Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

5.4.1. Monitoring Computing Resources

šŸ’” First Principle: Every computing resource generates data that reveals its security status. Monitoring transforms that data into visibility. Different resources produce different signals — network infrastructure shows traffic patterns, systems show configurations and performance, and applications show user behavior.

Systems monitoring — tracking server health, resource utilization, service status, and configuration compliance. Abnormal CPU usage might indicate cryptomining; unexpected disk activity might indicate data exfiltration or ransomware encryption. Key metrics include CPU, memory, disk I/O, process lists, and service states. Tools like Windows Performance Monitor, Linux top/htop, and agent-based monitoring platforms (Nagios, Zabbix) provide visibility.

Infrastructure monitoring — network device health, bandwidth utilization, interface errors, routing changes, and configuration compliance. An unexpected routing change could indicate BGP hijacking; bandwidth spikes could indicate DDoS or exfiltration. SNMP polling, NetFlow analysis, and syslog collection are primary data sources. Baseline traffic patterns first — you can't detect anomalies without knowing what normal looks like.

Applications monitoring — tracking application performance, error rates, access patterns, and user behavior. Unusual query patterns might indicate SQL injection attempts; repeated authentication failures indicate brute-force attacks. Application logs capture business-level events (orders processed, records accessed) that infrastructure monitoring can't see. Application Performance Monitoring (APM) tools correlate user experience with backend behavior.

The monitoring stack works in layers: infrastructure tells you a port is open, systems tell you a process is running, and application logs tell you what that process is doing. A comprehensive view requires all three. If your firewall shows allowed connections to a web server, but you're not monitoring the web application logs, you won't detect SQL injection or authentication attacks against the application itself.

āš ļø Exam Trap: Monitoring should cover all three layers: systems, infrastructure, and applications. A question describing a missed attack often points to a monitoring gap at one specific layer. If the scenario describes detecting a network anomaly but missing the actual compromise, application-level monitoring is likely the gap.

Alvin Varughese
Written byAlvin Varughese
Founder•15 professional certifications