Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
Control Technologies
CIS 8080
Public Domain Technologies
• Network Management
– Logging tools
– Network configuration mapping
• System Recovery
– Password recovery
• Abuse Detection
– Keyloggers
Network Management Technologies
Example: nmap
System Recovery Technologies
Example: john the ripper
Abuse Detection TechnologiesExample: WebWatcher
Key: Backup Technologies
Key: Firewall Technologies Key: AV Technologies
Scalable Security ProductsExample: Check Point
Scalable Security ProductsExample: Symantec
Scalable Security ProductsExample: IBM Internet Security Systems (ISS)
Control Technologies
CIS 8080