Xem 1-20 trên 143 kết quả Security monitoring
  • How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techniques to protect them. Security Monitoring is based on the authors' years of experience conducting incident response to keep Cisco's global network secure. It offers six steps to improve network monitoring. ...

    pdf248p stingdau_123 19-01-2013 22 4   Download

  • This book takes you through the basics of NetFlow analysis for information security purposes, including details on what NetFlow is, how it works, who is on the network doing what, and how you can enable it to yield actionable security intelligence. It also provides insight for how to address specific security risks with NetFlow analysis.

    pdf52p haijan1 03-05-2012 64 16   Download

  • This book is about database security and auditing. You will learn many methods and techniques that will be helpful in securing, monitoring and auditing database environments. It covers diverse topics that include all aspects of database security and auditing - including network security for databases, authentication and authorization issues, links and replication, database Trojans, etc. You will also learn of vulnerabilities and attacks that exist within various database environments or that have been used to attack databases (and that have since been fixed).

    pdf433p suthebeo 17-07-2012 66 17   Download

  • Contents Foreword Acknowledgments Author 1 Introduction: How h is Book Will Help You Be Secure and Compliant 2 Hardening the Database 3 Securing the Listener 4 Account Security 5 Cryptography, Oracle Wallets, and Oracle PKI 6 Authentication 7 Encrypting Data-in-Transit 8 Encrypting Data-at-Rest 9 Standard Auditing 10 Mandatory and Administrator Auditing 11 Fine-Grained Auditing 12 Auditing Before/After Values and Monitoring Selected Data 13 Oracle Audit

    pdf472p bongbong_hong 19-12-2012 59 14   Download

  • This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Information Security Policy - A Development Guide for Large and Small Companies A security policy should fulfill many purposes.

    pdf43p ken333 07-06-2012 58 13   Download

  • Multi-Domain Security Management is a centralized management solution for large-scale, distributed environments with many different network Domains. This best-of-breed solution is ideal for enterprises with many subsidiaries, branches, partners and networks. Multi-Domain Security Management is also an ideal solution for managed service providers, cloud computing providers, and data centers.

    pdf167p hoangtumayman 26-09-2011 39 9   Download

  • To make the most of Check Point products and all their capabilities and features, become familiar with some basic concepts and components. This is an overview of usage, terms, and tasks to help you manage your Check Point Security Gateways. Deployments Basic deployments: Standalone deployment - Gateway and the Security Management server are installed on the same machine. Distributed deployment - Gateway and the Security Management server are installed on different machines.

    pdf147p hoangtumayman 20-08-2012 73 4   Download

  • Trend Micro has taken the multilayered security approach to the next level of sophistication with its Trend Micro Threat Management Services network security "overwatch" service. Threat Management Services provides an additional security layer that greatly strengthens an organization's security infrastructure by monitoring the network for active infections that have successfully infiltrated. Once the threat discovery occurs, in real time, the network overwatch layer intercepts the attack and performs automated containment and remediation.

    pdf8p khongmuonnghe 04-01-2013 38 4   Download

  • Securing and operating today’s complex systems is challenging and demanding. Mission and operational requirements to deliver services and applications swiftly and securely have never been greater. Organizations, having invested precious resources and scarce skills in various necessary security efforts such as risk analysis, certification, accreditation, security architectures, policy development, and other security efforts, can be tempted to neglect or insufficiently develop a cohesive, well-though out operational security testing program. ...

    pdf292p cao_can 02-01-2013 22 3   Download

  • The building control systems market is no different. Networking technology develop- ment, customer demands, innovation in services, and open communication standards are driving the industry toward inter-networked buildings with ever-increasing services made possible by the flow of information.

    pdf15p khongmuonnghe 04-01-2013 20 3   Download

  • Malware: software designed to infiltrate or damage a computer system without the owner's informed consent Spyware: software designed to intercept or take partial control over the user's interaction with the computer, without the user's informed consent secretly monitors the user's behavior collect various types of personal information

    pdf33p trinhvietnambk 29-05-2013 23 3   Download

  • Tham khảo sách 'multi-domain security management r75.40 administration guide', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf167p hoangtumayman 20-08-2012 40 2   Download

  • Corporate networks in today's dynamic business environment are often comprised of many networks and gateways that support a diverse set of products and user needs. The challenge of managing an increasing array of system traffic can put enormous pressure on IT staffing capacity and network resources. With SmartView Monitor, Check Point offers you a cost effective solution to obtain a complete picture of network and security performance; and to respond quickly and efficiently to changes in gateways, tunnels, remote users and traffic flow patterns or security activities....

    pdf52p hoangtumayman 20-08-2012 43 2   Download

  • Not all the chapters will be of interest to all readers. In some cases we describe and critique a standard in great detail. These chapters might not be of interest to students or people trying to get a conceptual understanding of the field. But in many cases the standards are written fairly unintelligi- bly. People who need to understand the standard, perhaps to implement it, or maybe even to use it, need to have a place where it is described in a readable way (and we strive for readability), but also a place in which mistakes in the standard are pointed out as such. It’s...

    pdf33p cao_can 02-01-2013 15 2   Download

  • Network reconnaissance cannot be prevented entirely. If Internet Control Message Protocol (ICMP) echo and echo-reply is turned off on edge routers, ping sweeps can be stopped, but at the expense of network diagnostic data. However, port scans can easily be run without full ping sweeps; they just take longer because they need to scan IP addresses that might not be live. Intrusion detection systems (IDSs) at the network and host levels can usually notify an administrator when a reconnaissance attack is underway.

    pdf48p cao_can 02-01-2013 19 2   Download

  • In this example, the intruder gains access to username/password information and sensitive routing protocol data using an Ethernet packet decoder such as EtherPeek. The data packets being sent are captured by the laptop running EtherPeek; the program decodes the hex data into human-readable form. After obtaining access to information, the intruder can use this information to gain access to a machine and then possibly copy-restricted, private infor- mation and programs.

    pdf61p cao_can 02-01-2013 21 2   Download

  • Secure communication is an increasingly important application of the Internet. Without secure communication many existing social functions cannot benefit from modern technology. The primary example is commerce. The foundation of secure communication is cryptography, which enables secure communication through the use of keys. The management of these keys has proven to be a problem when the technology is taken into use.

    pdf209p cao_can 02-01-2013 21 2   Download

  • After the installation of Outpost Network Security is complete, you can configure the centralized automatic updates so when Outpost Network Security Client is installed on user workstations all available updates will be immediately applied so your network and each workstation always has the strongest and latest security. Centralized updates decrease network traffic. Agnitum Update Service provides automatic download and installation of each available update on all computers in your network.

    pdf12p khongmuonnghe 04-01-2013 20 2   Download

  • The ongoing development of the BACnet standard is opening the door for lower cost and more efficient building control systems that provide expanded services. This report seeks to address the security implications within the world of BACnet implementations. The report begins with an overview of BACnet and typical BACnet BCS installations along with a discussion of the security environment and review of threats to that system. The report then goes into detail on the threats, and finally possible countermeasures. ...

    pdf15p khongmuonnghe 04-01-2013 22 2   Download

  • Competitors. Monitoring the network could be used for corporate research; for exam- ple, gathering info about how a company uses electricity, from which utility, and for what loads. The curious party could be a competing utility, or a manufacturer of more electrically efficient equipment. Human error. This can affect control system implementation (thus the need for com- missioning), key sharing, network administration, physical security, upgrades, flaws in software and hardware development, etc. ...

    pdf12p khongmuonnghe 04-01-2013 22 2   Download

Đồng bộ tài khoản