Security Monitoring
The whole area of security is a huge subject. Entire books are dedicated to security alone. Security is usually broken down into two categories: network security and host-based security. This section focuses on host-based (or system) security, so that you can monitor and detect activities that could compromise system, application, or data availability. Host-based security intrusions usually are the most problematic. As a system administrator, you should monitor the system for activities that would prevent the system from doing what it is intended to do.
Security Overview
The level of security needed for your system depends on what you are trying to protect. Both the US government and European Information Technology Security ...
Get UNIX® Fault Management: A Guide for System Administration now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.