Net Mon Overview Network Security Monitoring: Course Term Paper

Pages: 5 (1463 words)  ·  Bibliography Sources: 3  ·  File: .docx  ·  Level: Master's  ·  Topic: Education - Computers

Buy full Download Microsoft Word File paper
for $19.77
Net Mon Overview

Network Security Monitoring: Course Overview and Reflections

The term "network security monitoring" can sound daunting and dry even to someone that is already somewhat aware of the technical aspects of the field and its importance. While Network Security is of vital importance to many organizations and entities involved in all manner of activities around the world, monitoring the traffic over these networks for the potentiality of security risks can, to those uninitiated in the intricacies and uncertainties of the practice, seem like a boring crossover between data processing and air traffic control. This course and the readings and exercises of which it is partially comprised made it very clear that network security monitoring is almost as much an art form as it is a science, with constantly evolving needs and mechanisms that make the task and profession not simply more interesting than the title seems to initially imply, but a truly exciting and cutting-edge occupation with growing potentials and ever-increasing future demands.

Summary of Experience

My experience throughout this course has been both edifying and exhilarating, as I have not only gained a great deal of knowledge about many of the generalities and the specifics of network security monitoring but have also come to better appreciate the context (and contexts) in which network security monitoring takes place and the manner in which all of the mechanisms and impacts of this monitoring come together. While many of the basic underpinnings of network technology and security were already familiar to me, I quickly learned how much I had yet to become acquainted with, and this course was excellent in delivering the depth and the breadth of information necessary to provide a truly adequate foundation for building knowledge in the network security field. The information was also delivered at an effective pace, and while I did not ever feel overwhelmed or in over my head, I also did not feel bored or that the material was overly repetitive, and this made it much easier to absorb the information presented and to appreciate for what it was worth and how it all fit together. Overall, I feel that I not only gained the necessary foundational knowledge in this area, but that I also became equipped to ask better questions and seek out better avenues of information and learning in the further pursuit of my education and my eventual career.

As far as the specifics of the information that I obtained from the course, the number of different issues and perspectives that exist in the broader arena of network security monitoring was surprising and revealing. The discipline is far more complex and involved than an initial glance might suggest, and the course covered many areas of the filed that I would never have imagined might exist, and thus could never have effectively sought information about on my own. One of the most significant issues I (and I think anyone) have faced in expanding my technical and area-specific knowledge is in ascertaining enough of the functional basics to be able to ask meaningful questions and knowingly pursue further information, and again this course has been excellent in bringing this about. From user issues to different types of attacks and threats to the many different means of responding to observed issues, this course has touched on a large number of the many facets in network security monitoring and thus has empowered me in being able to seek my own answers, as well.

Class Exercises and Readings

One of the major reasons the field of network security monitoring can seem so off-putting is the arcane and aloof nature of the highly technical topics and discussions that make up the world of network security and network security monitoring. Because this is a knowledge area that many people benefit from even if they are all but entirely unaware of its existence, it (along with many other areas of technological knowledge/computer science) can seem especially shrouded in mystery and especially difficult to learn about and practice. The course readings were very beneficial when it came to correcting this impression and helping to establish a certain demystification of the field as a whole while also easing into some of the more "mystical" intricacies themselves. In this, Richard Bejtlich's (2004) book the Tao of Network Security Monitoring: Beyond Intrusion Detection was an invaluable resource, breaking down highly technical and complex issues… [END OF PREVIEW] . . . READ MORE

Two Ordering Options:

?
Which Option Should I Choose?
1.  Buy full paper (5 pages)Download Microsoft Word File

Download the perfectly formatted MS Word file!

- or -

2.  Write a NEW paper for me!✍🏻

We'll follow your exact instructions!
Chat with the writer 24/7.

Network Research Encountering -- and Countering Research Paper


Network Monitoring Network Activity According to Bejtlich Essay


Network Security Term Paper


Network Security: Opening to the World Term Paper


Network Design Term Paper


View 999 other related papers  >>

Cite This Term Paper:

APA Format

Net Mon Overview Network Security Monitoring: Course.  (2012, June 27).  Retrieved January 27, 2020, from https://www.essaytown.com/subjects/paper/net-mon-overview-network-security-monitoring/483653

MLA Format

"Net Mon Overview Network Security Monitoring: Course."  27 June 2012.  Web.  27 January 2020. <https://www.essaytown.com/subjects/paper/net-mon-overview-network-security-monitoring/483653>.

Chicago Format

"Net Mon Overview Network Security Monitoring: Course."  Essaytown.com.  June 27, 2012.  Accessed January 27, 2020.
https://www.essaytown.com/subjects/paper/net-mon-overview-network-security-monitoring/483653.