Читать книгу Integration of Cloud Computing with Internet of Things - Группа авторов - Страница 52

2.8 Monitoring of Firewalls and Good Management 2.8.1 Surveillance

Оглавление

Whatever firewall you use, it is a smart thing to obey and occasionally show firewall logs. You will improve your protection automatically through careful observance of your logs. Most hacks can theoretically be avoided if people track their logs because most hackers will check a laptop before hacking them. When a participant in the PC nursing supervisor detects these tests, they will check that their machines are sensitive to what they were checking. You’ll be shocked by the amount of people WHO tries to access your laptop, but not your results, until you start installing your firewall and reviewing logs.

The reasons behind tracking the log files are three: There are three key reasons:

Preventative Measures: You can see what harbors and services hackers are able to manipulate by tracking the firewall logs. Such knowledge will then be used to guarantee that the machine is safe against such exploits. For starters, when you see on your logs that other people are checking and investigating your machine for port 3127, you will discover that people and viruses will check for the backdoors on your machine which are left behind by the early version of the My Doom virus. You will then ensure that this new attack doesn’t damage the computers.

Integration of Cloud Computing with Internet of Things

Подняться наверх