Title: Security Tip
June 22, 2004 Published by  Search400.com

Security Tip

Search400.com
NEWS     TOPICS     ASK THE EXPERTS     TIPS     WEBCASTS     WHITE PAPERS    
Issue Sponsored By:
  > World Class Security Expertise from SkyView Partners.


IN THIS ISSUE:
  > More hiding places for malicious code
  > Can you trust all those trigger programs?
  > Standardized security setup across multiple systems
  > Secure JOBSCDEs with an authorization list
  > Top 10 security tips
  > Systems management -- Best Web Links on Security


 
AD World Class Security Expertise from SkyView Partners.
HIPAA, GLBA, Sarbanes-Oxley, California Law 1386. Are these Government Regulations driving a security audit for you? Save time and save money using Carol Woodbury's analytical tool. -SkyView Risk Assessor for OS/400 - new from SkyView Partners.
 

Headlines
More hiding places for malicious code
[Search400.com]
by Rich Loeber

The last time I wrote, I discussed tracking down hidden trigger programs on your system that could be just waiting for a specific event to release their malicious payload. But, as I've thought about this issue since then, there are other places where someone could "hide" a call to a malicious program that could get easily overlooked.

Let's look at two other areas of concern -- the system job scheduler and exit programs.
MORE INFO:
View other tips by Rich Loeber


Can you trust all those trigger programs?
[Search400.com]
You may think that because you're working on the iSeries that you're safe from rampant computer viruses, worms and other malicious programs moving their way around the Internet, but think again. A malicious program can still get written and installed on your system, hidden away waiting for the right event to come out and strike. How, you ask? As a trigger program.

Standardized security setup across multiple systems
[Search400.com]
Nothing supports the popularity of the iSeries as much as the number of customers with multiple systems installed. For security officers, it can easily mean a lot of extra work keeping each system configured and setup for company security policies. While this can be a complex task, IBM has provided a little known capability in OS/400 for quite a while now that can help you to enforce standard security configuration setup rules across separate systems.

Secure JOBSCDEs with an authorization list
[Search400.com]
One user writes, "We have multiple customers on our system, and we don't want them to be able to view another customer's JOBSCDEs. Is there any way to secure JOBSCDEs with an authorization list"? Search400.com security expert Carol Woodbury responds.

Top 10 security tips
[Search400.com]
Not surprisingly, security is even more of an issue this year -- especially with Sarbanes-Oxley compliance deadlines. Here are 10 hot tips to ensure your security is all it can be.

Also on Search400.com
TOPICS: Systems management -- Best Web Links on Security
These Best Web Links provide you with resources to help you make your system as secure as it can be. Don't waste your time scouring the Web; we've already done that for you.

TOPICS: Managing the iSeries Forum -- Interact with other administrators
Are you an iSeries administrator with questions? Join your peers in our Managing the iSeries Forum to ask and answer questions on systems management issues. Search400.com experts frequent the forums and share their expertise.

TOPICS: iSeries word scramble game #3
Test you iSeries smarts with our iSeries word scramble. This scramble is the third, and last, scramble of the month. Unscramble these 24 iSeries-related words for a chance to receive a $25 Amazon gift certificate. Make sure you submit your completed jumbles for a chance to win.

The jumble answers will be provided in next week's news e-mails. Make sure you're signed up to receive the Today's News e-newsletters.


Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]

Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]



ABOUT THIS E-NEWSLETTER
TechTarget This e-newsletter is published by Search400.com, a targeted Web site from TechTarget, the most targeted IT media and events company.
Copyright 2004 TechTarget. All rights reserved.

To unsubscribe from "Security Tip":
Go to unsubscribe: http://search400.techtarget.com/u?track=NL-236

Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

Contact Us:
Search400
MemberServices
117 Kendrick Street, Suite 800
Needham, MA 02494

Reply via email to