Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here. |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
 |
03-17-2006, 12:47 PM
|
#1
|
Senior Member
Registered: Feb 2003
Location: Washington D.C
Posts: 2,190
Rep:
|
Vulnerabilty Assestments
I have several questions regarding security. I have formed a business and I would like to focus on network security and what services I can provide:
1 - What is performed in an application security assestment. What does it consist of?
2 - When performing a a true penetration test of a business what is involved? What does it consist of?
3 - What is the difference between a Penetration Test and a Wireless security assestment?
4 - What does ensuring data entegrity consist of? How would one achieve this ?
5 - Can anyone point me in the right direction of find an IT guideline for Health Insurance Portability & Accountability Act (HIPAA), Payment Card Industry Data Security Standard (PCI DSS) and Sarbanes-Oxley (SOX) compliancy ?
Last edited by metallica1973; 03-17-2006 at 12:56 PM.
|
|
|
03-17-2006, 03:24 PM
|
#2
|
LQ Guru
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870
|
Quote:
Originally Posted by metallica1973
I have several questions regarding security. I have formed a business and I would like to focus on network security and what services I can provide:
1 - What is performed in an application security assestment. What does it consist of?
2 - When performing a a true penetration test of a business what is involved? What does it consist of?
3 - What is the difference between a Penetration Test and a Wireless security assestment?
4 - What does ensuring data entegrity consist of? How would one achieve this ?
5 - Can anyone point me in the right direction of find an IT guideline for Health Insurance Portability & Accountability Act (HIPAA), Payment Card Industry Data Security Standard (PCI DSS) and Sarbanes-Oxley (SOX) compliancy ?
|
i find it hard to believe that someone would start a security business and THEN start asking/learning about these things... are you sure this isn't homework??? hehe...
anyways, here's some links i googled for you, it's not much but it's my  ... i'm sure others will provide more and better stuff...
http://en.wikipedia.org/wiki/HIPAA
http://en.wikipedia.org/wiki/Sarbanes-Oxley_Act
http://www.technicalinfo.net/papers/...Questions.html
http://www.penetration-testing.com/
good luck with your paper... 
Last edited by win32sux; 03-17-2006 at 03:31 PM.
|
|
|
03-17-2006, 03:46 PM
|
#3
|
Moderator
Registered: May 2001
Posts: 29,417
|
i find it hard to believe that someone would start a security business and THEN start asking/learning about these things...
Hmm, starting a business w/o getting basics right first isn't the best thing to do IMHO.
i'm sure others will provide more and better stuff...
Don't be too sure, because:
@metallica1973: now you do know where to find the list with sites that contain security news and backgrounds. You might even have read some of those sites for no particular reason just to build up knowledge. If you didn't I would suggest you do so. To get a grip on what's being done in the field: simply check your "competitors". Wrt to definitions, methodology and cases check out the SANS reading room, owasp.org and securityfocus.com. In closing HIPAA, PCI DSS and SOX are all perfect search terms. Don't get me wrong here, if you have specific questions I'd love to answer them, but asking such broad questions to me means you gotta read up first.
|
|
|
03-17-2006, 04:45 PM
|
#4
|
Senior Member
Registered: Feb 2003
Location: Washington D.C
Posts: 2,190
Original Poster
Rep:
|
All I am trying to do is to determine if I am on the right track not some idiot trying to maliciously cause destruction. I was under the impression that I could ask a professional question and get a professional anwser in this forum. I have noticed that everytime I ask a question in this arena everyone is very hestitant on give out some information in fear of creating a monster. That may be the case with some of these teenage cyborgs that dont even know what a girls is but not in my case. At least anwser this question if you are not going to awnsering the other. It is true that one needs to know how to hack in order to defend against a hacker. At least give me that. A point I would like to make for the people who do not know the meaning of running a business is and what is involved (I wont mention any names). If I dont have a skill that I need to run my business there is something called smarts in hiring someone who does.
Last edited by metallica1973; 03-19-2006 at 12:15 AM.
|
|
|
All times are GMT -5. The time now is 02:06 PM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|