Overview
In addition,
Figure 1-1 HP-UX HIDS Components
How the Components Interact to Detect Intrusions
•kernel audit data
•system log files
Chapter 1 | 11 |
Overview
In addition,
•kernel audit data
•system log files
Chapter 1 | 11 |