Articles News Reviews Releases Downloads Contact Us White Papers

Host Integrity Monitoring


There are now a number of commercial and open source solutions that can be used to effectively monitor the integrity of host environments. When understood and used correctly, these applications can be very helpful with detecting unauthorized change, conducting damage assessment, and preventing future attacks. With all that is involved in deploying such a system, there are some very important concepts that are often neglected, not understood, or not expressed in the documentation.

The purpose of this article is to highlight the important steps and concepts involved in deploying a host integrity monitoring system. Being aware of these concepts can mean the difference between a useful deployment, and one that is rendered ineffective or more trouble than it is worth.

This article is written with the open source host integrity applications Osiris and Samhain in mind, however the material presented is certainly not unique to these applications.

Read Full Story


News
20 ways to Secure your Apache Configuration
Jun 16, 2006, 15:03 EST
Layered Encryption, an Absolute Necessity
Jun 16, 2006, 15:01 EST
Phishing scam uses PayPal secure servers
Jun 16, 2006, 13:32 EST
IPLocks Closes $11 Million in Strategic Funding
Jun 16, 2006, 08:34 EST
Doombot Worm Spreads Via Phishing Model Attack
Jun 16, 2006, 07:14 EST
Fusion Softphone Turns Computer into VoIP Telephone
Jun 16, 2006, 06:17 EST
Genuine Advantage is Microsoft spyware
Jun 16, 2006, 06:09 EST




Site Meter