“ | Continuous monitoring is the backbone of true security. | ” |
- --Vivek Kundra, Federal CIO, Office of Management and Budget
Definitions[]
General[]
To monitor or monitoring generally means to be aware of the state of a system. It can also refer to observing the behavior or communications of individuals or groups.
Surveillance[]
Monitoring is
“ | [t]he process of capturing information, either call content or call set-up information or both, in real time during he processing of a call. (This does not include non-real time access to stored data such as billing records for previous calls or subscription parameters).[1] | ” |
“ | the observation of a resource for the purpose of ascertaining its status or operational state. Monitoring includes the automated, real or near-real time interception of information transiting the system or network by a system or network administrator during the normal course of employment while engaged in activities necessary to keep the system or network operational and to protect the rights and property of the system or network owner. For example, automated monitoring or logging of system or network events (such as by IDS, IPS, firewalls, and so on) can provide valuable information related to malicious content of communications; unauthorized access, exceeding access or misuse of systems or networks; policy and criminal violations, etc. as well as the performance of the systems.[2] | ” |
References[]
- ↑ Electronic Surveillance in a Digital Age, at 73.
- ↑ AR 25-2, at 84.
See also[]
- Behavior monitoring
- Continuous monitoring
- Credit monitoring
- Keystroke monitoring
- Monitoring sensor
- Network monitoring
- Resource monitoring
- Risk monitoring
- Threat monitoring
This page uses Creative Commons Licensed content from Wikipedia (view authors). |