LEADER 05203nam 2200613Ia 450 001 9910790634303321 005 20230802010646.0 010 $a1-58347-703-9 035 $a(CKB)2550000001135516 035 $a(EBL)906259 035 $a(OCoLC)796384349 035 $a(SSID)ssj0000656494 035 $a(PQKBManifestationID)11383980 035 $a(PQKBTitleCode)TC0000656494 035 $a(PQKBWorkID)10648867 035 $a(PQKB)11742211 035 $a(MiAaPQ)EBC906259 035 $a(Au-PeEL)EBL906259 035 $a(CaPaEBR)ebr10555718 035 $a(CaONFJC)MIL535224 035 $a(EXLCZ)992550000001135516 100 $a20120511d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aIBM i security administration and compliance$b[electronic resource] /$fby Carol Woodbury 205 $a1st ed. 210 $aKetchum, ID $cMC Press$d2012 215 $a1 online resource (429 p.) 300 $aIncludes index. 311 $a1-58347-373-4 311 $a1-306-03973-8 327 $aTitle Page; Copyright Page; Dedication; Acknowledgments; Table of Contents; CHAPTER 1 - Security-The Reasons You're Reading This Book; Evaluating Your Risks; Evaluating the Threats; Managing the Strategic Issues; Getting Started; Don't Close the Book; CHAPTER 2 - Policies and Procedures; Your Security Policy; Business Events and Procedures; Getting Started with Your Policy; Legal Review; CHAPTER 3 - Security at the System Level; The System Security Level; Security-Related System Values; Locking Down Security-Related System Values; A Helpful Tool; CHAPTER 4 - The Facts About User Profiles 327 $aWhat Are User Profiles?User Profile Attributes; Private Authorities and User Profiles; Helpful Tools; Navigator for i; Copying User Profiles; Validation List Users; CHAPTER 5 - Service Tools Security; Service Tools User IDs; Service Tools Functional Privileges; Device Profiles; The Work with System Security Panel; Monitoring Service Tools Use; Service Tools Security Recommendations; CHAPTER 6 - Object-Level Security; Private Authorities; Group Profiles; Public Authority; Authorization Lists; How IBM i Checks Authority; Adopted Authority; Authorities and Save/Restore Functions 327 $aObject OwnershipLimit User Function; Helpful Tools; Navigator for i; CHAPTER 7 - Security Considerations for the IFS; IFS Authorities; Managing Authorities to IFS Objects; File Attributes; File Shares: Accessing Objects in the IFS; Gotchas and Helpful Hints; Security Recommendations; Helpful Tools; CHAPTER 8 - Securing Your Printed Output; Security-Related Output Queue Attributes; Output Queue Ownership; Sample Output Queue Security Implementation; Helpful Tools; Navigator for i; CHAPTER 9 - Encryption; Encryption Basics; Transmission of Data; Encrypting Data in Files; Encrypting Backup Media 327 $aDisaster Recovery ConsiderationsSuccess Depends on Planning; Helpful Resources; CHAPTER 10 - Connecting to the System; Physical Security; System Values; *IOSYSCFG Special Authority; Network Security Attributes; Security Considerations for TCP/IP; Security Considerations for PCs; Using Exit Points; Management Central; Secure Communications; Wireless Considerations; Helpful Tools; Navigator for i; IBM Director; CHAPTER 11 - Internet Security; Determine Your Risk; The Process; Corporate Security Policy; Internet Service Provider; Firewalls; System Values; User Profiles; Resource Security 327 $aControlling What Goes OnSecure Web Applications; Exit Programs; Monitoring; Testing and Evaluation; Business Contingency Plan; Be Careful Out There; CHAPTER 12 - Evaluating Applications' Current Implementations and Designing New Ones; From the Beginning; Design Considerations; Implementation Details; Testing, Testing; Moving Forward; CHAPTER 13 - Role-Based Access; Roles; Defining the Roles; Group Profiles; Why Group Profiles?; Implementation; CHAPTER 14 - Role-Based Access for IT; Security and Your IT Staff; Identify the Roles; Define a Secure Environment for Each Business Function 327 $aSecurity for Vendors and Consultants 330 $aExplaining the importance of developing a security policy and detailing how to implement and maintain such a system, this guide reviews IBM i security and the way it functions within IBM i systems. Written in a clear, jargon-free style, this book covers topics such as system security levels, user profiles, service tools, encryption, auditing, compliance, and incident response. The author's methodology for implementing security is described in great detail, focusing on compliance with stated policies and procedures within an organization. Useful for security and system administrators, security 606 $aComputer security 606 $aIBM computers$xProgramming 615 0$aComputer security. 615 0$aIBM computers$xProgramming. 676 $a005 700 $aWoodbury$b Carol$01487949 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910790634303321 996 $aIBM i security administration and compliance$93708076 997 $aUNINA