SlideShare a Scribd company logo
INTERNET MONITORING
INTERNET MONITORING
 INTERNET MONITORING SYSTEM IS
YET TO USE WITH VIRTUALLY NO
ADMINISTRATOR OVERHEAD.
 INTERNET MONITORING SYS ONLY
REQ PLUGGING AND FILTTERING
APPLIANCE INTO THE INFRA
STRUCTURE CONFIGURING USER
PROFILE
NETWORK MONITORING TOOLS
 OBSERVIUM
 GANGLIA
 SPICEWORK
 ZABBIX
INTERNET MISUSE
 ACCORDING TO IDC RESEARCH 30% TO
40% OF INTERNET USE IN THE WORK
PLACE IS NOT RELATED TO BUSINESS.
 SECURITY THREATS WHEN HAKERS OR
HARMFUL APPLETS ENTER THE
CORPORATED NETWORKS.
• Peer-to-Peer (P2P)
– New concept between
file sharing and transferring
– Generates high
volume of traffic
Structure of Applications
 Structures of applications are changing!
 Client-Server
 Traditional structure
client
server
peer discovery, content,
transfer query
peer
peer
ADVANTAGE
 INTERNET IS MORE USEFUL FOR
GETTING INFORMATION TO ALL
LEVEL.
 INCREASE SECURITY AND BETTER
RISK MANAGEMENT.
 ORGANIGATIONAL AND PERSONAL
ACCOUNTABILITY
DISADVANTAGE
 IF THE EMPLOYEES ARE MISUSE
THE INTERNET THEN THEY REDUSE
THE PRODUCTIVITY
 FINANCIAL COST OF INTERNET IS
VERY HIGH.
 UNWANTED ACCESS OF INTERNET
INCREASE THE CRIME ACTIVITY.
CONCLUSTION
INTERNET MONITORING IN A WORK
STATION IS AN IMPORTANT
CONSIDERATION FOR ANY ENTERPRISES.
INTERNET MONITORING IS ONLY
DEVELOPED FOR THE BUSINESS
PURPOSE.
IP  IMS.ppt

More Related Content

PPT
Palo alto networks next generation firewalls
PDF
Cloud Access Security Brokers
PDF
Cloud Access Security Brokers
PPT
Palo Alto Networks Soc Ent Okt2009
PDF
The Imperative for Visibility into Cloud Native Web Services Traffic
PDF
FORTINET_WP-WEBFILTERING-201106.pdf
PDF
The Top 5 Risks of Cloud Migration
PDF
Information Security Risk Management
Palo alto networks next generation firewalls
Cloud Access Security Brokers
Cloud Access Security Brokers
Palo Alto Networks Soc Ent Okt2009
The Imperative for Visibility into Cloud Native Web Services Traffic
FORTINET_WP-WEBFILTERING-201106.pdf
The Top 5 Risks of Cloud Migration
Information Security Risk Management

Similar to IP IMS.ppt (20)

PPTX
Vfm palo alto next generation firewall
PPTX
13.) analytics (user experience)
PDF
Application-aware Network Performance Management with OpManager
PPTX
supply chain management.pptx
PDF
Network Observability: Delivering Actionable Insights to Network Operations
PDF
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
PPTX
GateWall DNS Filter
PDF
The New Intelligent Network: Building a Smarter, Simpler Architecture
PPTX
What is zero trust model (ztm)
PDF
PLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
PPTX
Defend-Against-Next-Gen-Attacks-with-Wire-Data-by-Pete-Anderson.pptx
PPTX
Fog computing
PPT
Lumeta IPsonar Aligned to ITIL v3
PPT
Vp npresentation
PPT
Vp npresentation
DOCX
“Verify and never trust”: The Zero Trust Model of information security
PPTX
Cloud computing overview
PPTX
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
PDF
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Vfm palo alto next generation firewall
13.) analytics (user experience)
Application-aware Network Performance Management with OpManager
supply chain management.pptx
Network Observability: Delivering Actionable Insights to Network Operations
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
GateWall DNS Filter
The New Intelligent Network: Building a Smarter, Simpler Architecture
What is zero trust model (ztm)
PLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
Defend-Against-Next-Gen-Attacks-with-Wire-Data-by-Pete-Anderson.pptx
Fog computing
Lumeta IPsonar Aligned to ITIL v3
Vp npresentation
Vp npresentation
“Verify and never trust”: The Zero Trust Model of information security
Cloud computing overview
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN

