Title: Security Tip
May 11, 2004 Published by  Search400.com

Security Tip

Search400.com
Home News Topics Ask the Experts Tips Discussions Webcasts White Papers Products and Vendors Careers Site Map


IN THIS ISSUE:
Testing resource security
Testing user profiles
Getting better control over user profiles
Limiting when a user profile can be used
20 ways to improve your system's security
Managing the iSeries Forum -- Interact with other administrators


SPONSORED BY:  Search400.com Product and Vendor Guide

The Buyers guide is one of the most comprehensive directories of vendor and product information on the Web. It covers a wide range of areas for your research needs, including Application Dev, E-Commerce Solutions, Security and more. Simply search by topic, company name or keyword and you have access to complete vendor and important product information without having to comb through multiple sites.

Click Here!

Headlines
Testing resource security
[Search400.com]
by Rich Loeber

Last month, I talked about the need to test your security setup on a regular basis. That article focused in on testing user profiles. Today, I want to take a look at how you can go about testing your resource security setup. There are two things that you need to test and evaluate on your system. First, you have to make sure users have sufficient authority to get all of their work done without a problem. Once that has been established, you then need to go back and make sure users don't have too much authority, thereby compromising the confidentiality issues that prompted you to secure specific resources in the first place.



Testing user profiles
[Search400.com]
Security guru Rich Loeber takes a look at testing user profiles. According to Rich, the best time to test a user profile is when you initially create it. If, however, you have never tested your user profiles, you may want to tackle a project to get the profiles on your system tested on a periodic basis to make sure that they conform to your security objectives.

Getting better control over user profiles
[Search400.com]
Every iSeries shop has the potential to have active user profiles on the system for users who have left the company. Unless your personnel department is extra careful about global notifications when people leave, you may have a security exposure that you don't even know about. But you can, if you're careful about setting up user profiles, take care of this problem when new profiles are created.

Limiting when a user profile can be used
[Search400.com]
Each user profile on your system is a window, of sorts, into the computing environment for your business. Some profiles have a very narrow and limited view while others have a panoramic scene before them. Unfortunately, these windows can leave your system wide open for a user to wreak havoc -- either accidentally or intentionally. In this tip you'll learn how you can limit user profiles.

20 ways to improve your system's security
[Search400.com]
Is your system as secure as it can be? If you think it can be better, check out these hot expert Q&As. Use them to determine if you should be doing more.

Also on Search400.com
TOPICS: Managing the iSeries Forum -- Interact with other administrators
Are you an iSeries administrator with questions? Join your peers in our Managing the iSeries Forum to ask and answer questions on systems management issues. Search400.com experts frequent the forums and share their expertise.

WHITE PAPERS: Free white papers on iSeries security
When it comes to securing your iSeries, the more advice and help you have the better. Browse Search400.com's white paper section to find informative white papers on security and several other iSeries topics.

ASK THE EXPERTS: Expert Profile -- Carol Woodbury, Search400.com security expert
Carol Woodbury is co-founder and President of SkyView Partners, a firm specializing in security consulting and assessments as well as the assessment product, SkyView Risk Assessor for OS/400. Carol has over 14 years in the security industry, 10 of those working for IBM's Enterprise Server Group as the AS/400 Security Architect and Chief Engineering Manager of Security Technology. Carol co-authored the popular book, Implementing AS/400 Security. Look for Carol's second book, Experts' Guide to OS/400 Security, to be released in the spring of 2004. Let Carol's experience work for you. Ask Carol a question or read recent Q&As.


Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]

Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
Free E-Newsletters!
Select e-newsletters you would like to receive via e-mail!

Search400: Administrator Tips
Search400: WebSphere Strategies
Search400: Today's News


Not a Member? We'll activate your membership with your subscription.



ABOUT THIS E-NEWSLETTER
TechTarget - The Most Targeted IT Media This e-newsletter is published by Search400.com, a targeted Web site from TechTarget, the most targeted IT media and events company.
Copyright 2004 TechTarget. All rights reserved.

To unsubscribe from "Security Tip":
Go to unsubscribe: http://search400.techtarget.com/u?track=NL-236

Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

Contact Us:
Search400
MemberServices
117 Kendrick Street, Suite 800
Needham, MA 02494

Reply via email to