当前位置:网站首页>Xin'an Second Edition: Chapter 12 network security audit technology principle and application learning notes
Xin'an Second Edition: Chapter 12 network security audit technology principle and application learning notes
2022-07-06 17:34:00 【Moon Dream Studio】
One 、 The outline of this chapter requires
12、 Principles and application of network audit technology
12.1 Overview of network security audit
• Network security audit concept • Purpose of network security audit
12.2 Composition and type of network security audit system
• Composition of network security audit system
• Operation mechanism of network security audit system
• Network security audit system type ( Network communication security audit 、 Operating system security audit 、 Database security audit 、 Application system security audit 、 Operation and maintenance safety audit )
12.3 Network security audit mechanism and implementation technology
• Network security audit data collection
• Network traffic data acquisition technology ( Switch port mirroring 、 Network sniffing ) System log data collection technology (Syslog、FTP、SNMP etc. ) Open source tools for network traffic data collection Tepdump Use
• Network audit data analysis technology ( string matching 、 Full text search 、 Data Association 、 Statistical report 、 Visual analysis, etc )
• Network audit data protection technology ( Decentralized management of system users 、 Mandatory access to audit data 、 Audit data encryption 、 Audit data privacy protection 、 Audit data integrity protection 、 Audit data backup )
12.4 Main technical indicators and products of network security audit
• Main technical indicators of network security audit ( Understanding of functional technical indicators 、 Understanding of performance and technical indicators 、 Understanding of safety technical indicators )
• Analysis of working mechanism of network security audit products 、 Understanding of network security audit product standards 、 Applicable scenarios of network security audit products
12.5 Network security audit application
• Network compliance use
• Network electronic forensics
• Network security operation and maintenance guarantee
Two 、 List of important and easy knowledge points in this chapter
12.1 Overview of network security audit
Network security audit refers to the acquisition of information about security related activities of network information systems 、 Record 、 Storage 、 Analysis and utilization of work .</
边栏推荐
- Flink源码解读(一):StreamGraph源码解读
- Interpretation of Flink source code (III): Interpretation of executiongraph source code
- Brush questions during summer vacation, ouch ouch
- 自动化运维利器-Ansible-Playbook
- 04 products and promotion developed by individuals - data push tool
- JVM garbage collector part 1
- Flink parsing (III): memory management
- 1. Introduction to JVM
- 02 personal developed products and promotion - SMS platform
- vscode
猜你喜欢
Akamai浅谈风控原理与解决方案
02 personal developed products and promotion - SMS platform
Vscode matches and replaces the brackets
Take you hand-in-hand to do intensive learning experiments -- knock the level in detail
C# WinForm系列-Button简单使用
February database ranking: how long can Oracle remain the first?
数据仓库建模使用的模型以及分层介绍
EasyRE WriteUp
Junit单元测试
Learn the wisdom of investment Masters
随机推荐
Precipitated database operation class - version C (SQL Server)
案例:检查空字段【注解+反射+自定义异常】
灵活报表v1.0(简单版)
【逆向初级】独树一帜
Some feelings of brushing leetcode 300+ questions
mysql的合计/统计函数
The solution to the left-right sliding conflict caused by nesting Baidu MapView in the fragment of viewpager
JVM之垃圾回收器下篇
C# WinForm中DataGridView单元格显示图片
Introduction to spring trick of ByteDance: senior students, senior students, senior students, and the author "brocade bag"
Yarn: unable to load file d:\programfiles\nodejs\yarn PS1, because running scripts is prohibited on this system
Wu Jun's trilogy insight (V) refusing fake workers
1. Introduction to JVM
Redis installation on centos7
Flink 解析(二):反压机制解析
Flink 解析(一):基础概念解析
【逆向中级】跃跃欲试
JVM class loading subsystem
EasyRE WriteUp
Flink parsing (VI): savepoints