[3835] in WWW Security List Archive
Firewall Evaluation, JAVA, and Job Descriptions
daemon@ATHENA.MIT.EDU (Charles L. Johnson)
Wed Dec 18 09:05:26 1996
Date: Wed, 18 Dec 1996 07:27:24 -0800
From: "Charles L. Johnson" <charlesj@iquest.net>
To: www-security@ns2.rutgers.edu
Errors-To: owner-www-security@ns2.rutgers.edu
Charles L. Johnson wrote:
TO ALL;
> >
> > I am in need of your assistance. I found out yesterday that some of my business colleagues are
> > considering Checkpoint-1 for the Firewall, coupled with JAVA for security in Web development.
> >
> > I saw some traffic earlier in the year concerning evaluations of these products, but do not have stored
> > away. I just noticed the posting about a book on JAVA, so I will be ordering that. More direction and help
> > would be greatly appreciated.
> >
> > Also, If you are willing to share..... I am too...
> >
> > 1. I have been looking for and cannot find a matrix reflecting the career path of someone in Information
> > Security from entry level to VP. Therefore an editor has suggested I do the work for publication in an
> > association newsletter, which I am willing to share with all of you who participate. Here is what I am
> > collecting;
> >
> > Level Possible Experience Knowledge Responsibilities Usually
> > Title(s) yrs, edu Reports To
> >
> > Systems Management Issues:
> >
> > 2. Where in your organization does Information Security fit? What department, group, etc.
> >
> > 3. Where does the person who does userid/password administration reside? Help desk, Security group, etc.
> >
> > Regards,
> >
> > Charles L. Johnson
> > Security Administrator
> > RCI Corporation
> >
> > 'Study it forever, You'll wonder ==> Fly it once, You'll know!