ABSTRACT
Organizations today depend heavily on the Internet,
intranets, and their network infrastructures to conduct
business. Ensuring the security and integrity of data
shared across networks is essential, especially in light
of the various regulatory and legislative mandates they
must comply with. At the same time, the enforcement
challenges facing them are on the rise, and the need
for effective security controls is greater than ever.
Organizations strive to implement technical controls to
assist in enforcing their security policies; however,
under certain circumstances some organizations need
to monitor the content of packets entering and leaving
their network to ensure they detect leaks of confidential
information.