1.

Record Nr.

UNINA9910790634303321

Autore

Woodbury Carol

Titolo

IBM i security administration and compliance [[electronic resource] /] / by Carol Woodbury

Pubbl/distr/stampa

Ketchum, ID, : MC Press, 2012

ISBN

1-58347-703-9

Edizione

[1st ed.]

Descrizione fisica

1 online resource (429 p.)

Disciplina

005

Soggetti

Computer security

IBM computers - Programming

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.

Nota di contenuto

Title Page; Copyright Page; Dedication; Acknowledgments; Table of Contents; CHAPTER 1 - Security-The Reasons You're Reading This Book; Evaluating Your Risks; Evaluating the Threats; Managing the Strategic Issues; Getting Started; Don't Close the Book; CHAPTER 2 - Policies and Procedures; Your Security Policy; Business Events and Procedures; Getting Started with Your Policy; Legal Review; CHAPTER 3 - Security at the System Level; The System Security Level; Security-Related System Values; Locking Down Security-Related System Values; A Helpful Tool; CHAPTER 4 - The Facts About User Profiles

What Are User Profiles?User Profile Attributes; Private Authorities and User Profiles; Helpful Tools; Navigator for i; Copying User Profiles; Validation List Users; CHAPTER 5 - Service Tools Security; Service Tools User IDs; Service Tools Functional Privileges; Device Profiles; The Work with System Security Panel; Monitoring Service Tools Use; Service Tools Security Recommendations; CHAPTER 6 - Object-Level Security; Private Authorities; Group Profiles; Public Authority; Authorization Lists; How IBM i Checks Authority; Adopted Authority; Authorities and Save/Restore Functions

Object OwnershipLimit User Function; Helpful Tools; Navigator for i; CHAPTER 7 - Security Considerations for the IFS; IFS Authorities; Managing Authorities to IFS Objects; File Attributes; File Shares: Accessing Objects in the IFS; Gotchas and Helpful Hints; Security Recommendations; Helpful Tools; CHAPTER 8 - Securing Your Printed



Output; Security-Related Output Queue Attributes; Output Queue Ownership; Sample Output Queue Security Implementation; Helpful Tools; Navigator for i; CHAPTER 9 - Encryption; Encryption Basics; Transmission of Data; Encrypting Data in Files; Encrypting Backup Media

Disaster Recovery ConsiderationsSuccess Depends on Planning; Helpful Resources; CHAPTER 10 - Connecting to the System; Physical Security; System Values; *IOSYSCFG Special Authority; Network Security Attributes; Security Considerations for TCP/IP; Security Considerations for PCs; Using Exit Points; Management Central; Secure Communications; Wireless Considerations; Helpful Tools; Navigator for i; IBM Director; CHAPTER 11 - Internet Security; Determine Your Risk; The Process; Corporate Security Policy; Internet Service Provider; Firewalls; System Values; User Profiles; Resource Security

Controlling What Goes OnSecure Web Applications; Exit Programs; Monitoring; Testing and Evaluation; Business Contingency Plan; Be Careful Out There; CHAPTER 12 - Evaluating Applications' Current Implementations and Designing New Ones; From the Beginning; Design Considerations; Implementation Details; Testing, Testing; Moving Forward; CHAPTER 13 - Role-Based Access; Roles; Defining the Roles; Group Profiles; Why Group Profiles?; Implementation; CHAPTER 14 - Role-Based Access for IT; Security and Your IT Staff; Identify the Roles; Define a Secure Environment for Each Business Function

Security for Vendors and Consultants

Sommario/riassunto

Explaining the importance of developing a security policy and detailing how to implement and maintain such a system, this guide reviews IBM i security and the way it functions within IBM i systems. Written in a clear, jargon-free style, this book covers topics such as system security levels, user profiles, service tools, encryption, auditing, compliance, and incident response. The author's methodology for implementing security is described in great detail, focusing on compliance with stated policies and procedures within an organization. Useful for security and system administrators, security