NotesFAQContact Us
Collection
Advanced
Search Tips
Back to results
ERIC Number: EJ701900
Record Type: Journal
Publication Date: 2004-Mar-1
Pages: 3
Abstractor: ERIC
ISBN: N/A
ISSN: ISSN-1053-6728
EISSN: N/A
Network Monitoring: A 360-Degree Plan--Learn How to Get the Vital Feedback You Need to Make Your System--And Its Users--More Secure
Miller, Steven E.; Seiberling, Chris
Technology & Learning, v24 n8 p24 Mar 2004
This article represents the second part of a series in this journal called "How to Perform a Security Audit." It continues the conversation on setting up a process for identifying security-related concerns and implementation safeguards. It continues the conversation from the perspective of system monitoring. This article discusses how to use a combination of techniques and technologies to keep regular tabs on one's network. It describes everything from tracking one's school's bandwidth usage with network analyzers to spotting firewall breaches via intrusion detection software. In addition, monitoring entails having a broader awareness of the computing environment and how the system meets user needs. This article demonstrates how taking a holistic approach to monitoring, can enable a person to fine tune his or her operating procedures and user policies to reduce risk, and be better prepared to recover from problems that will inevitably occur. Topics discussed include: staying aware of the context; external threats; internal needs; operational issues; environmental hazards; physical access; system integrity; data privacy; outsourcing; and crisis management. A list of tools to help with various areas of monitoring, along with recommendations on how often to use them concludes the article.
Technology & Learning, Subscription Department, P.O. Box 5052, Vandalia, OH 45377. Tel: 800-607-4410 (Toll Free).
Publication Type: Journal Articles; Reports - Descriptive
Education Level: N/A
Audience: N/A
Language: English
Sponsor: N/A
Authoring Institution: N/A
Grant or Contract Numbers: N/A