Transcript
Page 1: Control Technologies - J. Mack Robinson College of Business · 2016-09-07 · Enterprise Small Business Norton partners ASI? Pacific PARTNER Q SERVICES SOLUTIONS Symantec PRODUCTS

Control Technologies

CIS 8080

Public Domain Technologies

• Network Management

– Logging tools

– Network configuration mapping

• System Recovery

– Password recovery

• Abuse Detection

– Keyloggers

Network Management Technologies

Example: nmap

System Recovery Technologies

Example: john the ripper

Page 2: Control Technologies - J. Mack Robinson College of Business · 2016-09-07 · Enterprise Small Business Norton partners ASI? Pacific PARTNER Q SERVICES SOLUTIONS Symantec PRODUCTS

Abuse Detection TechnologiesExample: WebWatcher

Key: Backup Technologies

Key: Firewall Technologies Key: AV Technologies

Page 3: Control Technologies - J. Mack Robinson College of Business · 2016-09-07 · Enterprise Small Business Norton partners ASI? Pacific PARTNER Q SERVICES SOLUTIONS Symantec PRODUCTS

Scalable Security ProductsExample: Check Point

Scalable Security ProductsExample: Symantec

Scalable Security ProductsExample: IBM Internet Security Systems (ISS)

Control Technologies

CIS 8080

Page 4: Control Technologies - J. Mack Robinson College of Business · 2016-09-07 · Enterprise Small Business Norton partners ASI? Pacific PARTNER Q SERVICES SOLUTIONS Symantec PRODUCTS

Recommended