Control Technologies - J. Mack Robinson College of Business · 2016-09-07 · Enterprise Small...

Preview:

Citation preview

Control Technologies

CIS 8080

Public Domain Technologies

• Network Management

– Logging tools

– Network configuration mapping

• System Recovery

– Password recovery

• Abuse Detection

– Keyloggers

Network Management Technologies

Example: nmap

System Recovery Technologies

Example: john the ripper

Abuse Detection TechnologiesExample: WebWatcher

Key: Backup Technologies

Key: Firewall Technologies Key: AV Technologies

Scalable Security ProductsExample: Check Point

Scalable Security ProductsExample: Symantec

Scalable Security ProductsExample: IBM Internet Security Systems (ISS)

Control Technologies

CIS 8080

Recommended