Red Tape

Thu
27
Aug

Implementing and Maintaining AIX Security Policies

Contributed by Andre Derek Protas

This paper is meant to serve as an introductory guide to the basic security and server hardening functions present in AIX. Many of the features and functions shown throughout this guide are applicable to AIX 4.3 and above, but are more directed toward AIX 5.2. Since security is and will always remain a major issue in server environments, it is crucial that system administrators have a strong working knowledge of security policy implementation and hardening features. This knowledge can be applied to new systems, or to bring older systems up to date.

This document is in PDF format. To view it click here.

Wed
19
Aug

Strengthen Security with an Effective Security Awareness Program

Contributed by Tom Olzak

You’ve developed a world class security program. Your technology-based defenses are cutting edge. Your security team is well trained and ready to handle anything that comes its way. So you’re done, right? Not quite. One of the most important pieces of an effective information asset defense is missing – employee awareness.

In this paper, I define security awareness, list the objectives of an effective awareness program, and I step through a process to build, implement, and manage on-going support of the program.

This document is in PDF format. To view it click here.

Fri
14
Aug

The Importance of a Security, Education, Training and Awareness program

Contributed by Stephanie D. Hight

A Security Education, Training and Awareness (SETA) program can be defined as an educational program that is designed to reduce the number of security breaches that occur through a lack of employee security awareness. A SETA program sets the security tone for the employees of an organization, especially if it is made part of the employee orientation. Awareness programs explain the employee’s role in the area of Information Security. The aim of a security awareness effort is participation. Technology alone cannot solve a problem that is controlled by individuals.

This document is in PDF format. To view it click here.

Wed
12
Aug

How to Implement an Information Security Program

Contributed by Charles Hornat

This write-up is about my approach to Information Security and based on my own experiences. There are a number of ways to implement a program, but I believe that one has to first identify what they are protecting, understand the risks and associated threats, and then formulate a plan of protection.

This document is in PDF format. To view it click here.

Tue
11
Aug

Security Program Elements of Adoption

Contributed by Robert Underwood

With the risk of losing information to an unwanted entity the process of securing information is at high level priority to businesses. Although there are many models and frameworks that can be applied if the culture does not accept or adopt the methodologies then the effort is in vain and the investment is lost. Understanding the culture within a business and applying the appropriate adoption methodology is the best chance for implementation success.

Understanding the culture and how to integrate new processes through training techniques geared to individual employees which provides a platform for successful adoption.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Red Tape