Title: Security Tip
![]() |
![]() |
![]() |
Issue Sponsored By:
> World Class Security Expertise from SkyView Partners.
![]()
IN THIS ISSUE:
> More hiding places for malicious code
> Can you trust all those trigger programs?
> Standardized security setup across multiple systems
> Secure JOBSCDEs with an authorization list
> Top 10 security tips
> Systems management -- Best Web Links on Security
![]()
![]()
More hiding places for malicious code
[Search400.com]
by Rich Loeber
The last time I wrote, I discussed tracking down hidden trigger programs on your system that could be just waiting for a specific event to release their malicious payload. But, as I've thought about this issue since then, there are other places where someone could "hide" a call to a malicious program that could get easily overlooked.
Let's look at two other areas of concern -- the system job scheduler and exit programs.
MORE INFO:
> View other tips by Rich Loeber
Can you trust all those trigger programs?
[Search400.com]
You may think that because you're working on the iSeries that you're safe from rampant computer viruses, worms and other malicious programs moving their way around the Internet, but think again. A malicious program can still get written and installed on your system, hidden away waiting for the right event to come out and strike. How, you ask? As a trigger program.
Standardized security setup across multiple systems
[Search400.com]
Nothing supports the popularity of the iSeries as much as the number
of customers with multiple systems installed. For security officers,
it can easily mean a lot of extra work keeping each system configured
and setup for company security policies. While this can be a complex task, IBM has provided a little known
capability in OS/400 for quite a while now that can help you to
enforce standard security configuration setup rules across separate
systems.
Secure JOBSCDEs with an authorization list
[Search400.com]
One user writes, "We have multiple customers on our system, and we don't want them to be able to view another customer's JOBSCDEs. Is there any way to secure JOBSCDEs with an authorization list"? Search400.com security expert Carol Woodbury responds.
Top 10 security tips
[Search400.com]
Not surprisingly, security is even more of an issue this year -- especially with Sarbanes-Oxley compliance deadlines. Here are 10 hot tips to ensure your security is all it can be.
![]()
TOPICS: Systems management -- Best Web Links on Security
These Best Web Links provide you with resources to help you
make your system as secure as it can be. Don't waste your time
scouring the Web; we've already done that for you.
TOPICS: Managing the iSeries Forum -- Interact with other administrators
Are you an iSeries administrator with questions? Join your peers in our Managing the iSeries Forum to ask and answer questions on systems management issues. Search400.com experts frequent the forums and share their expertise.
TOPICS: iSeries word scramble game #3
Test you iSeries smarts with our iSeries word scramble. This scramble is the third, and last, scramble of the month. Unscramble these 24 iSeries-related words for a chance to receive a $25 Amazon gift certificate. Make sure you submit your completed jumbles for a chance to win.
The jumble answers will be provided in next week's news e-mails. Make sure you're signed up to receive the Today's News e-newsletters.
|
![]() |
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]
Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
|
|
![]() |
![]() |
|
![]() |
|
![]() |
|