Logging&monitoring: Difference between revisions
From ICO wiki
Jump to navigationJump to search
Created page with "Author: Mohanad Aly Group : Cyber Security Engineering (C21) Page Created: 18 September 2016 Last modified: = Aim of this page = *'''logging and monitoring.''' *''..." |
|||
Line 33: | Line 33: | ||
*First be super user <code>sudo -i</code> | *First be super user <code>sudo -i</code> | ||
<code>apt-get update</code> | <code>apt-get update</code> | ||
<code>apt-get upgrade</code> | <code>apt-get upgrade</code> | ||
= Initial Setup= | = Initial Setup= | ||
Revision as of 17:18, 18 September 2016
Author: Mohanad Aly
Group : Cyber Security Engineering (C21)
Page Created: 18 September 2016
Last modified:
Aim of this page
- logging and monitoring.
- The best solution for logging
- Threats.
- Securing during logging
Topology of the system
Desktop machine [[File:|thumb|center|Topology []]] Begin with the basic setup, network configuration and make the machine has internet access which the ip address of the machine is 192.168.56.100
Server machine ip address 192.168.56.200
- Can be connected over ssh with student@192.168.168.56.200
IDS ip address 192.168.56.201
Starting to update an upgrade for all machines
- First be super user
sudo -i
apt-get update
apt-get upgrade