Looking for Bumps in the Night
Firewalls, Filters, Monitor Tools
- Implement Boarder Router Firewalls and Filters
- TCP Wrappers to Restrict Protocols, Sockets, etc
- Remote Logging Site
Restricted Access
Search Tools
- System Check Tools
Cops, SATAN, PW Crackers
.rhost Check
Directory Permission Check
Notes:
Just a few words about hardening your existing security environment. There are a number of tools available to architect firewalls, filters, access controls and monitoring. Most aren’t sufficient in themselves, but used in combination and carefully administered they can be quite effective.