New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 981
Comments: 19
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image ntwrk: Commentaries: System administrators image
Networks
System administrators -- the security manager's untapped resource
By Crystal Ferraro,
SearchSecurity.com
Site Editor
28 Oct 2003 | SearchSecurity.com

It's no secret that enterprise security departments are overworked and understaffed. The key, industry experts say, is to properly arm your first line of defense -– your general IT staff.

Making sure [security and IT] work together is the single most important thing you can do to secure your organization, said security expert Jeff Posluns at Information Security magazine's recent Security Decisions conference. Posluns is founder of Montreal-based information security consulting and privacy firm SecuritySage Inc.

When security departments enlist the help of admins, [they] will actually be able to secure [their] systems. Without it, it's next to impossible, said Ed Skoudis, security consultant with International Network Services.

The size of a security group in any organization is usually out of proportion with the number of end users it must serve. A group of 10 to 20 security professionals cannot be expected to secure systems and applications for thousands of end users. This is where system administrators come in.

Sysadmins are responsible for the care and feeding of the machines on a daily basis. [They] are your first line of security, whether you want to depend on them or not, Skoudis said.

Many security skills are inherent to what system administrators are already doing. There are security functions within all IT jobs, Posluns said. In fact, understanding the difference between IT and security professionals can be difficult, from a hiring standpoint. Ninety percent of the time it's going to be one person with overlap of these skills, he said.

Typical security-related tasks for an IT professional include patching systems, monitoring system logs, maintaining backup systems and following security rules. A security professional, on the other hand, should be capable of configuring for security, administrating security, understanding patches, handling security documentation and enforcing security rules.

Communication provides a bridge between the security and IT departments. For example, the decision to deploy a patch should be made by security staff, who then turn to the system admins and say, 'Here's an issue; please apply the patch,' Skoudis said.

Unfortunately, this isn't always the case. Skoudis said he doesn't often see cooperation between system admins and security staff in his client companies, which include large financial institutions, health care organizations and government agencies. Seldom do they get into the issue of security for just rank-and-file IT, he said.

System admins should be held accountable for two key areas of security: keeping systems patched and looking for anomalous behavior, Skoudis said. They should be familiar with how to patch -– from generic patching practices to the specific tools used by their organizations –- and understand what kind of anomalous behavior indicates an intrusion on specific machines.

When hiring IT people, an important thing to keep in mind is, 'What security skills do they have?' Posluns said. When evaluating resumes, look for IT-specific responsibilities with security functions.

Mike Chapple, chief information officer of Miami-based marketing consultancy Brand Institute Inc., said security skills are always considered when he's interviewing applicants. Because security is a detail-oriented job, he looks for people who pay attention to detail. For those who will contribute to strategy-oriented security tasks such as developing policies, Chapple looks for good critical thinking, reasoning and analysis skills.

Managers should also consider the certifications that applicants hold. While certifications may not indicate expertise in general security strategy, people who hold certs may be appropriate for your first line of defense. This can be particularly true of vendor certs.

Most of the time, installing and operating a product is going to be an IT function, Posluns said. However, if a system admin doesn't know the technology in detail, he won't be able to apply an organization's security policies. This is where vendor-specific certifications can be helpful. For example, a Microsoft Certified Systems Engineer (MCSE) might be able to take care of Microsoft security in your enterprise.

FEEDBACK: As a network or system administrator, how much of your duties are occupied by security?
Send your feedback to the SearchSecurity.com news team.

techtarget
Posted on Wednesday, 29 October 2003 @ 04:20:00 EST by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· Microsoft
· HotScripts
· Apple
· Linux Manuals
· W3 Consortium
· More about Networks
· News by phoenix22


Most read story about Networks:
D-Link DSL-300G/DSL-300G+ Default Password Vulnerability

image
Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register