Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Share this Page URL
Help

References > References - Pg. 148

148 Chapter 6 Log management, application management, user management, system monitoring, and backup operations are just some of the roles that can be separated. Forced Vacations Especially when duties are appropriately separated, unannounced forced vacations are a powerful way to bring fresh perspectives to security tasks. It's also an effective deterrent to internal fraud or mismanagement of security responsibilities. A more robust set of requirements for organizational security comes from the Information Security Management Maturity Model, including its concepts of transparency, partitioning, separation, rotation, and supervision of responsibilities [9]. References [1] Microsoft. Glossary of Networking Terms for Visio IT Professionals, http://technet.microsoft.com/en-us/ library/cc751329.aspx#XSLTsection142121120120; n.d. [accessed September 22, 2008, from Microsoft TechNet]. [2] The Open Group. The Single Unix Specification, www.unix.org/what_is_unix/single_unix_specification. html; n.d. [accessed September 22, 2008, from What Is Unix]. [3] Raymond ES. The Cathedral and the Bazaar, www.catb.org/esr/writings/cathedral-bazaar/cathedral-bazaar/ index.html; September 11, 2000 [accessed September 22, 2008, from Eric S. Raymond's homepage]. [4] Lundqvist A. Image:Gldt, http://en.wikipedia.org/wiki/Image:Gldt.svg; May 12, 2008 [accessed October 6, 2008, from Wikipedia]. [5] Richard Stevens W. Advanced Programming in the UNIX Environment. Reading: Addison-Wesley; 1992. [6] Richard Stevens W. Advanced Programming in the UNIX Environment. Reading: Addison-Wesley; 1992. [7] Schneier B. Real-World Passwords, www.schneier.com/blog/archives/2006/12/realworld_passw.html; December 14, 2006 [accessed October 9, 2008, from Schneier on Security]. [8] Insecure.Org. Top 100 Network Security Tools, http://sectools.org; 2008 [accessed October 9, 2008]. [9] ISECOM. Security Operations Maturity Architecture, www.isecom.org/soma; 2008 [accessed October 9, 2008, from ISECOM]. [10] Hutton M. Image: Unix History, retrieved October 6, 2008, from Wikipedia: http://enwikipedia.org/wiki/ Image:Unix_history-simple.svg; July 9, 2008. www.syngress.com