specifically it deals with HIDS and AVs.
• Based on your research, what are some of the most common issues with deployment of HIDS in an organization with 1000s of computers?
• As far as viruses are concerned, are we fighting a losing battle? Are there too many and is the problem too rampant?
The response must include a reference list. One-inch margins, double-space, Using Times New Roman 12 pnt font and APA style of writing and citations.