Prevention, Detection, and Response
Prevention: Utilizes firewalls, intrusion prevention systems (IPS), and secure configurations to block unauthorized access.
Detection: Employs intrusion detection systems (IDS), Security Information and Event Management (SIEM) tools, and anomaly detection to identify potential threats.