Re: help w/ security policies!

2002-03-25 Thread Kanikkannanl PN-149709 Dept-corp Audit Div Desg-Asst.Manager 1/421037 Ph-43983/45283
Hi I too searched in vain for a sample information security policy. But I can give you some tip based on my expereince, This is my view of how an information security policy will look like. An organization's information security policy is a loosely coupled set of several policies. Ideally each

Re: ISO 17799

2002-03-07 Thread Kanikkannanl PN-149709 Dept-corp Audit Div Desg-Asst.Manager 1/421037 Ph-43983/45283
It does not come for free. My company paid for it and procured the approx 80 pages document from ISO itself. Further, it is exact replica of BS 7799: Part 2. There are other eqully good security frameworks that are for free. You can try them. Here they are, (1) COBIT 3rd Edition - available at

Re: POP3

2002-02-27 Thread Kanikkannanl PN-149709 Dept-corp Audit Div Desg-Asst.Manager 1/421037 Ph-43983/45283
Gauntlet FW discourages POP3 since contnet scanning for incoming mails is not supported by their POP3 proxy. You need to know whether content scanning(among other risks) is possible for POP3 access via Checkpoint. - Kani On 23 Feb 2002 [EMAIL PROTECTED] wrote: My users want me to to

Re: Unix Security Standards, books, tools...

2001-12-02 Thread Kanikkannanl PN-149709 Dept-corp Audit Div Desg-Asst.Manager 1/421037 Ph-43983/45283
For all the three quesions, Practical Unix Internet Security by Simson Garfinkel and Gene Spafford is the answer. It is published by O Reilly. It has a Unix security check list at the end of the book. Also it gives list of tools. - Kani On Wed, 28 Nov 2001, tony toni wrote: These are my

Re: iNotes Security

2001-11-26 Thread Kanikkannanl PN-149709 Dept-corp Audit Div Desg-Asst.Manager 1/421037 Ph-43983/45283
Hi I was going through a Notes and Domino security related interview in Iris Today Webzine at www.notes.net Although it does not cover iNotes per se, here is a question which talks of iNotes: --- Begin Quote --- Have products like iNotes Web Access presented different security