当前位置:网站首页>Xin'an Second Edition: Chapter 12 network security audit technology principle and application learning notes
Xin'an Second Edition: Chapter 12 network security audit technology principle and application learning notes
2022-07-06 17:34:00 【Moon Dream Studio】
One 、 The outline of this chapter requires
12、 Principles and application of network audit technology
12.1 Overview of network security audit
• Network security audit concept • Purpose of network security audit
12.2 Composition and type of network security audit system
• Composition of network security audit system
• Operation mechanism of network security audit system
• Network security audit system type ( Network communication security audit 、 Operating system security audit 、 Database security audit 、 Application system security audit 、 Operation and maintenance safety audit )
12.3 Network security audit mechanism and implementation technology
• Network security audit data collection
• Network traffic data acquisition technology ( Switch port mirroring 、 Network sniffing ) System log data collection technology (Syslog、FTP、SNMP etc. ) Open source tools for network traffic data collection Tepdump Use
• Network audit data analysis technology ( string matching 、 Full text search 、 Data Association 、 Statistical report 、 Visual analysis, etc )
• Network audit data protection technology ( Decentralized management of system users 、 Mandatory access to audit data 、 Audit data encryption 、 Audit data privacy protection 、 Audit data integrity protection 、 Audit data backup )
12.4 Main technical indicators and products of network security audit
• Main technical indicators of network security audit ( Understanding of functional technical indicators 、 Understanding of performance and technical indicators 、 Understanding of safety technical indicators )
• Analysis of working mechanism of network security audit products 、 Understanding of network security audit product standards 、 Applicable scenarios of network security audit products
12.5 Network security audit application
• Network compliance use
• Network electronic forensics
• Network security operation and maintenance guarantee
Two 、 List of important and easy knowledge points in this chapter
12.1 Overview of network security audit
Network security audit refers to the acquisition of information about security related activities of network information systems 、 Record 、 Storage 、 Analysis and utilization of work .</
边栏推荐
- How does wechat prevent withdrawal come true?
- Case: check the empty field [annotation + reflection + custom exception]
- Only learning C can live up to expectations TOP4 S1E6: data type
- CentOS7上Redis安装
- 肖申克的救赎有感
- 03 products and promotion developed by individuals - plan service configurator v3.0
- 吴军三部曲见识(四) 大家智慧
- Wu Jun trilogy insight (IV) everyone's wisdom
- 05 personal R & D products and promotion - data synchronization tool
- Flink 解析(一):基础概念解析
猜你喜欢
随机推荐
Redis installation on centos7
List集合数据移除(List.subList.clear)
Flink parsing (III): memory management
Application service configurator (regular, database backup, file backup, remote backup)
Only learning C can live up to expectations top3 demo exercise
Flink源码解读(一):StreamGraph源码解读
CentOS7上Redis安装
Error: Publish of Process project to Orchestrator failed. The operation has timed out.
JVM garbage collector part 1
PostgreSQL 14.2, 13.6, 12.10, 11.15 and 10.20 releases
基于LNMP部署flask项目
yarn : 无法加载文件 D:\ProgramFiles\nodejs\yarn.ps1,因为在此系统上禁止运行脚本
Flink parsing (VI): savepoints
Display picture of DataGridView cell in C WinForm
mysql的列的数据类型详解
C# WinForm系列-Button简单使用
Flink 解析(四):恢复机制
Total / statistics function of MySQL
Case: check the empty field [annotation + reflection + custom exception]
06个人研发的产品及推广-代码统计工具