search menu icon-carat-right cmu-wordmark

Using Network Flow Data to Profile Your Network and Reduce Vulnerabilities

October 2012 Podcast
Austin Whisnant, Sid Faber, Julia H. Allen

In this podcast, participants discuss how a network profile can help identify unintended points of entry, misconfigurations, and other weaknesses.

Publisher:

CERT

Listen

Abstract

A network profile can help identify unintended points of entry, misconfigurations, and other weaknesses that may be visible to attackers.