samba, cvs, kdelibs, libtiff, mc, dia, cyrus, ImageMagik, openMosixview, kimgio,
convert-UUlib, kernel, shareutils, and mozilla. Distributors include Conectiva,
Debian, Fedora, Gentoo, Red Hat, and SuSE.Sarbanes-Oxley Act, Part I
By: Erica R. Thomas
Looking at the integrity and accountability of financial reporting has become
headline news. Widely publicized financial scandals have caused damage to investor,
employee, and customer confidence. Government and regulatory agencies have enacted
and are starting to enforce new regulations for corporate governance to restore
confidence and trust. The response from the United States government regarding
the Enron, WorldCom, and Tyco accounting scandals of the late 1990’s was the
Sarbanes-Oxley Act (The Act) of 2002. It establishes standards for maintaining
and preserving electronic and paper records in addition to the accountability
of corporate executives, employees, and auditors. The Act contains11 titles
and also established new standards for corporate accountability and penalties
of fines and imprisonment. Under the act, companies must validate financial
statements, maintain auditing practices, report on the effectiveness of the
internal controls, and assure integrity and timeliness of data.
The main purpose of the legislation is to make organizations and their executives
be held responsible for the validity of corporate reporting. The reporting requires
all companies with public interests to require executives to attest to the accuracy
of the financial conditions and disclosure of internal weaknesses. An article
written by Guardian Digital Inc. says that, “As mandated by SOX (the Sarbanes-Oxley
Act), corporations can accommodate these regulations through the design, implementation,
and maintenance of efficient and effective internal controls.”
There are many sections to the SOA that President Bush signed. According to
Mathew Bender in the book, “The Sarbanes Oxley Act of 2002 with Analysis”, SOA
contains two provisions requiring CEOs and CFOs to certify certain SEC filings.
The first section requires them to certify that annual and quarterly reports
have been reviewed by themselves, does not contain any untrue statement or omit
to state a material fact, information fairly represents the situation, and they
must disclose any deficiencies or changes to the internal controls. The second
section requires that when a report is filed, the CEO or CFO must have a written
statement saying that fully complies with the requirements and that it fairly
represents the financial and operational results. If they certify the report
knowing that it is false, they can face criminal penalties.
Part II, May 6th 2003
LinuxSecurity.com
Feature Extras:
Getting
to Know Linux Security: File Permissions – Welcome to the first
tutorial in the ‘Getting to Know Linux Security’ series. The topic explored
is Linux file permissions. It offers an easy to follow explanation of how
to read permissions, and how to set them using chmod. This guide is intended
for users new to Linux security, therefore very simple. If the feedback is
good, I’ll consider creating more complex guides for advanced users. Please
let us know what you think and how these can be improved.The
Tao of Network Security Monitoring: Beyond Intrusion Detection
– To be honest, this was one of the best books that I’ve read on network security.
Others books often dive so deeply into technical discussions, they fail to
provide any relevance to network engineers/administrators working in a corporate
environment. Budgets, deadlines, and flexibility are issues that we must all
address. The Tao of Network Security Monitoring is presented in such a way
that all of these are still relevant.Encrypting
Shell Scripts – Do you have scripts that contain sensitive information
like passwords and you pretty much depend on file permissions to keep it secure?
If so, then that type of security is good provided you keep your system secure
and some user doesn’t have a “ps -ef” loop running in an attempt to capture
that sensitive info (though some applications mask passwords in “ps” output).
Take advantage of our Linux Security discussion
list! This mailing list is for general security-related questions and comments.
To subscribe send an e-mail to security-discuss-request@linuxsecurity.com
with “subscribe” as the subject.
Thank you for reading the LinuxSecurity.com
weekly security newsletter. The purpose of this document is to provide our readers
with a quick summary of each week’s most relevant Linux security headline.
Conectiva | ||
Conectiva: squid Fixes for multiple squid vulnerabilities |
||
27th, April, 2005
|
||
Conectiva: gaim Fixes for gaim’s vulnerabilities | ||
27th, April, 2005
|
||
Conectiva: evolution Fix for Evolution vulnerability |
||
27th, April, 2005
|
||
Debian | ||
Debian: New junkbuster packages fix several vulnerabilities |
||
21st, April, 2005
|
||
Debian: New samba packages fix correct sporadic crash |
||
21st, April, 2005
|
||
Debian: New cvs packages fix unauthorised repository access |
||
27th, April, 2005
|
||
Debian: New kdelibs packages fix arbitrary code execution |
||
26th, April, 2005
|
||
Debian: New gaim packages fix denial of service |
||
27th, April, 2005
|
||
Debian: New lsh packages fix several vulnerabilities |
||
27th, April, 2005
|
||
Fedora | ||
Fedora Core 3 Update: libtiff-3.6.1-10.fc3 | ||
21st, April, 2005
|
||
Fedora Core 3 Update: mc-4.6.1-0.14.FC3 | ||
22nd, April, 2005
|
||
Fedora Core 3 Update: evolution-2.0.4-4 | ||
22nd, April, 2005
|
||
Fedora Core 3 Update: net-snmp-5.2.1-10.FC3 | ||
26th, April, 2005
|
||
Fedora Core 3 Update: dia-0.94-5.fc3 | ||
26th, April, 2005
|
||
Fedora Core 3 Update: cyrus-imapd-2.2.12-1.1.fc3 | ||
27th, April, 2005
|
||
Fedora Core 3 Update: ImageMagick-6.2.2.0-1.fc3 | ||
27th, April, 2005
|
||
Gentoo | ||
Gentoo: openMosixview Insecure temporary file creation |
||
21st, April, 2005
|
||
Gentoo: CVS Multiple vulnerabilities | ||
22nd, April, 2005
|
||
Gentoo: gettext Insecure temporary file handling |
||
22nd, April, 2005
|
||
Gentoo: RealPlayer, Helix Player Buffer overflow vulnerability |
||
22nd, April, 2005
|
||
Gentoo: KDE kimgio PCX handling buffer overflow |
||
22nd, April, 2005
|
||
Gentoo: Kommander Insecure remote script execution |
||
22nd, April, 2005
|
||
Gentoo: eGroupWare XSS and SQL injection vulnerabilities |
||
25th, April, 2005
|
||
Gentoo: Rootkit Hunter Insecure temporary file creation |
||
26th, April, 2005
|
||
Gentoo: Convert-UUlib Buffer overflow | ||
26th, April, 2005
|
||
Gentoo: xine-lib Two heap overflow vulnerabilities | ||
26th, April, 2005
|
||
Red Hat |
||
RedHat: Important: firefox security update | ||
21st, April, 2005
|
||
RedHat: Important: kernel security update | ||
22nd, April, 2005
|
||
RedHat: Important: openoffice.org security update |
||
26th, April, 2005
|
||
RedHat: Moderate: cvs security update | ||
26th, April, 2005
|
||
RedHat: Low: sharutils security update | ||
26th, April, 2005
|
||
RedHat: Important: Mozilla security update | ||
26th, April, 2005
|
||
SuSE | ||
SuSE: Mozilla Firefox, Mozilla various | ||
27th, April, 2005
|
||