主页 / 安全监控 / 基于LOG的安全威胁分析-ASV
  • 简介

    Perimeter Threat

    The previous chapters discussed the basics for exploring the first of three major use-case areas covered in this book. This chapter on perimeter threat covers a select set of use- cases that center on analyzing data that is useful for protecting the network perimeter. This chapter’s goal is to establish some tools for making perimeter protection more efficient and more fun. The chapter discusses how to protect the crown jewels from external threats.

    • TRAFFIC-FLOW MONITORING AND ANALYSIS
    • FIREWALL LOG ANALYSIS
    • INTRUSION DETECTION SYSTEM SIGNATURE TUNING
    • INTRUSION DETECTION SYSTEM SIGNATURE TUNING
    • WIRELESS SNIFFING
    • EMAIL DATA ANALYSIS
    • VULNERABILITY DATA VISUALIZATION
  • 提示
    本站仅做资料的整理和索引,转载引用请注明出处
相关推荐
附件下载
  • 基于LOG的安全威胁分析.ASV.pdf
    时间: 大小: 6.13 M 下载: 37