Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact firstname.lastname@example.org.
Blackboard Learn (Bb Learn) is an application suite providing educational technology
to facilitate online, web based learning. It is typical to see Bb Learn hosting courses and
content. Common add-ons include the Community and Content systems which are
This paper discusses the differences in system configuration, management and security between some of the most common versions of UNIX (Red Hat Linux, Solaris, HP-UX and AIX), including management and security tools available on these systems.
This document is designed to assist auditors of publicly traded companies and Security Exchange Commission (SEC) registrants to comply with the Sarbanes- Oxley act ("the act") by reviewing the generally accepted IT control framework called Cobit-12 and applying it towards a Unix environment.
This paper discusses the procedures necessary for securing an installation of Red Hat Enterprise Server 2.1 in support of a root certificate authority that will eventually function in the Higher Education Bridge Certificate Authority.
This paper analyzes the threads and describe the security involved in the X Window Systems. It takes a practical overview of the X Windows security to emphasize the risks and indicate the measurements that must be taken.
By: John P. Belliveau (posted on October 31, 2003)
This paper discusses the new International Business Machines (IBM) Corporation environment known as Cluster 1600, the software at the heart of the environment, and the security features of this software.
Although all parts of the backup strategy are equally important, this paper will focus on the backup script and will detail a flexible backup script that uses built-in Solaris software tools which create a reliable local backup of a Solaris machine running Oracle.
This paper discusses the example of an OpenBSD web server that needs to be monitored by an OpenBSD NMS using the Multi Router Traffic Grapher (MRTG). MRTG is a time-tested and flexible monitoring tool.
This paper intends to show how to setup a stable and secure small network, while keeping everything in house. I will cover setting up a small network and essential services for network connectivity and functionality.
The purpose of this paper is to confirm the existence of a security vulnerability relating to the network access of our AIX servers, demonstrate a viable means to overcome it, and to verify that the solution has truly eliminated the exposure.