O'Reilly logo

CISSP For Dummies, 4th Edition by Peter Gregory, Lawrence Miller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Monitoring

Monitoring covers much wider ground than just periodic or constant inspection of audit logs. Monitoring includes the following activities:

check.png Penetration testing

check.png Intrusion detection

check.png Violation processing

check.png Keystroke monitoring

check.png Traffic and trend analysis

check.png Facilities monitoring

The following sections give the skinny on each monitoring activity.

Penetration testing

instantanswer.eps Penetration testing (pen testing for short) is the general term that describes the use of tools to discover and identify logical and physical security vulnerabilities.

cross-reference.eps See Chapter 4 for more information on penetration testing.

Penetration testing techniques include

Port scanning: A port scan is a tool that communicates over ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required