|
||
October 25, 2011 - Vol 1, Issue 2
|
||
|
||
|
Feature Article
By Dan Riehl Have your sensitive database files been stolen today?   How can you tell? Our great IBM i (iSeries and AS/400) has long been considered a security strongbox—a hacker's worst nightmare. Some even consider it to be unhackable. This perception has caused some of us to become complacent in our due diligence related to system security. But security through perceived obscurity is insufficient protection in a world of wily and well-financed cyber criminals and those malicious insiders. According to the Open Security Foundation Year-to-Date 2011, a total of 126,749,634 people have had their personal information hacked, stolen, lost, or misplaced. Hundreds of computer-related data thefts occur every year—often one or more per day. To view those of public record, you can visit the OSF's Data Loss Database. According to their Data Loss Database's published list of compromised companies, we can tell that some of these incidents are occurring at IBM i shops, both large and small. |
|
In This Issue
Invisible IBM i Data Access Quick Links
SecureMyi Security Website This Issue Sponsors
Platinum Sponsor |
IBM i Security and Audit ResourcesSecurity Videos from Securemyi.com Security Training from the 400 School IBM i Security Reference - IBM i 6.1 IBM i Security Reference - IBM i 7.1 |
|
IBM i Security News Bytes
Oct 14, 2011 - SkyView Partners
Oct 18, 2011 - Townsend Security
Oct 25, 2011 - The 400 School, Inc. and SecureMyi.com IBM i Security Calendar of EventsThe "EASI - COMMON" i Power Security RoadshowOct 25, 2011 Gent, Netherlands Oct 27, 2011 Luxembourg Oct 27 - Midrange Solutions and Enforcive - Webinar: Must have IBM i Security Reports Jan 17-20 - The 400 School - Live Online Security Workshop May 6-9 - COMMON-A User Group - Annual Conference and Expo - Anaheim, CA |
|
|
Featured YouTube Video
|
||
Security ShortsQuick Reporting on User ProfilesWhen you need to perform quick analysis on your user profiles, here are some tips. First create a file containing information about all of your user profiles. This will be a snapshot of your current user profiles. You can create this file of users by using the following command. DSPUSRPRF USRPRF(*ALL) OUTPUT(*OUTFILE) OUTFILE(LibraryName/FileName) Where LibraryName and Filename are your selected values. Now, using IBM i Access for Windows file transfer, you can simply download the file into Excel and slice and dice the user attributes to your heart's content. If you want to run some quick reports, you can use the RUNQRY(Run Query) command. One nice thing about using RUNQRY is that you can perform record selection, and optionally specify that you want a printed report, or display to your screen. Enter the following command to be prompted for record selection criteria: RUNQRY QRY(*NONE) QRYFILE((MyLibrary/MyFile)) RCDSLT(*YES) Here are some nice record selections you can choose Users that have not signed on since July 1, 2011 UPPSOD LT '110701' Users will *ALLOBJ Special Authority UPSPAU LIKE '%ALLOBJ%' Users with Action Auditing Values(e.g. AUDLVL(*CMD)) UPAUDL NE '*NONE' |
Sponsored Links
IBM i Security Services from SecureMyi
|
|
|
||
Send your IBM i Security Related News and Events! Advertise in SecureMyi.com Security Newsletter Copyright 2011 - SecureMyi.com, all rights reserved SecureMyi.com | St Louis MO 63017 |