ABSTRACT

Organizations today depend heavily on the Internet,

intranets, and their network infrastructures to conduct

business. Ensuring the security and integrity of data

shared across networks is essential, especially in light

of the various regulatory and legislative mandates they

must comply with. At the same time, the enforcement

challenges facing them are on the rise, and the need

for effective security controls is greater than ever.

Organizations strive to implement technical controls to

assist in enforcing their security policies; however,

under certain circumstances some organizations need

to monitor the content of packets entering and leaving

their network to ensure they detect leaks of confidential

information.