Is your e3000 Environment Secure? Homestead security
page 20April 24, 2003
Is Your Homestead Secure? - Solution Symposium West
Would you know it if a hacker replaced a
system file with a trojan horse?
• Monitor system logging for unauthorized file open/close
events
– but what if a hacker disabled system logging or sanitized
the log files?
• Build a database of file checksums and other attributes
for comparison purposes to detect file changes
– Update the database after legitimate file changes
– Various open source solutions – TripWire, Osiris, etc