Author: Benjamin D. Thomas
wu-ftpd, sharutils, util-linux, words, gaim, e2fsprogs, subversion, ipsec-tools,
libexif, htdig, grip, gtk2, tetex, curl, gdk-pixbuf, and XFree86. The distributors
include Conectiva, Debian, Fedora, Gentoo, Mandrake, Red Hat, and SuSE.Measuring Security IT Success
In a time where budgets are constrained and Internet threats are
on the rise, it is important for organizations to invest in network
security applications that will not only provide them with powerful
functionality but also a rapid return on investment.
In most organizations IT success is generally calculated through
effectiveness, resource usage and, most importantly, how quickly
the investment can be returned. To correctly quantify the ROI of
information technology, organizations usually measure cost savings
and increased profits since the initial implementation.
Additionally, ROI can also be affected based on the overall
impact the investment has on employee productivity and overall
work environment of the company.
With regards to security IT purchases, however, it is much more
difficult to calculate an accurate ROI. When it comes to securing
a corporate network, it is nearly impossible to assign a dollar
amount to the level of security necessary to keep organizations
safe from increasing Internet threats. Making incorrect decisions
in this area could lead to an exhaustion of resources or an
oversight in specific areas needing protection, potentially
resulting in debilitating and costly security breaches.
To avoid such situations, it is essential that all organizations
invest in a solid infrastructure with flexibility and room for
future expansion. In addition, leveraging open source solutions
consistently deliver greater ROI, substantially increase
security protection, and deliver better flexibility. Such an
investment will fundamentally change how information is
managed and present results in a more quantifiable metric
when presenting to them management.
Dave Wreski
CEO Guardian Digital, Inc
http://www.guardiandigital.com
LinuxSecurity.com
Feature Extras:Getting
to Know Linux Security: File Permissions – Welcome to the first
tutorial in the ‘Getting to Know Linux Security’ series. The topic explored
is Linux file permissions. It offers an easy to follow explanation of how
to read permissions, and how to set them using chmod. This guide is intended
for users new to Linux security, therefore very simple. If the feedback is
good, I’ll consider creating more complex guides for advanced users. Please
let us know what you think and how these can be improved.The
Tao of Network Security Monitoring: Beyond Intrusion Detection
– To be honest, this was one of the best books that I’ve read on network security.
Others books often dive so deeply into technical discussions, they fail to
provide any relevance to network engineers/administrators working in a corporate
environment. Budgets, deadlines, and flexibility are issues that we must all
address. The Tao of Network Security Monitoring is presented in such a way
that all of these are still relevant.Encrypting
Shell Scripts – Do you have scripts that contain sensitive information
like passwords and you pretty much depend on file permissions to keep it secure?
If so, then that type of security is good provided you keep your system secure
and some user doesn’t have a “ps -ef” loop running in an attempt to capture
that sensitive info (though some applications mask passwords in “ps” output).
Take advantage of our Linux Security discussion
list! This mailing list is for general security-related questions and comments.
To subscribe send an e-mail to security-discuss-request@linuxsecurity.com
with “subscribe” as the subject.
Thank you for reading the LinuxSecurity.com
weekly security newsletter. The purpose of this document is to provide our readers
with a quick summary of each week’s most relevant Linux security headline.
Conectiva | ||
Conectiva: kernel Kernel fixes | ||
31st, March, 2005
|
||
Conectiva: MySQL Fixes for several mysql vulnerabilities |
||
4th, April, 2005
|
||
Debian | ||
Debian: New samba packages fix arbitrary code execution |
||
31st, March, 2005
|
||
Debian: New ImageMagick packages fix several vulnerabilities |
||
1st, April, 2005
|
||
Debian: New krb5 packages fix arbitrary code execution |
||
1st, April, 2005
|
||
Debian: New remstats packages fix several vulnerabilities |
||
4th, April, 2005
|
||
Debian: New wu-ftpd packages fix denial of service |
||
4th, April, 2005
|
||
Fedora | ||
Fedora Core 2 Update: sharutils-4.2.1-18.1.FC2 | ||
1st, April, 2005
|
||
Fedora Core 3 Update: sharutils-4.2.1-22.1.FC3 | ||
1st, April, 2005
|
||
Fedora Core 3 Update: util-linux-2.12a-21 | ||
4th, April, 2005
|
||
Fedora Core 3 Update: util-linux-2.12a-23 | ||
4th, April, 2005
|
||
Fedora Core 3 Update: words-3.0-2.2 | ||
4th, April, 2005
|
||
Fedora Core 2 Update: gaim-1.2.1-1.fc2 | ||
5th, April, 2005
|
||
Fedora Core 3 Update: gaim-1.2.1-1.fc3 | ||
5th, April, 2005
|
||
Fedora Core 3 Update: e2fsprogs-1.36-1.FC3.1 | ||
5th, April, 2005
|
||
Fedora Core 3 Update: system-config-printer-0.6.116.1.4-1 | ||
5th, April, 2005
|
||
Fedora Core 3 Update: mysql-3.23.58-16.FC3.1 | ||
5th, April, 2005
|
||
Fedora Core 2 Update: mysql-3.23.58-16.FC2.1 | ||
5th, April, 2005
|
||
Fedora Core 3 Update: subversion-1.1.4-1.1 | ||
6th, April, 2005
|
||
Gentoo | ||
Gentoo: Gaim Denial of Service issues | ||
6th, April, 2005
|
||
Gentoo: sharutils Insecure temporary file creation |
||
6th, April, 2005
|
||
Mandrake | ||
Mandrake: Updated ipsec-tools packages | ||
31st, March, 2005
|
||
Mandrake: Updated libexif packages fix | ||
31st, March, 2005
|
||
Mandrake: Updated htdig packages fix | ||
31st, March, 2005
|
||
Mandrake: Updated ImageMagick packages | ||
1st, April, 2005
|
||
Mandrake: Updated grip packages fix | ||
1st, April, 2005
|
||
Red Hat |
||
RedHat: Important: gtk2 security update | ||
1st, April, 2005
|
||
RedHat: Moderate: tetex security update | ||
1st, April, 2005
|
||
RedHat: Low: curl security update | ||
5th, April, 2005
|
||
RedHat: Important: gdk-pixbuf security update |
||
5th, April, 2005
|
||
RedHat: Important: mysql-server security update |
||
5th, April, 2005
|
||
RedHat: Moderate: XFree86 security update | ||
6th, April, 2005
|
||
RedHat: Moderate: kdelibs security update | ||
6th, April, 2005
|
||
SuSE | ||
SuSE: ipsec-tools remote denial of service | ||
31st, March, 2005
|
||
SuSE: kernel local privilege escalation | ||
5th, April, 2005
|
||