The Department of Homeland Security and the private sector still haven't developed a comprehensive strategy for securing the real-time control systems that manage much of the nation's critical infrastructure, according to the chairman of a House subcommittee studying the issue.
Life isn't the same as it used to be, the good old days of leaving your door unlocked are gone, never to return. Business isn't the same either. IT has brought into the workplace, organisational and cultural challenges. One of the positive consequences of this is the ability to collaborate remotely. Successful collaboration can bring about substantial cost savings, removing the need for paper and decreasing travel costs. But with this positive aspect comes a worrying issue - can you to trust the collaborators to keep the information within the shared documents confidential?
There are now a number of commercial and open source solutions that can be used to effectively monitor the integrity of host environments. When understood and used correctly, these applications can be very helpful with detecting unauthorized change, conducting damage assessment, and preventing future attacks. With all that is involved in deploying such a system, there are some very important concepts that are often neglected, not understood, or not expressed in the documentation.
Australian online Linux magazine, LinuxMagAu, had a brush with mortality after a mysterious attack on the server handling the core functions of the Web property. The site's founding editor, Kimberly Shelt, initially decided to close the publication citing lack of spare time to re-build the site.
"I have sadly come to the decision that now is the time to put LinMagAu to bed," she wrote in an email to the site's patrons.
This book is part of an on-going series of books known as the Sun Blueprints Program. What this publication wants to provide are best practices for securing the Solaris Operating Environment (Solaris OE) by using the Solaris Security Toolking software.