Work Monitoring
Featuring 4 Papers as of September 17, 2008
-
Securing the K-12 School Network through Effective Internet Access Control, Network Traffic Monitoring, and Data Analysis.
Barry Young - September 17, 2008
Internet access control, network traffic monitoring, and related data analysis, are powerful tools available to the K-12 Network Security Analyst
-
First Step Data Capture - Key Stroke Loggers
Nigel Lewis - October 31, 2003
An examination of software and hardware keystroke logging, with mention of malicious keystroke logging, and keylogger detection options.
-
Information Assurance at the PC Level
Carlton Bowen - October 31, 2003
This paper contemplates a bottom up approach to information security, where attention is given to information assurance at the PC level initially, rather than as an after thought.
-
Echelon: The Danger of Communication in the 21ST Century
Chad Yancey - October 31, 2003
How governments are using Echelon to gain and collect information on not only political or military interests, but that they are suspected of using this system on common citizens
Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact webmaster@sans.org.
All papers are copyrighted. No re-posting or distribution of papers is permitted.
Masters This paper was created by a SANS Technology Institute student as part of their Master's curriculum.
