control technologies - j. mack robinson college of business · 2016-09-07 · enterprise small...
TRANSCRIPT
![Page 1: Control Technologies - J. Mack Robinson College of Business · 2016-09-07 · Enterprise Small Business Norton partners ASI? Pacific PARTNER Q SERVICES SOLUTIONS Symantec PRODUCTS](https://reader034.vdocuments.us/reader034/viewer/2022050311/5f7319b8a1e0a87c6f790148/html5/thumbnails/1.jpg)
Control Technologies
CIS 8080
Public Domain Technologies
• Network Management
– Logging tools
– Network configuration mapping
• System Recovery
– Password recovery
• Abuse Detection
– Keyloggers
Network Management Technologies
Example: nmap
System Recovery Technologies
Example: john the ripper
![Page 2: Control Technologies - J. Mack Robinson College of Business · 2016-09-07 · Enterprise Small Business Norton partners ASI? Pacific PARTNER Q SERVICES SOLUTIONS Symantec PRODUCTS](https://reader034.vdocuments.us/reader034/viewer/2022050311/5f7319b8a1e0a87c6f790148/html5/thumbnails/2.jpg)
Abuse Detection TechnologiesExample: WebWatcher
Key: Backup Technologies
Key: Firewall Technologies Key: AV Technologies
![Page 3: Control Technologies - J. Mack Robinson College of Business · 2016-09-07 · Enterprise Small Business Norton partners ASI? Pacific PARTNER Q SERVICES SOLUTIONS Symantec PRODUCTS](https://reader034.vdocuments.us/reader034/viewer/2022050311/5f7319b8a1e0a87c6f790148/html5/thumbnails/3.jpg)
Scalable Security ProductsExample: Check Point
Scalable Security ProductsExample: Symantec
Scalable Security ProductsExample: IBM Internet Security Systems (ISS)
Control Technologies
CIS 8080
![Page 4: Control Technologies - J. Mack Robinson College of Business · 2016-09-07 · Enterprise Small Business Norton partners ASI? Pacific PARTNER Q SERVICES SOLUTIONS Symantec PRODUCTS](https://reader034.vdocuments.us/reader034/viewer/2022050311/5f7319b8a1e0a87c6f790148/html5/thumbnails/4.jpg)