po polsku


Linux: A Network Solution for Your Office




ContentsIndex




Chapter 20: Security Revisited: Personnel Security



Previous
ChapterNext
Chapter








Sections in this Chapter:

 







Access Security


 

Malicious
Programs

 




 



Network Security


 

Protective
Measures

 




 


Personnel Security
 
Summary
 
 
 


Application
Security

 
 
 
 



 

Previous
SectionNext
Section



Personnel Security




The Case of the Disgruntled Employee




Carelessness and Ignorance



Most often, security is compromised not because you're using
defective software or because your local area network has been penetrated by
a sophisticated hacker. No, the most frequent cause behind security-related
problems is people.

The Case of the Disgruntled Employee
The case of the disgruntled employee causing grave harm to your
computer systems after leaving his job has been portrayed in the media many
times. Still, small organizations and businesses often believe that they're
immune to this problem. This is not so. Even in my personal experience, I encountered
situations where a disgruntled employee left behind a "back door"
on a company's UNIX server, only to exploit it a few weeks later. His intent
was not to cause harm--he just didn't feel like "letting go."
He believed that he still had a right to access a system that he helped build.
Needless to say, his former employers disagreed.
Of course, there's no surefire way to protect against a situation
that might occur when a trusted employee leaves, short of reinstalling all your
systems from scratch. Still, a few precautionary measures, such as changing
all your system passwords, can help mitigate the risk.

Carelessness and Ignorance
Even employees with no evil intent can cause grave harm to your
systems through carelessness coupled with ignorance. Leaving behind a slip of
paper with your Linux server's dial-up telephone number and the root password
in a college cafeteria is just one of the many examples that come to mind. If
users are not educated about the importance of keeping secret passwords secret,
problems are bound to occur.




Linux: A Network Solution for Your Office




ContentsIndex




Chapter 20: Security Revisited: Personnel Security



Previous
ChapterNext
Chapter








Sections in this Chapter:

 







Access Security


 

Malicious
Programs

 




 



Network Security


 

Protective
Measures

 




 


Personnel Security
 
Summary
 
 
 


Application
Security

 
 
 
 



 

Previous
SectionNext
Section







© Copyright Macmillan USA. All rights
reserved.
  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • pajaa1981.pev.pl