control technologies - j. mack robinson college of business · 2016-09-07 · enterprise small...

Post on 26-Jul-2020

2 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Control Technologies

CIS 8080

Public Domain Technologies

• Network Management

– Logging tools

– Network configuration mapping

• System Recovery

– Password recovery

• Abuse Detection

– Keyloggers

Network Management Technologies

Example: nmap

System Recovery Technologies

Example: john the ripper

Abuse Detection TechnologiesExample: WebWatcher

Key: Backup Technologies

Key: Firewall Technologies Key: AV Technologies

Scalable Security ProductsExample: Check Point

Scalable Security ProductsExample: Symantec

Scalable Security ProductsExample: IBM Internet Security Systems (ISS)

Control Technologies

CIS 8080

top related