Nicht aus der Schweiz? Besuchen Sie lehmanns.de
System Administration Ethics - Igor Ljubuncic, Tom Litterer

System Administration Ethics (eBook)

Ten Commandments for Security and Compliance in a Modern Cyber World
eBook Download: PDF
2019 | 1st ed.
XXXI, 290 Seiten
Apress (Verlag)
978-1-4842-4988-8 (ISBN)
Systemvoraussetzungen
62,99 inkl. MwSt
(CHF 61,50)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Successfully navigate through the ever-changing world of technology and ethics and reconcile system administration principles for separation of duty, account segmentation, administrative groups and data protection. As security breaches become more common, businesses need to protect themselves when facing ethical dilemmas in today's digital landscape. This book serves as a equitable guideline in helping system administrators, engineers - as well as their managers - on coping with the ethical challenges of technology and security in the modern data center by providing real-life stories, scenarios, and use cases from companies both large and small. 

You'll examine the problems and challenges that people working with customer data, security and system administration may face in the cyber world and review the boundaries and tools for remaining ethical in an environment where it is so easy to step over a line - intentionally or accidentally. You'll also see how to correctly deal with multiple ethical situations, problems that arise, and their potential consequences, with examples from both classic and DevOps-based environments.

Using the appropriate rules of engagement, best policies and practices, and proactive 'building/strengthening' behaviors, System Administration Ethics provides the necessary tools to securely run an ethically correct environment. 

What You'll Learn
  • The concepts of Least Privilege and Need to Know
  • Request change approval and conduct change communication
  • Follow 'Break Glass' emergency procedures
  • Code with data breaches, hacking and security violations, and proactively embrace and design for failures 
  • Build and gain trust with employees and build the right ethical culture
  • Review what managers can do to improve ethics and protect their employees

Who This Book Is For
This book's primary audience includes system administrators and information security specialists engaged with the creation, process and administration of security policies and systems. A secondary audience includes company leaders seeking to improve the security, privacy, and behavioral practices.


Igor Ljubuncic is a physicist by vocation and a Linux geek by profession. Igor comes with many years of experience in the hi-tech industry, including medical, high-performance computing, data center, cloud, and hosting fields, with emphasis on complex problem solving and the scientific method. To date, Igor's portfolio includes 15 patents, 16 books, several open-source projects, numerous articles published in leading journals and magazines, and presentations at prestigious international conferences like LinuxCon, CloudOpen, OpenStack days, IEEE events, and others. In his free time, Igor writes car reviews, fantasy novels and manages his award-winning blog, dedoimedo.com

Tom Litterer is a business leader and a future-focused thinker with three decades  of experience in the industry. Tom spent the first six years of his career as a UNIX system administrator, transitioning from novice to expert. He has since managed each of the key areas within IT, including help desk, site operations, high performance computing (HPC) services, identity and access management, lab operations, internal cloud deployment, engineering tools and licensing. He was also the  global manager of Intel's HPC servers and storage chip design environment. Tom is currently the Associate Director of Data Center and Cloud Infrastructure at Portland State University (PSU), Oregon, US.  In this role, he is responsible for all Linux, Windows, virtualization, storage, backup, and HPC services in local data centers as well as the university's cloud infrastructure.

Successfully navigate through the ever-changing world of technology and ethics and reconcile system administration principles for separation of duty, account segmentation, administrative groups and data protection. As security breaches become more common, businesses need to protect themselves when facing ethical dilemmas in today's digital landscape. This book serves as a equitable guideline in helping system administrators, engineers - as well as their managers - on coping with the ethical challenges of technology and security in the modern data center by providing real-life stories, scenarios, and use cases from companies both large and small. You'll examine the problems and challenges that people working with customer data, security and system administration may face in the cyber world and review the boundaries and tools for remaining ethical in an environment where it is so easy to step over a line - intentionally or accidentally. You'll also see howto correctly deal with multiple ethical situations, problems that arise, and their potential consequences, with examples from both classic and DevOps-based environments.Using the appropriate rules of engagement, best policies and practices, and proactive "e;building/strengthening"e; behaviors, System Administration Ethics provides the necessary tools to securely run an ethically correct environment. What You'll LearnThe concepts of Least Privilege and Need to KnowRequest change approval and conduct change communicationFollow "e;Break Glass"e; emergency proceduresCode with data breaches, hacking and security violations, and proactively embrace and design for failures Build and gain trust with employees and build the right ethical cultureReview what managers can do to improve ethics and protect their employeesWho This Book Is ForThis book's primary audience includes system administrators and information security specialists engaged with the creation, process and administration of security policies and systems. A secondary audience includes company leaders seeking to improve the security, privacy, and behavioral practices.
Erscheint lt. Verlag 30.10.2019
Zusatzinfo XXXI, 290 p. 18 illus.
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Wirtschaft Betriebswirtschaft / Management Unternehmensführung / Management
Schlagworte Behavior • Compliance • data breach • ethics • Hacking • privacy • security • system administration • Trust
ISBN-10 1-4842-4988-7 / 1484249887
ISBN-13 978-1-4842-4988-8 / 9781484249888
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 3,2 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Fachmedien Wiesbaden (Verlag)
CHF 78,15
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
CHF 41,95