control technologies - j. mack robinson college of business · 2016-09-07 · enterprise small...

4
Control Technologies CIS 8080 Public Domain Technologies Network Management Logging tools Network configuration mapping System Recovery Password recovery Abuse Detection Keyloggers Network Management Technologies Example: nmap System Recovery Technologies Example: john the ripper

Upload: others

Post on 26-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Control Technologies - J. Mack Robinson College of Business · 2016-09-07 · Enterprise Small Business Norton partners ASI? Pacific PARTNER Q SERVICES SOLUTIONS Symantec PRODUCTS

Control Technologies

CIS 8080

Public Domain Technologies

• Network Management

– Logging tools

– Network configuration mapping

• System Recovery

– Password recovery

• Abuse Detection

– Keyloggers

Network Management Technologies

Example: nmap

System Recovery Technologies

Example: john the ripper

Page 2: Control Technologies - J. Mack Robinson College of Business · 2016-09-07 · Enterprise Small Business Norton partners ASI? Pacific PARTNER Q SERVICES SOLUTIONS Symantec PRODUCTS

Abuse Detection TechnologiesExample: WebWatcher

Key: Backup Technologies

Key: Firewall Technologies Key: AV Technologies

Page 3: Control Technologies - J. Mack Robinson College of Business · 2016-09-07 · Enterprise Small Business Norton partners ASI? Pacific PARTNER Q SERVICES SOLUTIONS Symantec PRODUCTS

Scalable Security ProductsExample: Check Point

Scalable Security ProductsExample: Symantec

Scalable Security ProductsExample: IBM Internet Security Systems (ISS)

Control Technologies

CIS 8080

Page 4: Control Technologies - J. Mack Robinson College of Business · 2016-09-07 · Enterprise Small Business Norton partners ASI? Pacific PARTNER Q SERVICES SOLUTIONS Symantec PRODUCTS