Which of the following types of network security deals with deviations from the historic connection patterns and
analysis of new threats to provide effective mitigation responses?
A. Behavior security
B. Information Identity Management
C. Unauthorized hacking
D. Authorized hacking
analysis of new threats to provide effective mitigation responses?
A. Behavior security
B. Information Identity Management
C. Unauthorized hacking
D. Authorized hacking