Avoiding security blunders in Linux and IT infrastructures, part two

James Turnbull

Castle walls may stop assaults from the outside, but they do nothing to halt attacks from mutinous inhabitants inside the keep. Of course, if the castle walls are not maintained, getting in from the outside gets easier and easier over time.

In this tip, I look at common mistakes made in physical IT infrastructure security and security maintenance. In part one, I covered problems with installations and the hard-perimeter, soft-center security approach. There are other areas to consider, but I find these particular ones to be frequently overlooked or mishandled.

Read more at SearchOpenSource.com


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s