Skip to Main Content
Security Monitoring
book

Security Monitoring

by Chris Fry, Martin Nystrom
February 2009
Intermediate to advanced content levelIntermediate to advanced
256 pages
7h 43m
English
O'Reilly Media, Inc.
Content preview from Security Monitoring

Blanco Wireless: Selecting Targets for Monitoring

Like most wireless phone carriers, Blanco collects Social Security numbers from customers when setting up their accounts, illustrated in Figure 4-8. Blanco uses this information to request and report credit information from one of the large credit reporting services. As described in Chapter 2, Blanco has formed policies designed to protect such information and comply with government regulation.

Blanco’s account entry form

Figure 4-8. Blanco’s account entry form

Blanco’s account management system, shown in Figure 4-9, is composed of a common, three-tier architecture:

  • Apache web servers running on three load-balanced Red Hat Enterprise Linux (RHEL) servers

  • An IBM WebSphere Application Server running on a VMware ESX server farm

  • An Oracle database (11g), clustered and distributed across two RHEL servers

  • An OpenLDAP server running on one RHEL server

  • Data center gateways (two Cisco IOS 7200 routers)

  • A NIDS (one Sourcefire Snort server)

Blanco Wireless account management system

Figure 4-9. Blanco Wireless account management system

Although not pictured in Figure 4-9, load-balancing intelligence is built into the network, reducing the need for separate, specialized equipment.

Components to Monitor

In Chapter 5, we’ll discuss the best event feeds to use for monitoring our target system. Our task for now, however, is to identify ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Applied Network Security Monitoring

Applied Network Security Monitoring

Chris Sanders, Jason Smith
Network Protocols for Security Professionals

Network Protocols for Security Professionals

Yoram Orzach, Deepanshu Khanna

Publisher Resources

ISBN: 9780596157944Errata Page