| |
Security
|
|
- Analyze AIX environment from security
perspective.
- Simulate "hacker" attacks and document
security exposures.
- Identify security breaches.
- Eliminate security holes.
- Implement software and procedures to minimize
security risks.
- Implement tools and methodologies to minimize the requirement for
"root" account usage.
|
|