Title: Security Tip
  October 26, 2004 Published by  Search400.com   

Security Tip

search400.com
News Topics ITKnowledge Exchange Tips Ask the Experts Webcasts White Papers
Issue Sponsored By:
  > The PowerTech Group -- Definitive iSeries Security


IN THIS ISSUE:
  >  Message monitor for security events
  >  Get better control over user profiles
  >  Can users alter audit logs?
  >  Testing resource security
  >  Top 10 security tips
  >  Simple steps to a secure iSeries
  >  Halloween: Do you speak -- eek! -- Geek?

Headlines


Message monitor for security events
[Search400.com]
by Rich Loeber

Your system is in use by your user community all day long. Depending on the size of your shop and the number of users, there could be hundreds or even thousands of security decisions being made by your security setup on a minute-by-minute, hour-by-hour, day-by-day basis. If you've done your homework well, those security arrangements will all work to protect your data from being used incorrectly.

MORE INFO:
View previous tips by Rich Loeber


 
AD The PowerTech Group -- Definitive iSeries Security
Free iSeries Compliance Assessment! Complying with government regulations such as Sarbanes Oxley and HIPAA is top priority for many businesses. Are you prepared? An iSeries compliance assessment from PowerTech will uncover security vulnerabilities and provide recommendations to help your company get ready. Click here for more information
 

Get better control over user profiles
[Search400.com]
Every iSeries shop has the potential to have active user profiles on the system for users who have left the company. Unless your personnel department is extra careful about global notifications when people leave, you may have a security exposure that you don't even know about. But you can, if you're careful about setting up user profiles, take care of this problem when new profiles are created.

Can users alter audit logs?
[Search400.com]
One user writes, "Our external auditor has stated that two of our users can alter the audit logs. While I can see that it may be possible for them to delete the audit journals, is it possible for them to delete or alter individual records without leaving footprints?" Search400.com security expert Carol Woodbury responds.

Testing resource security
[Search400.com]
Security guru Rich Loeber looks at how you can go about testing your resource security setup. There are two things that you need to test and evaluate on your system. First, you have to make sure users have sufficient authority to get all of their work done without a problem. Once that has been established, you then need to go back and make sure users don't have too much authority, thereby compromising the confidentiality issues that prompted you to secure specific resources in the first place.

Top 10 security tips
[Search400.com]
There's no such thing as being too secure. Even if you run an iSeries, there are still a few things you must do to protect your system and your data. These tips can help you out.

Also on Search400.com


LEARNING GUIDE:  Simple steps to a secure iSeries
If you're a systems manager, chances are security is your top priority. With new security issues emerging on a daily basis, it can seem like you're swimming against the tide when trying to secure your system from both intentional and unintentional security breaches and threats. We've gathered some good security information in this security Learning Guide to help you along your way. Consider it a security life preserver of sorts.

IT QUIZ:  Halloween: Do you speak -- eek! -- Geek?
Are you such a Know-IT-All that it's scary? How many of these terrifying terms can you guess without peeking?

ITKNOWLEDGE EXCHANGE:  Get answers to your questions fast
Now you can ask any one of your fellow TechTarget members -- 1.2 million strong -- specific questions on technology, best practices or other IT issues. Just tell us who you are and the subjects you're interested in (iSeries, RPG, DB2, WebSphere, etc.) and then ask your questions or offer advice to other IT professionals. Our ITKnowledge Exchange brings members from all 22 TechTarget Web sites together to share information and experiences.


 
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]

Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
 
 
Free E-Newsletters!
Select e-newsletters you would like to receive via e-mail!

 Search400: Today's News
 Search400: Administrator Tips
 Search400: Programmer Tips




Not a Member? We'll activate your membership with your subscription.
 




TechTarget - The Most Targeted IT Media This e-newsletter is published by Search400.com, a targeted Web site from TechTarget, the most targeted IT media and events company.

To unsubscribe from "Security Tip":
Go to unsubscribe: http://search400.techtarget.com/unsubscribe?track=NL-236&ad=495439

Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

Contact Us:
Search400
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

Reply via email to