Best IT Documents.com Blog


Powerpoint – COBIT ISO 17799 and ITIL

Comments Off on Powerpoint – COBIT ISO 17799 and ITIL

Sample Project – Knowledge Discovery Verification Approach

Posted in Business (600) by Guest on the January 29th, 2013

Sample Project – Knowledge Discovery Verification Approach

“Managed Service Provider” approach to Knowledge Discovery (KD) verification relies on a combination of “In-Process” Checkpoints and “Transition Completion” Assessment”. These are described below. 

Activity

Description

  In-Process Checkpoints
  • Client sign-off on KT plan, goals, and timelines (end of “Project Initiation”)
  • Document reviews to assess KT accuracy (for each stage of the “KT cycle”)
  • Review of Transition Plan and Steady-State Plans (for entry to “Transition”)
  • Review of Draft Service Levels and Metrics (for entry to “Transition”)
  • Baseline documents, processes, and plans for steady-state (in “Transition”)
Transition Completion Assessment
  • Reverse KT: Reverse KT stage wherein the “Managed Service Provider” team delivers process feedback and classroom sessions to the original client team on the entire scope of the outsourced engagement. This stage involves a series of review meetings, presentations and walkthroughs in which the “Managed Service Provider” team demonstrates to the client’s complete confidence that “Managed Service Provider”’ has all the requisite knowledge to take over complete ownership of operations.
  • Steady-State / Offshore Simulation: The KT team simulates “steady-state” operations towards the end of “Transition” stage – to assess to the completion of KT and readiness of the “Managed Service Provider” team for steady-state operations. This includes “Offshore” simulation where the KT team at the client-site simulates “Offshore” operations by working from isolated rooms and using only tools and techniques that will be available from the offshore locations.
Formal Sign Off 
  • Client agrees with Knowledge Acquisition document and proof of KT effectiveness, and signs-off of the same to move into “steady-state” operations.

http://www.bestitdocuments.com/IT_Security_Methodology_solutions.html

 

Comments Off on Sample Project – Knowledge Discovery Verification Approach

Sample eHealth / Spectrum – Network Device Monitoring Considerations

Posted in Business (600),Data Center - SOC - NOC,Networking (340) by Guest on the January 28th, 2013

Overview:

Devices send traps the SDC – Secure Domain Connector 

  • Central trap locations for all devices: 
    • Primary Trap Director         
    • Host-Name:
    • IP Address:
    • Location: 
  • Failover Trap Director  
  • Datacenter Network Devices: 
  • eHealth
  • eHealth Primary
    • snmp-server “Host-Name”
    • snmp-server “community” 
  • Datacenter Network Devices:
  • Host-Name:
  • IP Address:
  • Location: 
  • eHealth
  • eHealth Backup
    • snmp-server “Host-Name”
    • snmp-server “community” 

Variety of mechanisms monitor enterprise at multiple levels 

  • Edge agents track CPU load, memory usage, and disk activity
  • RMON probes collect packet statistics and protocol data from links, paths, and network devices
  • Capable of receiving third party MIBs to leverage existing technology and monitoring solutions 

Information assembled by central console server and correlated to build various views and reports 

  • Backend Database storage and data management
  • Rules and thresholds highly customizable to ensure alerts and reports are tailor to needs of user, whether technical or business 

http://www.bestitdocuments.com/Networking.html

 

Comments Off on Sample eHealth / Spectrum – Network Device Monitoring Considerations

Sample – Corporate Data Damage Policy

Posted in Policies - Standards (600) by Guest on the January 27th, 2013

Policy

Corporate & Company uses access controls and other security measures to protect the:

  • Confidentiality,
  • Integrity,
  • Availability 

Impacting information handled by their computers and communications systems. In keeping with these objectives, management maintains the authority to:

  1. Restrict or revoke any user’s privileges,
  2. Inspect, copy, remove, or otherwise alter any data, program, or other system resource that may undermine these objectives, and
  3. Take any other steps deemed necessary to manage and protect its information systems. This authority may be exercised with or without notice to the involved users. Corporate & Company disclaims any responsibility for loss or damage to data or software that results from its efforts to meet these security objectives. 

Purpose

This policy defines the privileges systems administrators have as delegates of management. Rather legalistic in nature, it notifies users that they cannot hold Corporate & Company liable for damages associated with management’s attempts to secure its system. For example, if a systems administrator was performing a routine virus scan of all PCs on a LAN, he may detect what appears to be a virus. He may then run a program which alters the program which appears to be affected. If the involved user later determines that this very valuable program is inoperative as a result, he cannot hold management responsible for damaging the program. Thus, in an indirect way, this policy 

Exception

Information pertaining to acceptable physical and technical safeguards is available from your unit security or information technology organizations.  The Global Security and Corporate Information Systems Computer Security organizations have additional information. 

http://www.bestitdocuments.com/Risk_management_policy_procedures.html

 

Comments Off on Sample – Corporate Data Damage Policy

Sample Visio – Vulnerability Qualys Scanning Process Flow

Posted in Security (1500),Visio Samples - Stencils (457) by Guest on the January 26th, 2013
Comments Off on Sample Visio – Vulnerability Qualys Scanning Process Flow

Sample Visio – Employee Benefits Orientation Process

Posted in Visio Samples - Stencils (457) by Guest on the January 24th, 2013

Free Visio Document Download

Sample Visio – Employee Benefits Orientation Process

http://www.bestitdocuments.com/IT_Business_solutions.html

 

Comments Off on Sample Visio – Employee Benefits Orientation Process
Next Page »