× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Security officer and security auditor do not necessarily have to be technition. 
 Most auditors are not.  The goal is to have two trusted people one that 
changes security for the business needs and one who audits the security 
officer.  They do have to be technical enough to know how to secure your 
systems and how to audit the activities on your system.
 
Christopher Bipes
Information Services Director
CrossCheck, Inc.
 
707.586.0551, ext. 1102
707.585.5700 FAX
 
Chris.Bipes@xxxxxxxxxxxxxxx
www.Cross-Check.com <http://www.Cross-Check.com> 
 
Notice of Confidentiality: This e-mail, and any attachments thereto, is 
intended only for use by the addressee(s) named herein and may contain legally 
privileged and/or confidential information. If you are not the intended 
recipient of this e-mail, you are hereby notified that any dissemination, 
distribution or copying of this e-mail, and any attachments thereto, is 
strictly prohibited. If you have received this e-mail in error, please 
immediately notify me by e-mail (by replying to this message) or telephone 
(noted above) and permanently delete the original and any copy of any e-mail 
and any printout thereof. Thank you for your cooperation with respect to this 
matter.
 

________________________________

From: midrange-l-bounces@xxxxxxxxxxxx on behalf of Al Mac
Sent: Sun 12/11/2005 5:14 PM
To: Midrange Systems Technical Discussion
Subject: RE: PC5250 Telnet - security and setup



Is it SOX compliant to trust people?

I thought the goal was to remove technicians from the equation, which is
probably impossible, since new technologies constantly come along that need
people to understand how to do protection when using them.

>Not so much on the network but on the servers.  SSL setup is very CPU
>intensive.  What it boils down to is you have to trust people in my
>position to keep your network and data secure.  Some one has to have the
>keys to the Kingdom, hopefully someone else has the key to the journals.
>
>
>Christopher Bipes
>Information Services Director
>CrossCheck, Inc.
>
>707.586.0551, ext. 1102
>707.585.5700 FAX
>
>Chris.Bipes@xxxxxxxxxxxxxxx
>www.Cross-Check.com
>
>-----Original Message-----
>From: Colin Williams
>
>Chris,
>
>fair enough, makes sense.
>
>Just never seen SSL used on an internal network. From what you say from
>a
>security point of view, that would mean that all network traffic would
>have
>to be encrypted, to protect the CEOs password, now how much additional
>load
>is that on a network?


--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list
To post a message email: MIDRANGE-L@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/midrange-l.




As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.