Previous Page | Next Page

  1. Introduction
  2. Your Needs
  3. What to Protect
  4. Security Policies
  5. Security Policy Requirements
  6. Incident Procedures
  7. Security Categories
  8. Software Vulnerability Control
  9. Hostile Software
  10. Network Layout
  11. Traffic Filtering
  12. Mail
  13. Firewall Protection
  14. Network Intrusion Detection
  15. Network Port Scanning
  16. Network Tools
  17. Passwords
  18. Types of Attacks
  19. Protocol Use
  20. Entry Points
  21. Cost
  22. Application Level Protection
  23. System Protection
  24. User Issues
  25. Other Recommendations
  26. Terms
  27. Credits

Computer Security Tools

Other network tools include:

  • Honey Pots - Used to fool a hacker into believing that a target exists which really does not exist. It may be uset to keep a hacker in a virtual environment which does not really exist as a means of caputer or to prevent the attacker from attacking a real target.
  • Utilities that can be used to analyze log files - Makes administrator jobs easire by scanning log files to locate attempted unauthorized entry or suspicious activity.
  • Network Sniffers - Can be used to sniff and log network traffic which can help administrators find traffic on the network which may be suspicious or contain information which should be encrypted.
  • Bandwidth Testers - Tests the available bandwidth across certain network lines or between two points on your network.
  • Password cracking programs - Programs that take an encrypted or hashed value of a password and guess at the password until they find the unencrypted password.