Using Network Flow Data to Profile Your Network and Reduce Vulnerabilities
October 2012 • Podcast
Austin Whisnant, Sid Faber, Julia H. Allen
In this podcast, participants discuss how a network profile can help identify unintended points of entry, misconfigurations, and other weaknesses.
Publisher:
CERT
Listen
Abstract
A network profile can help identify unintended points of entry, misconfigurations, and other weaknesses that may be visible to attackers.