当前位置:网站首页>Xin'an Second Edition: Chapter 12 network security audit technology principle and application learning notes
Xin'an Second Edition: Chapter 12 network security audit technology principle and application learning notes
2022-07-06 17:34:00 【Moon Dream Studio】
One 、 The outline of this chapter requires
12、 Principles and application of network audit technology
12.1 Overview of network security audit
• Network security audit concept • Purpose of network security audit
12.2 Composition and type of network security audit system
• Composition of network security audit system
• Operation mechanism of network security audit system
• Network security audit system type ( Network communication security audit 、 Operating system security audit 、 Database security audit 、 Application system security audit 、 Operation and maintenance safety audit )
12.3 Network security audit mechanism and implementation technology
• Network security audit data collection
• Network traffic data acquisition technology ( Switch port mirroring 、 Network sniffing ) System log data collection technology (Syslog、FTP、SNMP etc. ) Open source tools for network traffic data collection Tepdump Use
• Network audit data analysis technology ( string matching 、 Full text search 、 Data Association 、 Statistical report 、 Visual analysis, etc )
• Network audit data protection technology ( Decentralized management of system users 、 Mandatory access to audit data 、 Audit data encryption 、 Audit data privacy protection 、 Audit data integrity protection 、 Audit data backup )
12.4 Main technical indicators and products of network security audit
• Main technical indicators of network security audit ( Understanding of functional technical indicators 、 Understanding of performance and technical indicators 、 Understanding of safety technical indicators )
• Analysis of working mechanism of network security audit products 、 Understanding of network security audit product standards 、 Applicable scenarios of network security audit products
12.5 Network security audit application
• Network compliance use
• Network electronic forensics
• Network security operation and maintenance guarantee
Two 、 List of important and easy knowledge points in this chapter
12.1 Overview of network security audit
Network security audit refers to the acquisition of information about security related activities of network information systems 、 Record 、 Storage 、 Analysis and utilization of work .</
边栏推荐
- 自动化运维利器-Ansible-Playbook
- Redis installation on centos7
- [mmdetection] solves the installation problem
- C# WinForm系列-Button简单使用
- Models used in data warehouse modeling and layered introduction
- 1. Introduction to JVM
- PySpark算子处理空间数据全解析(5): 如何在PySpark里面使用空间运算接口
- 06 products and promotion developed by individuals - code statistical tools
- 连接局域网MySql
- 05个人研发的产品及推广-数据同步工具
猜你喜欢

Flink 解析(二):反压机制解析

Akamai talking about risk control principles and Solutions

Flink 解析(三):内存管理

yarn : 无法加载文件 D:\ProgramFiles\nodejs\yarn.ps1,因为在此系统上禁止运行脚本

February database ranking: how long can Oracle remain the first?

JUnit unit test

Deploy flask project based on LNMP

Display picture of DataGridView cell in C WinForm

集成开发管理平台

Learn the wisdom of investment Masters
随机推荐
Flink 解析(二):反压机制解析
Flink parsing (VII): time window
肖申克的救赎有感
【MMdetection】一文解决安装问题
Only learning C can live up to expectations TOP4 S1E6: data type
JVM 垃圾回收器之Serial SerialOld ParNew
自动化运维利器-Ansible-Playbook
pip install pyodbc : ERROR: Command errored out with exit status 1
C# WinForm中DataGridView单元格显示图片
The most complete tcpdump and Wireshark packet capturing practice in the whole network
集成开发管理平台
学习投资大师的智慧
【逆向初级】独树一帜
Start job: operation returned an invalid status code 'badrequst' or 'forbidden‘
MySQL error reporting solution
Akamai talking about risk control principles and Solutions
C WinForm series button easy to use
Flink parsing (V): state and state backend
Concept and basic knowledge of network layering
ByteDance overseas technical team won the championship again: HD video coding has won the first place in 17 items