4
Control Technologies CIS 8080 Public Domain Technologies Network Management Logging tools Network configuration mapping System Recovery Password recovery Abuse Detection Keyloggers Network Management Technologies Example: nmap System Recovery Technologies Example: john the ripper

Control Technologies - J. Mack Robinson College of Business · 2016-09-07 · Enterprise Small Business Norton partners ASI? Pacific PARTNER Q SERVICES SOLUTIONS Symantec PRODUCTS

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Control Technologies - J. Mack Robinson College of Business · 2016-09-07 · Enterprise Small Business Norton partners ASI? Pacific PARTNER Q SERVICES SOLUTIONS Symantec PRODUCTS

Control Technologies

CIS 8080

Public Domain Technologies

• Network Management

– Logging tools

– Network configuration mapping

• System Recovery

– Password recovery

• Abuse Detection

– Keyloggers

Network Management Technologies

Example: nmap

System Recovery Technologies

Example: john the ripper

Page 2: Control Technologies - J. Mack Robinson College of Business · 2016-09-07 · Enterprise Small Business Norton partners ASI? Pacific PARTNER Q SERVICES SOLUTIONS Symantec PRODUCTS

Abuse Detection TechnologiesExample: WebWatcher

Key: Backup Technologies

Key: Firewall Technologies Key: AV Technologies

Page 3: Control Technologies - J. Mack Robinson College of Business · 2016-09-07 · Enterprise Small Business Norton partners ASI? Pacific PARTNER Q SERVICES SOLUTIONS Symantec PRODUCTS

Scalable Security ProductsExample: Check Point

Scalable Security ProductsExample: Symantec

Scalable Security ProductsExample: IBM Internet Security Systems (ISS)

Control Technologies

CIS 8080

Page 4: Control Technologies - J. Mack Robinson College of Business · 2016-09-07 · Enterprise Small Business Norton partners ASI? Pacific PARTNER Q SERVICES SOLUTIONS Symantec PRODUCTS