Using your knowledge from Internet research, and the course references, discuss real-time protection. Also discuss how a system administrator or security monitoring system might detect that real-time protection has been turned off.

Topic 2: Real-Time Protection:Using your knowledge from Internet research, and the course references, discuss real-time protection. Also discuss how a system administrator or security monitoring system might detect that real-time protection has been turned off.
Here is my E-book: Sheward, M. (2018). Hands-on incident response and digital forensics. BCS.Here is some extra references:Hands-on Incident Response and Digital Forensics, by Mike Sheward, in the Library. You can access the text through the Library portal.Chapter 3: “The Incident Response Process”In NIST Special Publication 800-83 Revision 1, Guide to Malware Incident Prevention and Handling for Desktops and Laptops, read the following:Chapter 4, Section 2: “Detection and Analysis”National Institutes of Standards and Technology (NIST). https://www.nist.gov/Thank you in advance.