Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.


Welcome to the Unix-like topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now

This Topic Has:
230 Members
0 Online
6186 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 10 total

Must be a Topic member to contribute
View All »
I welcome view points on the need for Anti Virus solutions for Servers running Unix based OS.
C.M.Thomas | 3/25/2018 1:34:49 PM | COMMENTS(11)
What is your view in terms of Unix-like vs. Windows security? Quora discussion here seems interesting:  Also, how it affects audit?
Dragan Pleskonjic | 11/10/2017 1:22:41 PM | COMMENTS(0)
HiSecuring your Linux server is important to protect your data, intellectual property, and time, from the hands of crackers (hackers). The system administrator is responsible for security Linux box. In this first part of a Linux server security series, I ...
ZiedBouziri | 8/21/2017 2:08:53 AM | COMMENTS(0)
Hi Everyone, I recently did an audit for access rights for an application based on Linux system. The application was created many years back(around 10 yrs).I found couple of service accounts that were active and as best practice recommended changing the ...
Roshz | 4/13/2017 2:20:29 PM | COMMENTS(3)
Anyone know of a good way to securely erase a Linux server for reuse? What method do you use and how long does it take?
Laura Rayle | 9/20/2016 12:32:06 PM | COMMENTS(2)
I am testing an HP-UX system and found the sam_exec user has a UID of 0. So far I am told this account is set up this way by default when the system administrator sets up remote SAM. However, they use SMH not SAM? They do have the account disabled in /...
fgwilliams | 7/10/2015 9:17:45 AM | COMMENTS(3)

Documents & Publications: 5 total

Events & Online Learning: 1 total

13 Aug 2018
ISACA International Event
Nashville, Tennessee, US
2018 GRC Conference - 13-15 August , Nashville, TN. Explore the future of Governance Risk and Control through expert-led workshops and sessions developed by the IIA and ISACA. Register early for our GRC learning tracks.

Journal Articles: 2 total

Volume 2, 2018
by Ed Moyle
Sometimes leveraging what is available can get us around obstacles that would otherwise be crippling to accomplishing our goals.
Volume 4, 2015
by Muhammad Mushfiqur Rahman, CISA, CEH, CHFI, CCNA, ISO 27001 LA, ITIL V3, MCITP, MCP, MCSE, MCTS, OCP, SCSA
Server auditing is an important task to ensure platform-level security in an IT infrastructure and to ensure the proper configuration of Linux server security.

Wikis: 3 total

Blog Posts: 1 total

Must be a Topic member to view blog posts
Information Security and Privacy is hot issue at present time. Number of security breaches is rapidly increasing.  In case of late detection, costs of breaches are skyrocketing. In the same time Artificial Intelligence (AI), Machine Learning (ML) are fast...
Posted By : Dragan Pleskonjic | 0 comments