HP3000-L Archives

March 2001, Week 2

HP3000-L@RAVEN.UTC.EDU

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Joseph Rosenblatt <[log in to unmask]>
Reply To:
Joseph Rosenblatt <[log in to unmask]>
Date:
Mon, 12 Mar 2001 16:08:18 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (139 lines)
It sounds to me as if you are teaching Justin some very important lessons
i.e. as an employee you will always be underpaid and under appreciated. It's
a shame more people don't learn this lesson before they become full time
employees. This would cut down on the number of people that think they
should be CEOs by the time they are thirty. ;)
Joseph Rosenblatt
-----Original Message-----
From:   HP-3000 Systems Discussion [mailto:[log in to unmask]] On Behalf
Of Patrick Santucci
Sent:   Monday, March 12, 2001 2:32 PM
To:     [log in to unmask]
Subject:        Re: [HP3000-L] Security Policies

Before everyone flames me for abusing this poor high-school phenom, let me
make a disclaimer:

1. I do my best not to "abuse" Justin (depends on how you define it, I
guess).
2. I appreciate his talent and brightness (even though he lacks experience
and sometimes wisdom).
3. I have nothing to do with his current pay situation (though that doesn't
mean I won't in the future).

Patrick
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Patrick Santucci
HP e3000 Systems Administrator
Cornerstone Consolidated Services Group, Inc.

> -----Original Message-----
> From: Justin Garabedian [SMTP:[log in to unmask]]
> Sent: Sunday, March 11, 2001 11:04 pm
> To:   [log in to unmask]
> Subject:      Re: [HP3000-L] Security Policies
>
> Jim,
>     Thanks for suggestions!  To bad for me I cannot afford a book that
> "expensive", for I am only a poor, abused high school student that works
> only several days a week as an Operator/Jr. System Admin/Ecometry-System
> Analyst/what-ever-the-company-wants for an employer who pays me only a few
> measly nickels and dimes and would rather have me do physical inventory
> than
> use my talent writing reports or fixing system problems.  But it looks
> like
> a great book.  Say, what was the name of the paper you wrote and where can
> I
> find it?
>
>     This actually a book that I was looking at.  For anyone that wants
> more
> info, go to http://www.baselinesoft.com/ for the scoop.
>
> Thank you,
>
>   Justin R. Garabedian, Jr. HP 3000 System Admin
>   ------------------------------------------------------
>   Information Systems
>   Cornerstone Consolidated Services Group, Inc.
>   5568 West Chester Road
>   West Chester, Ohio 45069
>   Phone: (513) 603.1148
>   FAX: (513) 603.1495
>   Email: [log in to unmask]
>
> --(PJS - Think MC will buy this one??)-- ;-)
>
> -----Original Message-----
> From: Jim Knight
> To: Justin Garabedian; [log in to unmask]
> Sent: 3/11/01 10:21 PM
> Subject: RE: [HP3000-L] Security Policies
>
> Hi Justin,
>         Almost 10 years ago I wrote a paper for Interex on writing a
> security
> policy.  I have to admit I was pretty naïve back then.  I don't know if
> you
> have any money to spend, but I really like this book.  It is "expensive"
> for
> a book, but includes everything you need to create a security policy
> quick
> and efficiently.  There are probably other books out there, but this is
> one
> I have experience with and like.  Here is the amazon URL for the book:
> http://www.amazon.com/exec/obidos/ASIN/1881585069/qid=984366360/sr=1-1/r
> ef=s
> c_b_1/104-2189170-7041563
>
> Here is one sample security policy off of the net.
> http://www.ncsa.uiuc.edu/People/ncsairst/Policy.html
>
>         I'm sure you'll get other suggestions from this list.  In
> addition, the
> accounting firm that does financial audits for your company may be able
> to
> provide examples for you to work with.
>
>         One thing that I have found helpful is to divide the process
> into two
> parts, the policy and the plan.  The policy just talks about what you
> want
> to do, and the plan is how you will implement it.  This helps to keep
> you
> from getting bogged down in the details while writing the policy.  The
> policy is going to focus on what you need to protect and the plan on how
> you
> will protect it.
>
>         I hope all of this makes sense.  Let me know if you have
> questions.  Feel
> free to send me personal email since I rarely am able to make a dent
> into
> this list anymore.
>
> Jim Knight
> [log in to unmask]
>
> All,
>     Does anyone know of any good web sites with advice when writing
> system
> security policies or acceptable usage policies?  Does anyone have any
> examples of either?
>
>     We are currently looking at writing polices and modifying security
> on
> our 3000s, so if you have any "killer" tips, let me know.
>
> Thank you,
>
>   Justin R. Garabedian, Jr. HP 3000 System Admin
>   ------------------------------------------------------
>   Information Systems
>   Cornerstone Consolidated Services Group, Inc.
>   5568 West Chester Road
>   West Chester, Ohio 45069
>   Phone: (513) 603.1148
>   FAX: (513) 603.1495
>   Email: [log in to unmask]

ATOM RSS1 RSS2