Intrusion detection
Regularly check log files; forward logs to a secure server
Implement Intrusion detection systems (IDS): host based (tripwire) and
network based (snort)
Regularly check system files and configuration for integrity
Regularly monitor running services and availability of the file systems