Is your e3000 Environment Secure? Homestead security

page 20April 24, 2003
Is Your Homestead Secure? - Solution Symposium West
Would you know it if a hacker replaced a
system file with a trojan horse?
Monitor system logging for unauthorized file open/close
events
but what if a hacker disabled system logging or sanitized
the log files?
Build a database of file checksums and other attributes
for comparison purposes to detect file changes
Update the database after legitimate file changes
Various open source solutions – TripWire, Osiris, etc