The Integrity News
Vol. XI No. 14
June 1, 2002
Your Guide to Guarding Against
Internal Security Threats.
FROM DAY ONE
"Good security starts with whom you hire,
and that's why it's crucial to have a pre-
employment screening program."
BUILD SECURITY FROM
THE INSIDE OUT
"Break your world into various trust
zones, and control who's within each
zone or space."
MAKE SECURITY PART OF
"Establish a culture that values security."
WATCH FOR UNUSUAL ACTIVITY
"You can use an Intruder Detection
System, or you can use a software
product that constantly gives you a
running picture of your network."
KNOW HOW TO LET GO
"When someone leaves your company,
know how to cancel their permissions
in order to secure your network."
If you value the information and facilities
of your company as if they were actually
cash money, then think about how casinos
protect their assets. Consider using:
o Physical Surveillance
o Security Badges
o User Account Monitoring
o Daily Log Reviews
o Checks and Balances
o Location-Based Limited Access
o Strict Access to Data Centers
o Limited Access to the
For the security of your information,
there are administrative software
tools in four categories:
1. Authentication Software
2. Authorization Software
3. Administration Software
4. Audit Software