You are here: IT-Observer » Press Releases RSS | White Papers |   

Linux Security, Audit And Control Guidance Featured In New Book From Information Systems Audit And Control Association





Rolling Meadows, IL, USA (21 July 2005)—More than 10 years after its debut, Linux has matured from a student hobby to a highly respected platform used by major organizations worldwide. Because of this growing popularity and increased legislation requiring tight controls over IT, the Information Systems Audit and Control Association (ISACA) has issued a new publication with detailed guidance on security, audit and control of Linux.

Linux Security, Audit and Control Features offers practical tools and techniques for addressing Linux vulnerabilities, audit planning, business continuity, disaster recovery and other security and control issues. Security issues related to popular Linux applications, such as Sendmail, Apache, BIND and LDAP, are covered. Also included are sample reports for a Linux security audit and a detailed questionnaire covering physical, operating system, network, user and group, file system and application security.

The publication also describes how to benchmark security of Linux installations against the well-known international standards Control Objectives for Information and related Technology (COBIT) and ISO 17799.

“To help security professionals put this material to use immediately at their companies, we have based many of the recommendations on our own practical experience working with many large and medium enterprises,” said the book’s author, K. K. Mookhey, founder-CTO, Network Intelligence India Pvt Ltd. “Readers are introduced to several types of Linux deployments at a hypothetical organization, XYZ Inc., including gateways, firewalls, web servers, databases and file servers.”

Linux Security, Audit and Control Features is available at the ISACA Bookstore (www.isaca.org/bookstore) for US $50 or as a download for US $30.

About ISACA
With more than 47,000 members who live and work in more than 140 countries, the Information Systems Audit and Control Association® (ISACA®) (www.isaca.org) is a recognized worldwide leader in IT governance, control, security and assurance. Founded in 1969, ISACA sponsors international conferences, publishes the Information Systems Control Journal®, develops international information systems auditing and control standards, and administers the globally respected Certified Information Systems Auditor™ (CISA®) designation, earned by more than 40,000 professionals since inception, and the Certified Information Security Manager® (CISM®) designation, a groundbreaking credential earned by 5,200 professionals in its first three years.

Prevent data theft & viruses through network connected USB sticks, PDAs & media players. Control user access to endpoint connections with GFI EndPointSecurity - Free trial!

Visit GFI Security Software page for more information.

 

FREE IP PBX: 3CX VOIP Phone System for Windows. No timeouts or limitations

 

Latest News

5 laptop security tips
20.07.07  Laptop theft is a huge problem.

Essential Bluetooth hacking tools
25.05.07  Bluetooth provides an easy way for a wide range of mobile devices to communicate with each other without the need for cables or wires.

DEP for IE7 in Vista
22.05.07  Security tips blog, security-hacks, has posted details on how to enable DEP for Internet Explorer 7 in Vista.

SMB over SSH: Secure File Sharing
18.05.07  Security tips blog, security-hacks, has published an simple guide to share files securely in heterogeneous networks.

Avoid data leaks by clearing the page file
14.05.07  Security-Hacks publishes a useful tip to avoid potential data leaks when you run out of memory.

How to set Master Password in Firefox
11.05.07  Nowadays many web sites require you to type a user name and password before you can enter the site.

How to test your firewall?
10.05.07  Security tips blog, Security-Hacks, has published a compilation of tools to test your firewall: "We’ve compiled a list of tools we believe will be of value to both home users and advance users.

Copyright © IT-Observer Online Publication 2000 - 2007 Top | RSS Feeds | About Us   
Site Meter