Recently uploaded (20)

PDF
Introduction to the R Programming Language
PDF
annual-report-2024-2025 original latest.
PDF
Microsoft Core Cloud Services powerpoint
PPTX
Topic 5 Presentation 5 Lesson 5 Corporate Fin
PDF
Optimise Shopper Experiences with a Strong Data Estate.pdf
PPTX
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PDF
How to run a consulting project- client discovery
PPTX
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
PPTX
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
PDF
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
PPTX
modul_python (1).pptx for professional and student
PDF
Mega Projects Data Mega Projects Data
PPTX
STERILIZATION AND DISINFECTION-1.ppthhhbx
PPT
DATA COLLECTION METHODS-ppt for nursing research
PPTX
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
PPTX
Database Infoormation System (DBIS).pptx
PDF
Lecture1 pattern recognition............
PPTX
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
Introduction to the R Programming Language
annual-report-2024-2025 original latest.
Microsoft Core Cloud Services powerpoint
Topic 5 Presentation 5 Lesson 5 Corporate Fin
Optimise Shopper Experiences with a Strong Data Estate.pdf
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
How to run a consulting project- client discovery
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
modul_python (1).pptx for professional and student
Mega Projects Data Mega Projects Data
STERILIZATION AND DISINFECTION-1.ppthhhbx
DATA COLLECTION METHODS-ppt for nursing research
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
Database Infoormation System (DBIS).pptx
Lecture1 pattern recognition............
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb

IP IMS.ppt

  • 2. INTERNET MONITORING  INTERNET MONITORING SYSTEM IS YET TO USE WITH VIRTUALLY NO ADMINISTRATOR OVERHEAD.  INTERNET MONITORING SYS ONLY REQ PLUGGING AND FILTTERING APPLIANCE INTO THE INFRA STRUCTURE CONFIGURING USER PROFILE
  • 3. NETWORK MONITORING TOOLS  OBSERVIUM  GANGLIA  SPICEWORK  ZABBIX
  • 4. INTERNET MISUSE  ACCORDING TO IDC RESEARCH 30% TO 40% OF INTERNET USE IN THE WORK PLACE IS NOT RELATED TO BUSINESS.  SECURITY THREATS WHEN HAKERS OR HARMFUL APPLETS ENTER THE CORPORATED NETWORKS.
  • 5. • Peer-to-Peer (P2P) – New concept between file sharing and transferring – Generates high volume of traffic Structure of Applications  Structures of applications are changing!  Client-Server  Traditional structure client server peer discovery, content, transfer query peer peer
  • 6. ADVANTAGE  INTERNET IS MORE USEFUL FOR GETTING INFORMATION TO ALL LEVEL.  INCREASE SECURITY AND BETTER RISK MANAGEMENT.  ORGANIGATIONAL AND PERSONAL ACCOUNTABILITY
  • 7. DISADVANTAGE  IF THE EMPLOYEES ARE MISUSE THE INTERNET THEN THEY REDUSE THE PRODUCTIVITY  FINANCIAL COST OF INTERNET IS VERY HIGH.  UNWANTED ACCESS OF INTERNET INCREASE THE CRIME ACTIVITY.
  • 8. CONCLUSTION INTERNET MONITORING IN A WORK STATION IS AN IMPORTANT CONSIDERATION FOR ANY ENTERPRISES. INTERNET MONITORING IS ONLY DEVELOPED FOR THE BUSINESS PURPOSE.