skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System Security HP OpenVMS Guide to System Security
go to beginning of part: Security for the System Administrator Security for the System Administrator
go to beginning of chapter: System Security Breaches System Security Breaches
go to previous page: Forms of System Attacks Forms of System Attacks
go to next page: Routine System SurveillanceRoutine System Surveillance
end of book navigation links

Indications of Trouble  



When your system is vulnerable and possibly under attack, your first indications may come from the following sources:

Reports from Users  

User observations frequently point to system security problems. A user may contact you with the following situations:

Follow up promptly when one of these items is reported to you. You must confirm or deny that the condition exists. If you find the complaint is valid, seek a cause and solution.

Monitoring the System  

Ongoing Tasks to Maintain a Secure System lists those tasks that can help you detect potential security breaches on your system. The following list details possible warning signs you may uncover while performing the recommended tasks:

All these conditions warrant further investigation. Some indicate that you already have a problem, and some may have simple explanations, while others may indicate serious potential problems.


go to previous page: Forms of System Attacks Forms of System Attacks
go to next page: Routine System SurveillanceRoutine System Surveillance