FastSaying

We scan the ports where most hacking activities or unauthorized access might take place. We also do regular network monitoring to look for any suspicious activity. We are not perfect at it, but we are like a credit card company looking for some suspicious activity on the network.

Chris Kelly

AccessActivitiesHackingMonitoringNetworkPortsRegularScanUnauthorized

Related Quotes

NASA states, in these documents, that they [also] have 'confidential sources' in Britain and Belgium monitoring Global Network activities.
— Kevin Aplin
ActivitiesBelgiumBritain
JFK remains an integral part of Delta's global route network,
— Chris Kelly
GlobalIntegralJfk
The transformation plan network changes that are being made with regard to right-sizing ... has added to that as well.
— Chris Kelly
AddedChangesNetwork
We got caught fouling and hacking. They were beating us off the dribble.
— Chris Ritacco
BeatingCaughtDribble
Most of them do not have access to outdoor activities, which you and I take for granted. In our first year, we took our 100 boys to visit the National Mall, and all of them said they had never been there before.
— John Maxwell
AccessActivitiesFirst