01.06.2014 Views

Computer Forensics foredrag - Prosa

Computer Forensics foredrag - Prosa

Computer Forensics foredrag - Prosa

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Recovering from an Incident<br />

På CERT website kan man finde mange gode ressourcer omkring<br />

sikkerhed og hvad man skal gøre med kompromiterede servere<br />

Eksempelvis listen over dokumenter fra adressen:<br />

http://www.cert.org/nav/recovering.html:<br />

• The Intruder Detection Checklist<br />

• Windows NT Intruder Detection Checklist<br />

• The UNIX Configuration Guidelines<br />

• Windows NT Configuration Guidelines<br />

• The List of Security Tools<br />

• Windows NT Security and Configuration Resources<br />

Ved at følge en sådan fremgangsmåde får man tryghed<br />

ad-hoc oprydning giver ingen sikkerhed!<br />

c○ copyright 2005 Security6.net, Henrik Lund Kramshøj 40

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!