Discussion Post
Discussion deals with security controls available for Operating systems and more specifically it deals with HIDS and AVs.
o Based on your research, what are some of the most common issues with deployment of HIDS in an organization with 1000s of computers?
o As far as viruses are concerned, are we fighting a losing battle? Are there too many and is the problem too rampant?
The response must include a reference list. Using Times New Roman 12 pnt font, double-space, one-inch margins, and APA style of writing and citations.