Controlling File Access


Functions of controlling file access are usually delegated to specialized systems intended for protecting network information from unauthorized access, such as Secret Net. However, in some cases, such systems can not be used for controlling access to files containing critically important information (for example, database files or password files). This relates to the fact that most such systems can not run under Unix clones, particularly, Solaris, Linux, HP UX, and AIX. Such systems are ideal for securing Windows, and sometimes, NetWare platforms. However, they are practically useless when it is necessary to protect Unix. In this case, the best thing to do is to use host-based intrusion detection systems. In this situation, it is possible to use both intrusion detection systems based on log-file analysis (for example, RealSecure Server Sensor) and IDSs analyzing system calls (such as Cisco IDS Host Sensor).




Protect Your Information with Intrusion Detection
Protect Your Information with Intrusion Detection (Power)
ISBN: 1931769117
EAN: 2147483647
Year: 2001
Pages: 152

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net