Chapter 14: Self-Monitoring Tools


Overview

You now have your systems reasonably secured, so it s time to relax, right? Wrong. You must be constantly vigilant in order to keep your systems in a secure state. If a system is in use, there is potential for weakness and vulnerability to be introduced into the configuration. Knowing when your machine is attacked or vulnerable is paramount to a good security posture . In this chapter, we will discuss some of the many self-monitoring tools you can use on your system to ensure that you keep a consistent and secure server. Here are the steps you need to take immediately to ensure your systems are properly monitored :

  • Install and run a host-based intrusion detection system

  • Install and run password auditing programs

  • Set up network monitoring




Hardening Linux
Hardening Linux
ISBN: 0072254971
EAN: 2147483647
Year: 2004
Pages: 113

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net