Tagged articles
1 articles
Page 1 of 1
Efficient Ops
Efficient Ops
Jan 4, 2017 · Information Security

How Deep Defense and Log Analysis Can Thwart Intrusions

This article explains Google’s BeyondCorp concept, the need for deep defense of internal and perimeter networks, and provides practical Linux scripts for monitoring processes, ports, command usage, system events, file changes, and SFTP activity to detect and mitigate host intrusions.

Deep DefenseInformation SecurityLinux monitoring
0 likes · 10 min read
How Deep Defense and Log Analysis Can Thwart Intrusions