ROLE NETWORK MONITORING SYSTEM IN THE TECHNICAL CYBER DEFENCE EXERCISE

The question of using the network monitoring system during cyber exercises is considered, as well as the criteria by which the choice or design of the network monitoring system can be carried out. We consider such approaches to the monitoring of information and computing networks as proactive and reactive, and explains why each approach is necessary. The article considers the methods of survey and data collection from the network nodes of the information and computer network of cybersecurity. Given the possible consequences in case of refusal from the start of the network monitoring system, resulting in control over the data processing network, which is in advance of razorace cates for holding cimarusti may be significantly complicated. Identification of the causes of failures, without a network monitoring system, and the places where these failures occur, can take a long time, which in turn will adversely affect the process of cyber-learning.

Authors: M. I. Avilov

Direction: Informatics, Computer Technologies And Control

Keywords: Network monitoring system, computer network, technical cyber defence exercise, proactive and reactive monitoring


View full article