Basic HTML version of Foils prepared Dec. 6 98

Foil 24 Network Security (10)

From Introduction to Network Management Lectures at Xi'an Jaotong University -- Sept 1998. by Roman Markowski


1 Security Policy - II
  • do not use world writeable files
  • limit unsuccessful logon attempts
  • use digital signatures
  • install security tools: Tripwire, COPS, TCP wrapper packages
  • define the level of acceptable risk
  • design the rescue procedure after your system is compromised
  • look for tools installed by the intruder (packet sniffers)
  • look for trojan horses (modified programs, like login)
  • read security news comp.security.announce, comp.security.unix, alt.security, and apply security recommendations (CERT)
  • monitor Web and e-mail servers - the most commonly exploited weaknesses

in Table To:


© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Sun Dec 6 1998