Difference between revisions of "Security Basics"
From MidrangeWiki
(→Wayne Evans) |
(→Wayne Evans) |
||
Line 15: | Line 15: | ||
http://woevans.freeyellow.com/Qst_Ans.pdf | http://woevans.freeyellow.com/Qst_Ans.pdf | ||
**** Biggest threats to overall 400 security | **** Biggest threats to overall 400 security | ||
+ | **** Best Practices | ||
**** What can be done at the Sign On Screen | **** What can be done at the Sign On Screen | ||
**** How secure are 400 passwords | **** How secure are 400 passwords | ||
**** Why security level 40 | **** Why security level 40 | ||
**** Security 400 auditing | **** Security 400 auditing | ||
+ | **** [[Client Access]] | ||
+ | **** [[Operations Navigator]] | ||
**** Exit Programs | **** Exit Programs | ||
**** Authorization Lists | **** Authorization Lists | ||
Line 24: | Line 27: | ||
**** [[Encryption 400]] | **** [[Encryption 400]] | ||
**** How evaluate security software vendors | **** How evaluate security software vendors | ||
+ | **** VPN interesting factoid | ||
+ | ***** The use of VPN (Virtual Private Network) causes all traffic over the VPN to be encrypted. | ||
+ | ***** [[User:Al Mac|Al Mac]] notes that this may not help if Spyware gets onto the PC of the person using VPN to access the 400 | ||
+ | **** and lots more | ||
*** Other downloads available http://www.woevans.com/My_Homepage_Files/Page3.html such as | *** Other downloads available http://www.woevans.com/My_Homepage_Files/Page3.html such as |
Revision as of 07:09, 10 June 2005
See General Computer Security for info and links about Security outside of the 400.
Security 400 Professionals
Wayne Evans
- Wayne O. Evans http://www.woevans.com/ is a former IBM 400 Security Architecture specialist http://woevans.freeyellow.com/WOEBIO.html who now has his own 400 Security Consulting firm
- He designed many of the security features of the 400 and its predecssor machines, also many 400 features in addition to security
- He advises us to get a more secure web browser than Microsoft IE
- He does 400 Security columns and seminars
- He has a book out with a collection of his 400 Security articles
- OS/400 Security Education and Training
- Security/400 FAQ
http://woevans.freeyellow.com/Qst_Ans.pdf
- Biggest threats to overall 400 security
- Best Practices
- What can be done at the Sign On Screen
- How secure are 400 passwords
- Why security level 40
- Security 400 auditing
- Client Access
- Operations Navigator
- Exit Programs
- Authorization Lists
- ODBC
- Encryption 400
- How evaluate security software vendors
- VPN interesting factoid
- The use of VPN (Virtual Private Network) causes all traffic over the VPN to be encrypted.
- Al Mac notes that this may not help if Spyware gets onto the PC of the person using VPN to access the 400
- and lots more
- Other downloads available http://www.woevans.com/My_Homepage_Files/Page3.html such as
- step by step instructions to improve your 400 Security
- sample Security Policy
- Security related software
- History of 400 and predecessor machines
- Other downloads available http://www.woevans.com/My_Homepage_Files/Page3.html such as
- OS/400 Security Review Audit
- OS/400 Security Training
- NetQ PentaSafe Training
Milt Habek
Milt is CEO of UPI which markets many security solutions for the 400