Jomel Prado
NT2580: Introduction to Information Security
Professor Brian Alley
May 16th 2014
When it comes to monitoring security controls there are a lot of things that needs to be taken in to consideration. When it comes to security it’s a good way to think that everything can be harmed and nothing is invincible. This summary includes that the way of identify a bad system or a networking by seeing the following instances. There are security conditions that aren’t the same across the network, and it may be looking very suspicious but it just is legitimate network flow. Something about security makes you feel with your system and something very small like not having violations and security breaches take a lot of different forms, and some you are not able to catch. You might have a policy that requires a certain character password length but fails to catch a proper complexity allowing a hacker to either guess the password easily or easy to encrypt.
Relying on one approach on anyone breaching your system can really keep your system and network vulnerable. You need to be very aware what needs to be looked and checked on the daily and always making sure that you have more than 1 role of detection when checking your system. For example if you see an legitimate traffic on your network or if it is something you are used to seeing but it may appear as illegitimate then it can come to something as serious but nothing you never really dug into really seeing what it really is.
In my opinion I think that security can be a big issue if