Linux Intrusion Detection
Source: SysAdmin - Posted by Jen Olson   
Intrusion Detection One key to intrusion detection is understanding the most common security exploits. This knowledge will allow you to set up a checklist for periodic security checks of your system. If you're running a DNS server, BIND is a favorite target for . . . One key to intrusion detection is understanding the most common security exploits. This knowledge will allow you to set up a checklist for periodic security checks of your system. If you're running a DNS server, BIND is a favorite target for attack. BIND has a number of security issues and should be disabled if not needed. If you need BIND, be sure to check at least monthly for updates and fixes. CGI scripts are another point of vulnerability. If CGI can be avoided, it is probably best to do so. Under no circumstances should an administrator leave sample CGI scripts on a production server or run a Web server as root. The list of CGI issues is too great to include here, but the SANS Top Ten List of security threats contains useful tips about CGI and other vulnerabilities. There's no standard for how often these security audits should be performed, but careful administrators continually check for signs of intrusion. A comprehensive check should be performed at least monthly, if not more frequently.

Read this full article at SysAdmin

Only registered users can write comments.
Please login or register.

Powered by AkoComment!