Wednesday, June 13, 2012

TRIPWIRE

ABSTRACT




Tripwire is a reliable intrusion detection system. It is a software tool thatchecks to see what has changed in your system. It mainly monitors thekey attribute of your files; by key attribute we mean the binary signature,size and other related data. Security and operational stability must gohand in hand; if the user does not have control over the various operationstaking place, then naturally the security of the system is also compromised. Tripwire has a powerful feature which pinpoints thechanges that has taken place, notifies the administrator of these changes,determines the nature of the changes and provide you with information you need for deciding how to manage the change.Tripwire Integrity management solutions monitor changes to vital systemand configuration files. Any changes that occur are compared to a snapshot of the established good baseline. The software detects thechanges, notifies the staff and enables rapid recovery and remedy for changes. All Tripwire installation can be centrally managed. Tripwire software’s cross platform functionality enables you to manage thousandsof devices across your infrastructure

Tripwire Report


Trip Wire Ppt

Reference:
http://www.scribd.com/doc/59125484/My-Seminar-Report


Open Source Tripwire is a free software security and data integrity tool useful for monitoring and alerting on specific file change(s) on a range of systems. The project is based on code originally contributed by Tripwire, Inc. in 2000.
Open Source Tripwire functions as a host-based intrusion detection system. Rather than attempting to detect intrusions at the network interface level (as in network intrusion detection systems), Open Source Tripwire detects changes to file system objects.
When first initialized, Open Source Tripwire scans the file system as directed by the administrator and stores information on each file scanned in a database. At a later date the same files are scanned and the results compared against the stored values in the database. Changes are reported to the user. Cryptographic hashes are employed to detect changes in a file without storing the entire contents of the file in the database.
While useful for detecting intrusions after the event, it can also serve many other purposes, such as integrity assurance, change management, and policy compliance.


1 comment:

  1. Great post!
    Indeed, security system should be quality enough to prevent any type of attack including cyber-attacks. Today as far as I know the number of cyber-attacks is really high because of the value of personal and business data on the 'black' market. I also know that Ideals has a good data security system for business.

    ReplyDelete