Linux Security Cookbook [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Linux Security Cookbook [Electronic resources] - نسخه متنی

Daniel J. Barrett, Robert G. Byrnes, Richard Silverman

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید










Recipe 1.8 Expensive, Ultra-Paranoid Security Checking



1.8.1 Problem


You want highly secure integrity checks and are
willing to shell out additional money for them.


1.8.2 Solution


Store
your files on a dual-ported disk array. Mount the disk array
read-only on a second, trusted machine that has no network
connection. Run your Tripwire scans on the second machine.


1.8.3 Discussion


A dual-ported disk array permits two machines to access the same
physical disk. If you've got money to spare for
increased security, this might be a reasonable approach to securing
Tripwire.

Once again, let

trippy be
your machine in need of Tripwire scans.

trusty is a highly secure second
machine, built directly from trusted source or binary packages with
all necessary security patches applied, that has no network
connection and has never been accessible to third parties.

trippy 's
primary storage is kept on a dual-ported disk array. Mount this array
on

trusty read-only. Perform
all Tripwire-related operations on

trusty : initializing the database,
running integrity checks, and so forth. The Tripwire database,
binaries, keys, policy, and configuration are likewise kept on

trusty . Since

trusty is inaccessible via any network,
your Tripwire checks will be as reliable as the physical security of

trusty .

/ 247