Control Technologies CIS 8080 Public Domain Technologies • Network Management – Logging tools – Network configuration mapping • System Recovery – Password recovery • Abuse Detection – Keyloggers Network Management Technologies Example: nmap System Recovery Technologies Example: john the ripper
4
Embed
Control Technologies - J. Mack Robinson College of Business · 2016-09-07 · Enterprise Small Business Norton partners ASI? Pacific PARTNER Q SERVICES SOLUTIONS Symantec PRODUCTS
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Control Technologies
CIS 8080
Public Domain Technologies
• Network Management
– Logging tools
– Network configuration mapping
• System Recovery
– Password recovery
• Abuse Detection
– Keyloggers
Network Management Technologies
Example: nmap
System Recovery Technologies
Example: john the ripper
Abuse Detection TechnologiesExample: WebWatcher
Key: Backup Technologies
Key: Firewall Technologies Key: AV Technologies
Scalable Security ProductsExample: Check Point
Scalable Security ProductsExample: Symantec
Scalable Security ProductsExample: IBM Internet Security Systems (ISS)