• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 19. Network Security > Testing, Logging, and Monitoring

Testing, Logging, and Monitoring

Testing, logging, and monitoring involve testing your defense strategies and detecting breaches. It's tedious, but who would you rather have be first to find out that your system is hackable: you or “them”? Your testing steps should include

  • Testing your defenses before you connect to the Internet

  • Monitoring Internet traffic on your network and on the connection to your Internet service provider or other networks

  • Detecting and recording suspicious activity on the network and in application software


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint