Term Paper on "Net Mon Overview Network Security Monitoring: Course"

Term Paper 5 pages (1463 words) Sources: 3

[EXCERPT] . . . .

Net Mon Overview

Network Security Monitoring: Course Overview and Reflections

The term "network security monitoring" can sound daunting and dry even to someone that is already somewhat aware of the technical aspects of the field and its importance. While network security is of vital importance to many organizations and entities involved in all manner of activities around the world, monitoring the traffic over these networks for the potentiality of security risks can, to those uninitiated in the intricacies and uncertainties of the practice, seem like a boring crossover between data processing and air traffic control. This course and the readings and exercises of which it is partially comprised made it very clear that network security monitoring is almost as much an art form as it is a science, with constantly evolving needs and mechanisms that make the task and profession not simply more interesting than the title seems to initially imply, but a truly exciting and cutting-edge occupation with growing potentials and ever-increasing future demands.

Summary of Experience

My experience throughout this course has been both edifying and exhilarating, as I have not only gained a great deal of knowledge about many of the generalities and the specifics of network security monitoring but have also come to better appreciate the context (and contexts) in which network security monitoring takes place and the manner in which all of the mechanisms and impacts of this monitoring come together. While many of the basic underpinnings of network technology and security were already familiar to me, I quickly learned how much I had yet to become acquai
Continue scrolling to

download full paper
nted with, and this course was excellent in delivering the depth and the breadth of information necessary to provide a truly adequate foundation for building knowledge in the network security field. The information was also delivered at an effective pace, and while I did not ever feel overwhelmed or in over my head, I also did not feel bored or that the material was overly repetitive, and this made it much easier to absorb the information presented and to appreciate for what it was worth and how it all fit together. Overall, I feel that I not only gained the necessary foundational knowledge in this area, but that I also became equipped to ask better questions and seek out better avenues of information and learning in the further pursuit of my education and my eventual career.

As far as the specifics of the information that I obtained from the course, the number of different issues and perspectives that exist in the broader arena of network security monitoring was surprising and revealing. The discipline is far more complex and involved than an initial glance might suggest, and the course covered many areas of the filed that I would never have imagined might exist, and thus could never have effectively sought information about on my own. One of the most significant issues I (and I think anyone) have faced in expanding my technical and area-specific knowledge is in ascertaining enough of the functional basics to be able to ask meaningful questions and knowingly pursue further information, and again this course has been excellent in bringing this about. From user issues to different types of attacks and threats to the many different means of responding to observed issues, this course has touched on a large number of the many facets in network security monitoring and thus has empowered me in being able to seek my own answers, as well.

Class Exercises and Readings

One of the major reasons the field of network security monitoring can seem so off-putting is the arcane and aloof nature of the highly technical topics and discussions that make up the world of network security and network security monitoring. Because this is a knowledge area that many people benefit from even if they are all but entirely unaware of its existence, it (along with many other areas of technological knowledge/computer science) can seem especially shrouded in mystery and especially difficult to learn about and practice. The course readings were very beneficial when it came to correcting this impression and helping to establish a certain demystification of the field as a whole while also easing into some of the more "mystical" intricacies themselves. In this, Richard Bejtlich's (2004) book the Tao of Network Security Monitoring: Beyond Intrusion Detection was an invaluable resource, breaking down highly technical and complex issues… READ MORE

Quoted Instructions for "Net Mon Overview Network Security Monitoring: Course" Assignment:

While I understand you have not taken this course

Here is the assignment. While I understand you have not taken this course, you have completed multiple assignments for me and you seem to grasp the concept of Network Monitoring. Please let me know if you have any questions. Also are you capable of looking at the past papers (A2068716, A2068415, A2067185, A2067289) you have written for me. They should help. I will tailor the paper to work . The book we read was:

Bjetlich, R. (2004). The Tao Of Network Security Monitoring: Beyond Intrusion Detection. New York: Pearson.

Reflections Paper:

1. Submit a reflections paper based upon readings, exercises and weekly discussion posts. The paper should include:

A brief summary of your course experience.

Identify and explain relevant conceptual material (theories, concepts) from the course.

How the course concept/idea/theory may or will change your future actions/activities.

*****

*****

How to Reference "Net Mon Overview Network Security Monitoring: Course" Term Paper in a Bibliography

Net Mon Overview Network Security Monitoring: Course.” A1-TermPaper.com, 2012, https://www.a1-termpaper.com/topics/essay/net-mon-overview-network-security/483653. Accessed 6 Jul 2024.

Net Mon Overview Network Security Monitoring: Course (2012). Retrieved from https://www.a1-termpaper.com/topics/essay/net-mon-overview-network-security/483653
A1-TermPaper.com. (2012). Net Mon Overview Network Security Monitoring: Course. [online] Available at: https://www.a1-termpaper.com/topics/essay/net-mon-overview-network-security/483653 [Accessed 6 Jul, 2024].
”Net Mon Overview Network Security Monitoring: Course” 2012. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/net-mon-overview-network-security/483653.
”Net Mon Overview Network Security Monitoring: Course” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/net-mon-overview-network-security/483653.
[1] ”Net Mon Overview Network Security Monitoring: Course”, A1-TermPaper.com, 2012. [Online]. Available: https://www.a1-termpaper.com/topics/essay/net-mon-overview-network-security/483653. [Accessed: 6-Jul-2024].
1. Net Mon Overview Network Security Monitoring: Course [Internet]. A1-TermPaper.com. 2012 [cited 6 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/net-mon-overview-network-security/483653
1. Net Mon Overview Network Security Monitoring: Course. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/net-mon-overview-network-security/483653. Published 2012. Accessed July 6, 2024.

Related Term Papers:

Network Research Encountering -- and Countering Research Paper

Paper Icon

Network Research

Encountering -- and Countering -- Unstructured Attacks: Current Issues in Network Security Monitoring

As technology and information networks continue to grow in complexity and in sheer size, and… read more

Research Paper 10 pages (2984 words) Sources: 10 Topic: Computers / IT / Internet


Network Monitoring Network Activity According to Bejtlich Essay

Paper Icon

Network Monitoring

Network Activity

According to Bejtlich (2004), there are basically three types of network activity from a monitoring perspective: normal activity, suspicious activity, and malicious activity. Taking effective action… read more

Essay 2 pages (536 words) Sources: 2 Topic: Computers / IT / Internet


Network Security Term Paper

Paper Icon

Network Security

The practice of networking has reached new heights in both homes and the office environment. Networking solutions are often chosen because of the convenience that they provide.

Although… read more

Term Paper 5 pages (1551 words) Sources: 8 Style: APA Topic: Computers / IT / Internet


Network Security: Opening to the World Term Paper

Paper Icon

Network Security: Opening to the World

The collection of tutorials and demonstrations of Web conferencing software applications shows how pervasive the adoption of social networking design criterion and user interface… read more

Term Paper 2 pages (575 words) Sources: 2 Style: APA Topic: Computers / IT / Internet


Network Design Term Paper

Paper Icon

Network Design

Scenario

Straight Sales Service Company is a small business company with three locations. Presently, the company is using a business class DSL service to achieve the internet connection… read more

Term Paper 4 pages (1313 words) Sources: 4 Topic: Business / Corporations / E-commerce


Sat, Jul 6, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!