General Computer Security

From MidrangeWiki
Revision as of 05:56, 31 May 2005 by Al Mac (talk | contribs) (Computer Security in General)
Jump to: navigation, search

Here are links of general Computer Security interest, not limited to the 400, such as PCs running on Microsoft or some other OS.

Al Mac original intent with this article is to be an index directory overview, with separate individual articles detailing the many nuances.

Security News and Discussion

What is needed for good security is a moving target because the bad guys are developing new kinds of scams and finding vulnerabilities all the time. Thus, we need to stay current with what kinds of threats are out there, evolving, getting worse.

Real World Security

Security is not just protecting what is on the computer, it is also physical security with respect to people getting into the building that houses the computer system, and considerations in case of a natural disaster.

General Disasters

Places like the Red Cross have check lists of what you need before a disaster. For example, suppose the power goes out and you are in the computer room. Can you find the flash light so that you can get out without stumbling over a lot of stuff, like kicking the 400?

400 Security

BPCS Security

Computer Security in General

  • Password Write Down Systems = if you have so many passwords to remember, they often have to change, and you have to share some with co-workers, here are some ideas on how to write them down, so that if the written down stuff falls into wrong hands, they still cannot sign on using the written down passwords.

We live in a world of computer users who fall into two categories

  • Those of us who can spend most of our time getting advantage of the capabilities of computers, because we are on a system that has security built in from the foundations by IBM.
  • Individuals who must spend a large chunk of their time battling computer security problems, because their computer providers added security as an afterthought, and it not work very well, like adding a padlock to a camping tent. Those realities contain a vast untapped population for Marketing eServers.

We have seen statistics saying that Administrators of Computer Systems outside that of the IBM eServer systems have to spend upwards of 1/3 their annual time and operating budget to deal: with Computer Security Problems that are unheard of in thge 400 world; and Data Base Administration that comes native to the AS/400 iSeries. This has created a humongous computer security industry that is larger than the GDP of many nations, to serve enterprises that are ignorant of the IBM alternatives.

Security Certification

Even if you do not get a "Diploma" as an expert in some aspect of Security, the outlines of the classes offered are a good review of topics we might want to become more knowledgeable about.

Malware plagues most everyone

What I mean is a constantly added to collection of all kinds of bad guy stuff on the Misinformation Highway, such as viruses, spam, phishing. No one can make a complete list of the threats because soon after we post it, there are new types of threats out there.

US Gov and US States

Spend some time checking out the US Gov analyses of where the global security threats are (bottom of National Governor's directory of security resources) http://www.nga.org/center/topics/1,1188,D_4440,00.html

Identity Theft Resources

This is intended as resources to help fight the problem.