Intrusion detection

  • Regularly check log files; forward logs to a secure server

  • Implement Intrusion detection systems (IDS): host based (tripwire) and network based (snort)

  • Regularly check system files and configuration for integrity

  • Regularly monitor running services and availability of the file systems
    Previous Pageprevious First Pagetop Next Pagenext