Best IT Blog

Sample Mindmap – Computer Security Policy Outline

Posted in Mindmap (100) by Guest on the January 25th, 2008
Comments Off on Sample Mindmap – Computer Security Policy Outline

Digital Rights Management Key Subjects

Posted in Information Rights Management (100),Security (1500) by Guest on the January 15th, 2008

Management of the DRM Function

  • Data Resource Management
  • Sample Charter / Mission Statement
  • Goals, Objectives and Critical Success Factors
  • Benefits of Data Resource Management
  • Enterprise-wide Data Management Process Maturity
  • Data Resource Management Job Descriptions

Data Resource Activities 

  • The Framework for Enterprise Architecture
  • Information Stewardship
  • Accountability for Information Quality
  • Repository Management
  • Building the Meta Data Repository Project Plan
  • Change Management Considerations
  • Data Modelling Fundamentals
  • Highly Effective Data Modellers

Management of Data 

  • The Concept of Data Resource Data
  • Data Security: Introduction and Overview
  • Total Information Quality Management
  • Data Sharing
  • Managing Data Disparity
  • Managing Reference Data
  • Data Element Naming Standards

Management of the Data Warehouse 

  • Data Warehousing Overview
  • Data Warehouse/Data Mart Modelling Guidelines

Implementing Business Rules 

  • Business Rules
  • Building a Business Rules System

The Complete Data Resource Manager 

  • Process Modelling
  • Data Architecture Roles in Purchased Package Environments
  • Tool Evaluation
  • The Role of the Data Administrator and the Internet
  • Data Management and the Internet
  • XML and Common Name Space
  • XML Portals as EAI Components


Comments Off on Digital Rights Management Key Subjects

Sample Mindmap – Netbios Resolution Order

Posted in Mindmap (100) by Guest on the January 12th, 2008
Comments Off on Sample Mindmap – Netbios Resolution Order

Common Referenced Related Laws, Regulations, and Policies

Posted in Compliances (1300),Networking (340),Security (1500) by Guest on the January 11th, 2008
The following Federal laws, directives, regulations provide guidance pertaining to the security automated information systems:
  • Privacy Act of 1974 (Public Law [PL] 93-579, United States Code [U.S.C.] 552A)
  • Freedom of Information Act (5 U.S.C.522)
  • Paperwork Reduction Act of 1986 (44 U.S.C. 35)
  • Electronic Communications Privacy Act of 1986 (PL 99-508)
  • Computer Fraud and Abuse Act of 1986, (PL 99-474, 18 U.S.C. 1030)
  • Information Technology Management Reform Act of 1996 (Clinger-Cohen Act) (Division E of PL 104-106, 4 U.S.C. 35)
  • Title III of the E-Government Act (PL 107-347): Federal Information Security Management Act of 2002 (FISMA)
  • Office of Management and Budget (OMB) Circular A-123, Management Accountability and Control, Attachment Section II, June 21, 1995
  • OMB Circular A-127, Financial Management Systems, revised July 23, 1993
  • OMB Circular A-130, Appendix III, Transmittal #4, Security of Federal Automated Information Resources, February 8, 1996
  • Presidential Decision Directive (PDD) 67, Continuity of Government (COG) and Continuity of Operations (COOP) Plans Practices for Securing Critical Information and Information Systems and Networks, 1988
  • Executive Order (EO) 12656, Assignment of Emergency Preparedness Responsibilities (COOP Plans), November 18, 1988, as amended by EO 13074
  • EO 13011, Federal Information Technology, July 16, 1996
  • Homeland Security Presidential Directive (HSPD) 7, December 17, 2003

FIPS PUBs, including:

  • FIPS PUB 199,  Standards for Security Categorization of Federal Information and Information Systems
  • FIPS PUB 200, Minimum Security Requirements for Federal Information and Information Systems 

NIST SPs, including:

  • NIST SP 800-18, Revision 1, Guide for Developing Security Plans for Federal Information Systems
  • NIST SP 800-37, Guide for the Security Certification and Accreditation of Federal information Systems
  • NIST SP 800-53, Recommended Security Controls for Federal Information Systems, and referenced supplemental guidance documents
  • NIST SP 800-60, Guide for Mapping types of Information and Information Systems to Security Categories


Comments Off on Common Referenced Related Laws, Regulations, and Policies