skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System SecurityHP OpenVMS Guide to System Security
go to beginning of part: Security for the System AdministratorSecurity for the System Administrator
go to previous page: Managing the Auditing SubsystemManaging the Auditing Subsystem
go to next page: Forms of System AttacksForms of System Attacks
end of book navigation links

10System Security Breaches  



Along with developing a security policy and selecting appropriatesecurity measures to implement that policy, a site needs to establishand test procedures for handling system, site, or network compromises.The procedure should address two areas:

This chapter describes how to recognize when an attack onthe system is in progress or has taken place and what countermeasurescan be taken.

skip links to sections within this chapter.
Forms of System Attacks
Indications of Trouble
Routine System Surveillance
Handling a Security Breach
end of content navigation links


Footnotes
1

HP supportgroups include the Software Security Response Team (SSRT) in theUnited States and the European Security Program Office (ESPO).

( Number takes you back )


go to previous page: Managing the Auditing SubsystemManaging the Auditing Subsystem
go to next page: Forms of System AttacksForms of System Attacks