Protect Your Information with Intrusion Detection (Power)


For each important or critical file or directory, you must have backup copies that allow you to trace all the changes introduced for those files and directories. You must be able to identify the following changes:

These changes can be traced using integrity-control tools that were covered in the previous chapter. The description of the backup tools themselves (such as ARCserver, Ghost, etc.) goes beyond the range of topics discussed in this book.

Critically important elements of the information system that must be backed up and controlled include the following:

Protection and Integrity Control of the Inventory, Network Map, and Authoritative Links

These requirements are quite similar to the requirements that must be met for the protection of log files. Therefore, we will not repeat them here.


Категории