Using Basic Security Module (BSM), Tripwire, System Logs, and Symantec's ITA for Audit Data C
There are 2 main sources of information regarding intrusion detection to a networked computer system: networking traffic and auditing files. A more effective intrusion detection system (IDS) is provided when a multi-layered security approach is incorporated into a network of computers. Whatever...