Title: Security Tip
  July 27, 2004 Published by  Search400.com   

Security Tip

search400.com
News Topics Ask the Experts Tips Webcasts White Papers
IN THIS ISSUE:
  >  Is the light on, but the door unlocked?
  >  Standardized security setup across multiple systems
  >  Testing resource security
  >  Putting a security guide in place
  >  Top 10 security tips
  >  Test your smarts: Who's who in the iSeries community?
SPONSORED BY:  Search400.com Product and Vendor Guide

The Buyers guide is one of the most comprehensive directories of vendor and product information on the Web. It covers a wide range of areas for your research needs, including Application Dev, E-Commerce Solutions, Security and more. Simply search by topic, company name or keyword and you have access to complete vendor and important product information without having to comb through multiple sites.

Click Here!

Headlines


Is the light on, but the door unlocked?
[Search400.com]
Rich Loeber

iSeries owners regularly boast about the security built into their systems, and rightly so, but if you don't implement and use the features, they're not going to do anything for you. I have mentioned before that I live in upstate New York, in the heart of the Adirondack Mountains. In our neck of the woods (literally), security is not much of an issue for most people. In fact, most of our neighbors never lock their homes or cars since theft is just not a problem.

I'm surprised, however, when I hear about iSeries shops that have this same approach to computer security. Be safe. Don't leave your system exposed; learn more about locking down your iSeries.

MORE INFO:
View other tips by Rich Loeber

Standardized security setup across multiple systems
[Search400.com]
Nothing supports the popularity of the iSeries as much as the number of customers with multiple systems installed. For security officers, it can easily mean a lot of extra work keeping each system configured and setup for company security policies. While this can be a complex task, IBM has provided a little known capability in OS/400 for that can help you to enforce standard security configuration set up rules across separate systems.

Testing resource security
[Search400.com]
Rich Loeber takes a look at how you can go about testing your resource security setup. There are two things that you need to test and evaluate on your system. First, you have to make sure users have sufficient authority to get all of their work done without a problem. Once that has been established, you then need to go back and make sure users don't have too much authority, thereby compromising the confidentiality issues that prompted you to secure specific resources in the first place.

Putting a security guide in place
[Search400.com]
One user writes, "After being audited this year, the auditors have asked me to create a 'Security officers best practices guide'. Can you recommend any articles/documents or books that could help me get started with this?" Search400.com's security expert Carol Woodbury responds.

Top 10 security tips
[Search400.com]
Not surprisingly, security is even more of an issue this year -- especially with Sarbanes-Oxley compliance deadlines. Here are 10 hot tips to ensure your security is all it can be.

Also on Search400.com

NEW ISERIES QUIZ:  Test your smarts: Who's who in the iSeries community?
Sharpen your pencils. It's time to see how much you know about the big players in the iSeries community. Do you know who created the computer architecture used in today's iSeries? Who's the guy in the cowboy hat you see regularly at COMMON conferences? Who is known as Mr. OS/400 Security? Click over and see if you know the answers to those questions and more.

FREE BOOK EXCERPT:  Free Book Excerpt: Experts' Guide to OS/400 & i5/OS Security
Log on and download for free an excerpt from Chapter 12 of Experts' Guide to OS/400 & i5/OS Security written by Carol Woodbury and Patrick Botz and published by 29th Street Press. This chapter, "Single Sign-on," addresses problems associated with the multitude of user IDs and passwords your users must remember.

Win a copy of the book: After you read the chapter, test how much you learned and then send us the results for a chance to win a copy of Experts' Guide to OS/400 & i5/OS Security. Send your e-mail to [EMAIL PROTECTED].

MANAGING THE ISERIES FORUM:  Interact with other administrators
Are you an iSeries administrator with questions? Join your peers in our Managing the iSeries Forum to ask and answer questions on systems management issues. Search400.com experts frequent the forums and share their expertise.


 
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]

Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
 
 
Free E-Newsletters!
Select e-newsletters you would like to receive via e-mail!

 Search400: Administrator Tips
 Search400: Programmer Tips
 Search400: Today's News




Not a Member? We?ll activate your membership with your subscription.
 




TechTarget - The Most Targeted IT Media This e-newsletter is published by Search400.com, a targeted Web site from TechTarget, the most targeted IT media and events company.

To unsubscribe from "Security Tip":
Go to unsubscribe: http://search400.techtarget.com/unsubscribe?track=NL-236&ad=487924

Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

Contact Us:
Search400
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

Reply via email to