NSM: Process & Requirements

Authors

  • Mala Kumari Asst. Professor Trinity Institute of Professional Studies

DOI:

https://doi.org/10.48165/tjmitm.2021.1109

Keywords:

Threats and vulnerabilities, Monitoring strategy, NSM cycle, Process requirements

Abstract

With the dependency of growing number of people and commercial and non-commercial organizations using Computer Networks for sharing information, the threat related to it has also increased exponentially. The technology itself has suggested that this threat of security breach over the network can not be neutralise although we can be well planned and prepared to be one step ahead to prevent any such security breach. Network Security Monitoring plays a pivotal role in providing a well-equipped cyber environment wherein we can weaponize our cyberspace by the tools and technologies that can minimise and to some extent prevent probable security threats and its ramification. Diligently planned NSM technique can provide a path breaking leap in the success of an organization by minimising the security threats and hence enhancing the participation of manpower by ensuring confidentiality, integrity and data privacy. 

Published

2021-12-12

How to Cite

NSM: Process & Requirements. (2021). Trinity Journal of Management, IT & Media (TJMITM), 12(1), 56–60. https://doi.org/10.48165/tjmitm.2021.1109