NSM: Process & Requirements
DOI:
https://doi.org/10.48165/tjmitm.2021.1109Keywords:
Threats and vulnerabilities, Monitoring strategy, NSM cycle, Process requirementsAbstract
With the dependency of growing number of people and commercial and non-commercial organizations using Computer Networks for sharing information, the threat related to it has also increased exponentially. The technology itself has suggested that this threat of security breach over the network can not be neutralise although we can be well planned and prepared to be one step ahead to prevent any such security breach. Network Security Monitoring plays a pivotal role in providing a well-equipped cyber environment wherein we can weaponize our cyberspace by the tools and technologies that can minimise and to some extent prevent probable security threats and its ramification. Diligently planned NSM technique can provide a path breaking leap in the success of an organization by minimising the security threats and hence enhancing the participation of manpower by ensuring confidentiality, integrity and data privacy.
Downloads
Published
Issue
Section
License
Copyright (c) 2022 Trinity Journal of Management, IT & Media (TJMITM)
This work is licensed under a Creative Commons Attribution 4.0 International License.