po polsku
Linux: A Network Solution for Your Office
ContentsIndex
Chapter 20: Security Revisited: Personnel Security
Previous
ChapterNext
Chapter
Sections in this Chapter:
Access Security
Malicious
Programs
Network Security
Protective
Measures
Personnel Security
Summary
Application
Security
Previous
SectionNext
Section
Personnel Security
The Case of the Disgruntled Employee
Carelessness and Ignorance
Most often, security is compromised not because you're using
defective software or because your local area network has been penetrated by
a sophisticated hacker. No, the most frequent cause behind security-related
problems is people.
The Case of the Disgruntled Employee
The case of the disgruntled employee causing grave harm to your
computer systems after leaving his job has been portrayed in the media many
times. Still, small organizations and businesses often believe that they're
immune to this problem. This is not so. Even in my personal experience, I encountered
situations where a disgruntled employee left behind a "back door"
on a company's UNIX server, only to exploit it a few weeks later. His intent
was not to cause harm--he just didn't feel like "letting go."
He believed that he still had a right to access a system that he helped build.
Needless to say, his former employers disagreed.
Of course, there's no surefire way to protect against a situation
that might occur when a trusted employee leaves, short of reinstalling all your
systems from scratch. Still, a few precautionary measures, such as changing
all your system passwords, can help mitigate the risk.
Carelessness and Ignorance
Even employees with no evil intent can cause grave harm to your
systems through carelessness coupled with ignorance. Leaving behind a slip of
paper with your Linux server's dial-up telephone number and the root password
in a college cafeteria is just one of the many examples that come to mind. If
users are not educated about the importance of keeping secret passwords secret,
problems are bound to occur.
Linux: A Network Solution for Your Office
ContentsIndex
Chapter 20: Security Revisited: Personnel Security
Previous
ChapterNext
Chapter
Sections in this Chapter:
Access Security
Malicious
Programs
Network Security
Protective
Measures
Personnel Security
Summary
Application
Security
Previous
SectionNext
Section
© Copyright Macmillan USA. All rights
reserved.
zanotowane.pldoc.pisz.plpdf.pisz.plpajaa1981.pev.pl