Basic HTML version of Foils prepared May 19 99

Foil 35 Recommendations (2)

From NPAC Computer and Network Capabilities Tango Group Internal Technology Seminars -- Spring 99. by Roman Markowski


1 Security Policy - II
  • do not use world writeable files; limit unsuccessful logon attempts
  • use digital signatures; delete PHF programs
  • install security tools: Tripwire, COPS, TCP wrapper packages
  • define the level of acceptable risk and responsibility
  • design the rescue procedure after your system is compromised
  • look for tools installed by the intruder (packet sniffers)
  • look for trojan horses (modified programs, like login)
  • read security news comp.security.announce, comp.security.unix, alt.security, and apply security recommendations (CERT)
  • monitor Web and e-mail servers - the most commonly exploited weaknesses

in Table To:


© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Wed May 19 1999