System Administration Ethics : Ten Commandments for Security and Compliance in a Modern Cyber World / Igor Ljubuncic, Tom Litterer.
2019
TK5105.878 .L58 2019
Linked e-resources
Linked Resource
Online Access
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
System Administration Ethics : Ten Commandments for Security and Compliance in a Modern Cyber World / Igor Ljubuncic, Tom Litterer.
Author
Ljubuncic, Igor, author.
ISBN
9781484249888 (electronic book)
1484249887 (electronic book)
1484249887 (electronic book)
Published
Berkeley, CA : APress, [2019]
Language
English
Description
1 online resource (xxx, 290 pages) : illustrations
Other Standard Identifiers
10.1007/978-1-4842-4
Call Number
TK5105.878 .L58 2019
Dewey Decimal Classification
174/.9004
005.8
005.8
Summary
Successfully navigate through the ever-changing world of technology and ethics and reconcile system administration principles for separation of duty, account segmentation, administrative groups and data protection. As security breaches become more common, businesses need to protect themselves when facing ethical dilemmas in todays digital landscape. This book serves as a equitable guideline in helping system administrators, engineers - as well as their managers - on coping with the ethical challenges of technology and security in the modern data center by providing real-life stories, scenarios, and use cases from companies both large and small. You'll examine the problems and challenges that people working with customer data, security and system administration may face in the cyber world and review the boundaries and tools for remaining ethical in an environment where it is so easy to step over a line - intentionally or accidentally. You'll also see how to correctly deal with multiple ethical situations, problems that arise, and their potential consequences, with examples from both classic and DevOps-based environments. Using the appropriate rules of engagement, best policies and practices, and proactive "building/strengthening" behaviors, System Administration Ethics provides the necessary tools to securely run an ethically correct environment.
Note
Includes index.
Access Note
Access limited to authorized users.
Source of Description
Description based on online resource; title from digital title page (viewed on November 12, 2019).
Added Author
Litterer, Tom.
Linked Resources
Online Access
Record Appears in
Online Resources > Ebooks
All Resources
All Resources
Table of Contents
Chapter 1: In the Beginning
Chapter 2: Separate Roles
Chapter 3: Respect Privacy
Chapter 4: Do Not Change Data
Chapter 5: Don't Steal (Intellectual Property)
Chapter 6: Don't Steal (Computers)
Chapter 7: Do Not Go Where You Are Not Wanted
Chapter 8: Follow Procedures and Get Out
Chapter 9: Communicate Change
Chapter 10: Do No Harm
Chapter 11: Break Glass.
Chapter 2: Separate Roles
Chapter 3: Respect Privacy
Chapter 4: Do Not Change Data
Chapter 5: Don't Steal (Intellectual Property)
Chapter 6: Don't Steal (Computers)
Chapter 7: Do Not Go Where You Are Not Wanted
Chapter 8: Follow Procedures and Get Out
Chapter 9: Communicate Change
Chapter 10: Do No Harm
Chapter 11: Break Glass.