满足这些需求的第一组工具是系统审计和基于主机的入侵检测。
The first tools for meeting these requirements are system auditing and host-based intrusion detection.
例程系统审计过程中需要验证的安全性需求应该与系统安装过程中使用的需求和安全性准则相同。
The security requirements that you verify during routine system auditing should be the same requirements and security principles that guide the system installation.
本文的重点是基于管理大型学术网络子网的系统管理员的真实需求而总结出的一些周期性的系统审计实践。
This article focuses specifically on the practical aspects of periodic system auditing based on real-world requirements from a system administrator of a subnet in a large academic network.
应用推荐