316 Chapter 11 Problem Solving and Security Administration
A(n) 1. is a manual or systematic measurable technical assess-
ment of a system or application.
2. is a collection of activities that are required to plan, design,
organize, control, maintain, and expand the communications network.
3. consists of a cycle of data gathering and processing of evi-
dence that has been gathered from some incident.
A(n) 4. displays and collects network activity by decoding the dif-
ferent protocols from devices on the network.
5. processes and tactics must be developed for a successful
response to some computer incident.
6. concerns the ability to monitor and control access to network
resources, including generating, distributing, and storing encryption keys.
Identify the five specific management functional areas (SMFAs).7.
8. concerns the ability to detect, isolate, and correct abnormal
conditions that occur in the network environment.
9. concerns the ability to monitor and control access to network
resources, including generating, distributing, and storing encryption keys.
A(n) 10. is a program and/or device that monitor data traveling
over a network.
SECURITY REVIEW QUESTIONS
Use the security audit in Appendix A to conduct an audit on some organization.1.
Develop a baseline for some organization or department.2.
Identify three network management systems, and develop a comparison of features and cost.3.
Identify a real forensic activity that addresses a network investigation.4.
Identify three intrusion detection systems, and provide a feature/cost comparison.5.
Identify five software products that accomplish network management. Provide an overview 6.
of each product.
Provide an overview of the five SMFAs. Provide examples.7.
Provide a functionality comparison for a sniffer, an analyzer, and a monitor.8.
Provide an overview of the NIST standards as they apply to network management and security.9.
Identify five entities that have experienced some network or computer disaster. Describe the 10.
corrective action taken.
RESEARCH ACTIVITIES
59940_Newman_02Print.indb 316 2/6/09 11:43:05 AM

Get Computer Security: Protecting Digital Resources now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.