HP OpenVMS Guide to System Security > Part III Security for the
System AdministratorChapter 10 System Security Breaches
Table of Contents Along with developing a security policy and selecting appropriate security measures to implement that policy, a site needs to establish and test procedures for handling system, site, or network compromises. The procedure should address two areas:
This chapter describes how to recognize when an attack on the system is in progress or has taken place and what countermeasures can be taken. [4] HP support groups include the Software Security Response Team (SSRT) in the United States and the European Security Program Office (ESPO). |