- Larger systems with more resources and expertise are a more valueable target but can invest more into a security effort.
- Maintain a CD-Rom snapshot of security systems and software.
- Make use of "append-only" and immutable flags on Ext2 filesystems in Linux.
- Use a separate and isolated logging server.
- Single sign-on systems can be a mixed blessing or a curse.
No notes for slide 23