TITLE

NEW, SMART TOOLS ADVANCE MONITORING, PROTECT NETWORK

AUTHOR(S)
Phifer, Lisa
PUB. DATE
July 2015
SOURCE
Information Security;Jul2015, Issue 6, p3
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article discusses different ways to employ advanced network security monitoring technologies. Topics covered include the need to effectively identify evolving network threats. Also mentioned is the importance of regularly performing network security monitoring to raise awareness and response time to cyberthreats.
ACCESSION #
108991449

 

Related Articles

  • Sporting websites face more extortion threats. Ilett, Dan // SC Magazine: For IT Security Professionals;Mar2004, p8 

    The article reports on the continued extortion threats issued by hackers against online betting companies in Great Britain as of March 2004. Online betting companies are being blackmailed to pay up or face distributed denial-of-service attacks (DDoS), a coordinated computer attack that disables...

  • Computer security becomes cottage industry. Diaz Jr., Fran // Caribbean Business;9/12/2002, Vol. 30 Issue 37, p40 

    Reports on computer security risks and attacks and their consequences on businesses. Security breaches; Cyberterrorism; Comments from Luis Sanches, a principal at Xapiens Corp. in Puerto Rico.

  • Wake up, dossers. Harcourt, David // Total Telecom Magazine;Dec2004, p39 

    Reports on the increasing number of denial of service (DoS) attacks among computer networks as of December 2004. Damages of a DoS attack; Cleanup costs; Effect of botnets in distributed DoS; Tools that detect and mitigate the attacks. INSET: IDENTIFYING THE PING OF DEATH.

  • Security threats increase demand for protection. Savvas, Antony // Computer Weekly;4/20/2004, p51 

    The information technology (IT) industry calls for security standard for business continuity. The threat of attacks has fuelled the market for IT security professionals. With internet security attacks on the increase and events such as the BT cabling tunnel fire in Manchester, IT security and...

  • Socialno-psiholoÅ¡ke implikacije kibernetskega terorizma. Prislan, Kaja; Bernik, Igor // Varstvoslovje: Journal of Criminal Justice & Security;2013, Vol. 15 Issue 3, p357 

    Purpose: This paper intends to present the synergy between unrealistic notions about technology and terrorism and the cyberterrorists' real capabilities and activities. At the same time, the paper also points to the threat, which must not be neglected from the information security point of view,...

  • Files for ransom. Schaibly, Susan // Network World;9/26/2005, Vol. 22 Issue 38, p94 

    This article examines the cybersecurity threat, ransomware, which is considered as an extortion scheme. Ransomware involves the use of malicious code to hijack user files, encrypt them, and then demand payment in exchange for the decryption key. One of the earliest recorded cases of ransomware...

  • Clamp down. Crowley, Aileen // PC Week;4/10/95, Vol. 12 Issue 14, pE/7 

    Presents information on topics related to computer security. Includes EyeDentify Inc.'s EyeDentify 2001 retinal-recognition device; Security breaches on the Internet; Steps to network security; Management Analytics Inc.'s network security check-up; Statistics on computer-related crime in the...

  • Are we ready for WWWI? Dowd, Alan W. // Fraser Forum;Sep2008, p12 

    The article reports on the development of the Cooperative Cyber Defense Center by the North Atlantic Treaty Organization (NATO) in Tallin, Estonia. The initiative is undertaken to address the cyber attacks of government web cites, mobile telephone networks and banks in the country. The...

  • Time to treat all e-crimes with equal seriousness. Woolfson, Marc // New Media Age;12/16/2004, p12 

    This article presents the author's views on electronic crimes. Security, in Great Britain and abroad, dominated the Queen's Speech last month, with planned legislation for compulsory identification cards, electronic tagging of offenders and a legislative bill to create the Federal Bureau of...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics