Network Security Monitoring and Analysis

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • darknet

    A darknet is a routed allocation of IP address space that is not discoverable by any usual means. 

  • Metasploit Project - Metasploit Framework

    The Metasploit Project is an open source computer security project that provides a public resource for researching and developing exploit code. 

  • deep packet inspection (DPI)

    Deep packet inspection (DPI) is an advanced method of packet filtering that functions at the Application layer of the OSI (Open Systems Interconnection) reference model... (Continued) 

  • netstat

    Netstat is a common command line TCP/IP networking utility available in most versions of Windows, Linux, UNIX and other operating systems... (Continued) 

  • firewall

    A firewall is a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks. 

  • port mirroring (roving analysis port)

    Port mirroring, also known as a roving analysis port, is a method of monitoring network traffic that forwards a copy of each incoming and outgoing packet from one port of a network switch to another port where the packet can be studied. 

  • FCAPS (fault-management, configuration, accounting, performance, and security)

    FCAPS is a network management framework created by the International Organization for Standardization (ISO). FCAPS categorizes the working objectives of network management into five levels. The five levels are:  fault-management (F), the configuratio... 

  • Nessus

    Nessus is an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools. 

  • blended threat

    A blended threat is an exploit that combines elements of multiple types of malware and perhaps takes multiple attack vectors to increase the severity of damage and the speed of contagion.