---

Security Portal: Detecting Intruders in Linux

“An intrusion into your network and host systems by persons
unknown is one of the biggest nightmares for systems
administrators.”

“… intrusions can happen to anyone, on any public or private
network. In order to best detect and respond to an intrusion,
you must first plan for an intrusion, then have all the appropriate
monitoring capabilities deployed.”

“Building secure systems is not an adequate approach to
maintaining long term host security. By developing solid intrusion
detection plans, performing comprehensive security audits, and
scanning both network segments and host systems, we will have a
much better chance at successful intruder detection.”

Complete
story
.

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis