• Mobile asset recovery system (need data on yearly losses)
  • Produce advisories on Red Hat Errata and Security Alerts
  • Leverage Open Source IDS (Snort) along with Open Source Vulnerability
    Assessment (Nessus) with the intention of creating an Open Source Security Event Management service
  • Open Source Log Management
  • Investigate use of OSSIM
  • Metrics on blocking (top domains, top categories, top users)
  • Discuss possible use of SE Linux for securing systems