home *** CD-ROM | disk | FTP | other *** search
/ Developer Source 18 / Developer Source Volume 18 (I-MODE Publications, Inc.)(2000).iso / softw / sep97 / 1p90.gif < prev   
Graphics Interchange Format  |  1998-02-10  |  40KB  |  577x308  |  4-bit (16 colors)
Labels: text | screenshot | font | diagram
OCR: Police Stake-out A successful security policy depends on monitoring. A variety of software Surveillance Camera tools can provide IS managers with continuous scrutiny of security-related Percentage of external access requests that are activities affecting their systemis and networks: External hack attempts, disconnectedi due to linproper password failed log ons, attempted internal accesses to restricted files and other; potential threat signals can be monitored in real time. Here is a sampler 25 of a digital cop's armament: 20 Radar Guns 15 Some of the security-related Traffic Signals 11 parameters watched by the Kans Hack attempts by server Iccatica & JJanuary & May July Security Monitor: 7 A February # April Successful Hack Hack Attempt Auditing Has Been 5 Turned Off Bugging Equipment · Security Event Log Cleared Failed Logon Reasons for failed file acces! · Failed File Access User Policy Changed 2 Pomimus saticos link Security Policy Change L'autounte . Audit Policy Change System Message: Agent Service Stopped S New York a: Dallas Successful Logon - Successful Logoff & Boston & Sar Francisco "System Message: : Chicago Los Angeles Agent Service Started Miami San Diego