Analyzing Information Flows


Also commonplace are situations in which IS and communications specialists have no trustworthy information on the protocols used in protected network segments. Using intrusion detection systems, you can control all the protocols and services used in the corporate network, as well as the frequency of their use. This will enable you to compose a scheme of information flows and create a network map, which is a mandatory requirement for successfully creating an information-security infrastructure.




Protect Your Information with Intrusion Detection
Protect Your Information with Intrusion Detection (Power)
ISBN: 1931769117
EAN: 2147483647
Year: 2001
Pages: 152

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net