| http://www.w3.org/ns/prov#value | - Firewall administration should be centrally controlled and evaluation of firewall policies should be done prior to actual firewall deployment. 3.3 Network MonitoringIt is important to keep aware of the status of your network, so you can not only detect when there is an intrusion, but when there is abnormal system activity, such as system load, increased disk usage, slower network, etc.
|