Skip to Content
Security Strategies in Linux Platforms and Applications, 2nd Edition
book

Security Strategies in Linux Platforms and Applications, 2nd Edition

by Michael Jang, Ric Messier
October 2015
Intermediate to advanced
514 pages
16h 19m
English
Jones & Bartlett Learning
Content preview from Security Strategies in Linux Platforms and Applications, 2nd Edition

CHAPTER

14

Detecting and Responding to Security Breaches

YOU SPEND A LOT OF TIME protecting your systems from attack. You should keep one axiom in mind, however: Your system will be attacked, and there is a good chance it will be breached. This may come by accident or it may be deliberate. It may come from inside or it may come from outside. If you expect to be breached, you are more likely to be ready for an incident when it does happen. Think about all that you can and should do to help protect your system. Think of all of the ways these strategies can fail.

With that in mind, you should audit a system to identify baseline performance parameters. Deviations may be causes for concern. You will be able to identify user access through ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Security Strategies in Linux Platforms and Applications

Security Strategies in Linux Platforms and Applications

Michael Jang

Publisher Resources

ISBN: 9781284090659