Title: Security Tip
  December 14, 2004 Published by  Search400.com   

Security Tip

search400.com
News Topics ITKnowledge Exchange Tips Ask the Experts Webcasts White Papers
Issue Sponsored By:
  > Bytware
  > Kisco Information Systems


IN THIS ISSUE:
  >  Watch your profiles
  >  Limiting when a user profile can be used
  >  The importance of testing user profiles
  >  Restricting user's authority
  >  Top 10 security tips
  >  Tip contest: Win an iSeries.mySeries prize pack
  >  Holiday Trivia: Celebrate the festivities IT-style

Headlines


Watch your profiles
[Search400.com]
by Rich Loeber

The user profile is your first line of defense in the ongoing battle of protecting your system. When a new employee shows up for work, you go to great lengths to get their profile set up just right. What about subsequent changes to those profiles? Are you watching these updates to make sure that your carefully engineered security scheme is being maintained over the life of each user profile?

MORE INFO:
View previous tips by Rich Loeber


 
AD Is your system integrity intact?
Now there's an easy way to determine when IBM's digital signatures have been altered. StandGuard Anti-Virus's new Object Integrity Scanning feature allows you to know what is happening to your system so you can make the choices yourself and keep a record of changes to comply with SOX. Visit www.bytware.com/press/ois.html for details.
 

Limiting when a user profile can be used
[Search400.com]
Each user profile on your system is a window of sorts into the computing environment for your business. Some profiles have a very narrow and limited view, while others have a panoramic scene before them. As a security officer, you've probably given this a lot of thought and have your profiles set up with the exact permissions necessary. But that's not always enough. In this tip, Rich Loeber explains how you can limit user profiles.

The importance of testing user profiles
[Search400.com]
Don't let everything you learned about the principals of testing fall by the wayside. Security testing is just as important as application testing. In this tip, Rich Loeber takes a look at testing your user profiles.

Restricting user's authority
[Search400.com]
This Search400.com member wanted users to have the ability to "start" their own writers, but he wanted to restrict them from viewing other people's outqs. What is the best way to go about this? Security expert Carol Woodbury explains.

Top 10 security tips
[Search400.com]
Not surprisingly, security is even more of an issue this year -- especially with Sarbanes-Oxley compliance deadlines. Here are 10 hot tips to ensure your security is all it can be.

Also on Search400.com


SHOW YOUR DEVOTION:  Tip contest: Win an iSeries.mySeries prize pack
Show off your love for your iSeries with this month's awesome prize package. Submit a tip for a chance to win an iSeries.mySeries shirt, bumper sticker and temporary tattoo.

 
AD Control Network Access With SafeNet/400
SafeNet/400 uses IBM exit points to control access to your iSeries-AS/400 from network resources. Audit tools give you the knowledge, while easy-to-use admin tools give you the control to protect your applications and data. Click here for more info.
 


TEST YOUR SMARTS:  Holiday Trivia: Celebrate the festivities IT-style
'Tis the holiday season! We've made a list and checked it each week. Now we're gonna find out who's naughty, who's nice... and who's a real holiday geek! Here's a festive sample of holiday IT terms with tantalizing clues. If you're a holiday-oriented geek, why not give it a try.

GADGET GUIDE 2004:  Just in time for the holiday season!
Do you hear what I hear? TechTarget's annual Gadgets & Gizmos guide is filled with helpful reviews on some of the coolest products available. If you're looking for a stocking stuffer for yourself or a fellow techno-friend, read our helpful reviews to see how our editors made out with these products in the real world. You'll find everything from notebooks to handhelds, mobile phones to mobile offices, tiny digital cameras and portable game systems.


 
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]

Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
 
 
Free E-Newsletters!
Select e-newsletters you would like to receive via e-mail!

 Search400: Programmer Tips
 Search400: Administrator Tips
 Search400: Today's News




Not a Member? We'll activate your membership with your subscription.
 




TechTarget - The Most Targeted IT Media This e-newsletter is published by Search400.com, a targeted Web site from TechTarget, the most targeted IT media and events company.

To unsubscribe from "Security Tip":
Go to unsubscribe: http://search400.techtarget.com/unsubscribe?cid=499659&lid=460581&track=NL-236&ad=499659

Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

Contact Us:
Search400
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

Reply via email to