How do you defend? (3)
Practice good host security.
Don’t run SunOS.
Use tools like SATAN, ISS, COPS, Tiger...
Monitor system for unauthorized changes.
Tripwire
Monitor system for signs of penetration
Intrusion detection systems
Previous slide
Next slide
Back to first slide
View graphic version