The tripwire program is an example of a host-based intrusion detection system. This tool examines files and folders on the system and notifies the administrator of any changes. It employs a protected database of cryptographic checksums for each file reviewed and compares them as they are scanned. It must be set with a list of files and directories to check and changes allowed. It can allow adding new entries to log files but not changing old ones. What are the benefits and drawbacks of employing such a tool? Consider the issue of selecting which files should be checked and which should be reviewed rarely. Consider the time spent configuring the application and monitoring the results.
The tripwire
Trending now
This is a popular solution!
Step by step
Solved in 2 steps