[ Team LiB ] |
Chapter 9. Testing and MonitoringTo keep your system secure, be proactive: test for security holes and monitor for unusual activity. If you don't keep watch for break-ins, you may wake up one day to find your systems totally hacked and owned, which is no party. In this chapter we cover useful tools and techniques for testing and monitoring your system, in the following areas:
We must emphasize that our discussion of network monitoring and intrusion detection is fairly basic. Our recipes will get you started, but these important topics are complex, with no easy, turnkey solutions. You may wish to investigate additional resources for these purposes, such as:
|
[ Team LiB ] |