Issue Sponsored By:
> The PowerTech Group -- Definitive iSeries Security
![]()
IN THIS ISSUE:
>
Message monitor for security events
>
Get better control over user profiles
>
Can users alter audit logs?
>
Testing resource security
>
Top 10 security tips
>
Simple steps to a secure iSeries
>
Halloween: Do you speak -- eek! -- Geek?
![Headlines]()
![]()
Message monitor for security events
[Search400.com]
by Rich Loeber
Your system is in use by your user community all day long. Depending on the size of your shop and the number of users, there could be hundreds or even thousands of security decisions being made by your security setup on a minute-by-minute, hour-by-hour, day-by-day basis. If you've done your homework well, those security arrangements will all work to protect your data from being used incorrectly.
MORE INFO:
> View previous tips by Rich Loeber
| |
![]() |
![AD]() |
![]() |
The PowerTech Group -- Definitive iSeries Security
Free iSeries Compliance Assessment! Complying with government regulations such as Sarbanes Oxley and HIPAA is top priority for many businesses. Are you prepared? An iSeries compliance assessment from PowerTech will uncover security vulnerabilities and provide recommendations to help your company get ready.
Click here for more information
|
| |
Get better control over user profiles
[Search400.com]
Every iSeries shop has the potential to have active user profiles on the system for users who have left the company. Unless your personnel department is extra careful about global notifications when people leave, you may have a security exposure that you don't even know about. But you can, if you're careful about setting up user profiles, take care of this problem when new profiles are created.
Can users alter audit logs?
[Search400.com]
One user writes, "Our external auditor has stated that two of our users can alter the audit logs. While I can see that it may be possible for them to delete the audit journals, is it possible for them to delete or alter individual records without leaving footprints?" Search400.com security expert Carol Woodbury responds.
Testing resource security
[Search400.com]
Security guru Rich Loeber looks at how you can go about
testing your resource security setup. There are two things that you need to test and evaluate on your system. First, you have to make sure users have sufficient authority to get all of their work done without a problem. Once that has been established, you then need to go back and make sure users don't have too much authority, thereby compromising the confidentiality issues that prompted you to secure specific resources in the first place.
Top 10 security tips
[Search400.com]
There's no such thing as being too secure. Even if you run an iSeries, there are still a few things you must do to protect your system and your data. These tips can help you out.
![Also on Search400.com]()
![]()
LEARNING GUIDE:
Simple steps to a secure iSeries
If
you're a systems manager, chances are security is your top priority.
With new security issues emerging on a daily basis, it can seem like you're swimming against the tide when trying to secure your system from both intentional and unintentional security breaches and threats. We've gathered some good security information in this security Learning Guide to help you along your way. Consider it a security life preserver of sorts.
IT QUIZ:
Halloween: Do you speak -- eek! -- Geek?
Are you such a Know-IT-All that it's scary? How many of these terrifying terms can you guess without peeking?
ITKNOWLEDGE EXCHANGE:
Get answers to your questions fast
Now
you can ask any one of your fellow TechTarget members -- 1.2 million strong -- specific questions on technology, best practices or other IT issues. Just tell us who you are and the subjects you're interested in (iSeries, RPG, DB2, WebSphere, etc.) and then ask your questions or offer advice to other IT professionals. Our ITKnowledge Exchange brings members from all 22 TechTarget Web sites together to share information and experiences.
| |
![]() |
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]
Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
|
![]() |
| |
|
![]() |
| |
![]() |
Free E-Newsletters! Select e-newsletters you would like to receive via e-mail!
Search400: Today's News
Search400: Administrator Tips
Search400: Programmer Tips
![]()
![]()
Not a Member? We'll activate your membership with your subscription.
|
![]() |
| |
|
|
![]()
![]() |
![TechTarget - The Most Targeted IT Media]() |
![]() |
This e-newsletter is published by Search400.com, a targeted Web site from TechTarget, the most targeted IT media and events company.
To unsubscribe from "Security Tip":
Go to unsubscribe: http://search400.techtarget.com/unsubscribe?track=NL-236&ad=495439
Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.
Contact Us: Search400 Member Services 117 Kendrick Street, Suite 800 Needham, MA 02494
|
![]() |
|
![]() |
|