Security Monitoring

 < Free Open Study > 



Network and computer monitoring is essential to the health of a corporate or home computer network. It is imperative that monitoring be implemented in order to keep the eavesdroppers, hackers, and internal malicious network users at bay. Monitoring is the process by which a system or network is evaluated over an extended period of time using Intrusion Detection Systems (IDS) (covered in Chapter 4) that can be either hardware devices or software. Vulnerability scanners can be used to assist you in detecting which areas of your network are weakest and need a watchful eye.

Today, it is fairly easy and inexpensive to implement monitoring through the use of network packet sniffers. There are many monitoring tools available to network administrators and network security personnel from many different vendors. Some of the most useful monitoring tools and information regarding security systems can be found at Cisco.com, specifically, http://www.cisco.com/warp/public/44/solutions/network/security.shtml/.



 < Free Open Study > 



The Security+ Exam Guide. TestTaker's Guide Series
Security + Exam Guide (Charles River Media Networking/Security)
ISBN: 1584502517
EAN: 2147483647
Year: 2003
Pages: 136

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net