12.Explain the tools used to monitor system security.
Ans.
1. People who, for purpose of larceny or to amuse themselves, like to break into computers, they are called ‘crackers’.
2. If there is a vulnerability in a system they will find it and use it against you.
3. Preventing use of your machine for nefarious purpose and guarding against intrusion are, in the end, your responsibility alone.
4. Red hat equips you with tools to detect and deal with unauthorised access of many kinds.
5. You need to configure those tools and understand how to sense the warning they provide.
6. Fortunately Linux is development community is quick to find potential exploits and to create ways of slamming the doors before crackers can enter in your system.
7. Red hat is careful enough to making available new, patched version in which potential exploits have been found.
8. You should make sure to download and install the repaired package.
9. This line of defence can be annoying but it is nothing compared to rebuilding a compromised system.
Ans.
1. People who, for purpose of larceny or to amuse themselves, like to break into computers, they are called ‘crackers’.
2. If there is a vulnerability in a system they will find it and use it against you.
3. Preventing use of your machine for nefarious purpose and guarding against intrusion are, in the end, your responsibility alone.
4. Red hat equips you with tools to detect and deal with unauthorised access of many kinds.
5. You need to configure those tools and understand how to sense the warning they provide.
6. Fortunately Linux is development community is quick to find potential exploits and to create ways of slamming the doors before crackers can enter in your system.
7. Red hat is careful enough to making available new, patched version in which potential exploits have been found.
8. You should make sure to download and install the repaired package.
9. This line of defence can be annoying but it is nothing compared to rebuilding a compromised system.
Comments
Post a Comment