Security Portal: Detecting Intruders in LinuxAug 16, 1999, 12:38 (2 Talkback[s])
WEBINAR: On-demand Event
Replace Oracle with the NoSQL Engagement Database: Why and how leading companies are making the switch REGISTER >
"An intrusion into your network and host systems by persons unknown is one of the biggest nightmares for systems administrators."
"... intrusions can happen to anyone, on any public or private network. In order to best detect and respond to an intrusion, you must first plan for an intrusion, then have all the appropriate monitoring capabilities deployed."
"Building secure systems is not an adequate approach to maintaining long term host security. By developing solid intrusion detection plans, performing comprehensive security audits, and scanning both network segments and host systems, we will have a much better chance at successful intruder detection."
0 Talkback[s] (click to add your comment)