当前位置:网站首页>Xin'an Second Edition: Chapter 12 network security audit technology principle and application learning notes
Xin'an Second Edition: Chapter 12 network security audit technology principle and application learning notes
2022-07-06 17:34:00 【Moon Dream Studio】
One 、 The outline of this chapter requires
12、 Principles and application of network audit technology
12.1 Overview of network security audit
• Network security audit concept • Purpose of network security audit
12.2 Composition and type of network security audit system
• Composition of network security audit system
• Operation mechanism of network security audit system
• Network security audit system type ( Network communication security audit 、 Operating system security audit 、 Database security audit 、 Application system security audit 、 Operation and maintenance safety audit )
12.3 Network security audit mechanism and implementation technology
• Network security audit data collection
• Network traffic data acquisition technology ( Switch port mirroring 、 Network sniffing ) System log data collection technology (Syslog、FTP、SNMP etc. ) Open source tools for network traffic data collection Tepdump Use
• Network audit data analysis technology ( string matching 、 Full text search 、 Data Association 、 Statistical report 、 Visual analysis, etc )
• Network audit data protection technology ( Decentralized management of system users 、 Mandatory access to audit data 、 Audit data encryption 、 Audit data privacy protection 、 Audit data integrity protection 、 Audit data backup )
12.4 Main technical indicators and products of network security audit
• Main technical indicators of network security audit ( Understanding of functional technical indicators 、 Understanding of performance and technical indicators 、 Understanding of safety technical indicators )
• Analysis of working mechanism of network security audit products 、 Understanding of network security audit product standards 、 Applicable scenarios of network security audit products
12.5 Network security audit application
• Network compliance use
• Network electronic forensics
• Network security operation and maintenance guarantee
Two 、 List of important and easy knowledge points in this chapter
12.1 Overview of network security audit
Network security audit refers to the acquisition of information about security related activities of network information systems 、 Record 、 Storage 、 Analysis and utilization of work .</
边栏推荐
- TCP connection is more than communicating with TCP protocol
- vscode
- Serial serialold parnew of JVM garbage collector
- [reverse] repair IAT and close ASLR after shelling
- Wu Jun's trilogy experience (VII) the essence of Commerce
- [reverse intermediate] eager to try
- 【逆向初级】独树一帜
- How uipath determines that an object is null
- 基于Infragistics.Document.Excel导出表格的类
- 暑假刷题嗷嗷嗷嗷
猜你喜欢
学习投资大师的智慧
Akamai talking about risk control principles and Solutions
Akamai浅谈风控原理与解决方案
【ASM】字节码操作 ClassWriter 类介绍与使用
网络分层概念及基本知识
Development and practice of lightweight planning service tools
PySpark算子处理空间数据全解析(5): 如何在PySpark里面使用空间运算接口
Shawshank's sense of redemption
[reverse primary] Unique
Flink 解析(七):时间窗口
随机推荐
Final review of information and network security (based on the key points given by the teacher)
Wu Jun's trilogy insight (V) refusing fake workers
03个人研发的产品及推广-计划服务配置器V3.0
[mmdetection] solves the installation problem
Redis installation on centos7
华为认证云计算HICA
Flink 解析(二):反压机制解析
【ASM】字节码操作 ClassWriter 类介绍与使用
Automatic operation and maintenance sharp weapon ansible Foundation
连接局域网MySql
05个人研发的产品及推广-数据同步工具
mysql的列的数据类型详解
自动化运维利器ansible基础
Only learning C can live up to expectations Top1 environment configuration
Junit单元测试
Wu Jun trilogy insight (IV) everyone's wisdom
À propos de l'utilisation intelligente du flux et de la carte
[reverse primary] Unique
Program counter of JVM runtime data area
Re signal writeup