May 4, 2008

Computer Security Tools

Computer Security Tools

Other network tools include:

  • Honey Pots - Used to fool a hacker into believing that a target exists which really does not exist. It may be uset to keep a hacker in a virtual environment which does not really exist as a means of caputer or to prevent the attacker from attacking a real target.
  • Utilities that can be used to analyze log files - Makes administrator jobs easire by scanning log files to locate attempted unauthorized entry or suspicious activity.
  • Network Sniffers - Can be used to sniff and log network traffic which can help administrators find traffic on the network which may be suspicious or contain information which should be encrypted.
  • Bandwidth Testers - Tests the available bandwidth across certain network lines or between two points on your network.
  • Password cracking programs - Programs that take an encrypted or hashed value of a password and guess at the password until they find the unencrypted password.

No comments:

Post a Comment

Popular Posts