Hitting the Bull's Eye

    Date15 Sep 2000
    3362
    Posted ByAnthony Pell
    For those of you looking for information on creating some structure for change controls and performing security updates in your organization... "Most of the technical vulnerabilities discovered when performing a systems audit or penetration test are the result of faulty administration . . . For those of you looking for information on creating some structure for change controls and performing security updates in your organization... "Most of the technical vulnerabilities discovered when performing a systems audit or penetration test are the result of faulty administration practices and/or flawed software. Beyond these technical issues, organizational weaknesses also lie in associated physical security and internal security practices. Taken together, these vulnerabilities place many organizations in a position of high security risk."
    You are not authorised to post comments.

    LinuxSecurity Poll

    Do you reuse passwords across multiple accounts?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    13
    radio
    [{"id":"55","title":"Yes","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"56","title":"No","votes":"0","type":"x","order":"2","pct":0,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.