Best IT Documents.com Blog


Sample Excel – IT Skills Discovery Spreadsheet

Posted in Business (600),Sample - IT Spreadsheets - PowerPoints (251) by Guest on the February 28th, 2013
Comments Off on Sample Excel – IT Skills Discovery Spreadsheet

Sample Visio – Sample SMS Configuration

Posted in O S (375),Visio Samples - Stencils (457) by Guest on the February 27th, 2013
Comments Off on Sample Visio – Sample SMS Configuration

Sample – Corporate Minimal Wireless Security Requirements

Posted in Compliances (1300),Security (1500) by Guest on the February 27th, 2013

By default, all wireless network segments are prohibited from connecting to the corporate production network, unless authorized by the employee’s first line manager and the Director IT Security Services

  • The Security Service Manager must be informed when wireless segments are connected to the corporate network.
  • The Security Service Manager must approve any deviations from the security standards established herein.
  • For guest wireless access connected through a standalone broadband connection, notice and approval is not required but compliance with the following configuration standard is still required. 

Minimum Wireless Security Design Requirements

When authorized, wireless segments will comply with the following design requirements:

  • Position the location of Wireless Access Points (WAPs) to restrict the wireless signal to inside the building as much as possible.
  • Locate WAPs in secured areas to prevent unauthorized physical access and user manipulation where practical.
  • Change “easily identifiable” SSID broadcasting that would identify the WAP as a corporate asset with the exception of the wireless Guest Network.
  • Disable the ability to configure or manage the WAPs via wireless.
  • Maintain an up-to-date inventory of all WAPs and a diagram that identifies the physical and logical location.
  • Change default passwords and encryption keys on all WAPs.
  • Change default SNMP community strings on all wireless APs.
  • Disable promiscuous broadcasting of MAC address.
  • Transmission encryption will be implemented with WPA2 or better.
  • Disable all vendor supplied user accounts and default passwords. 

Wireless Access Point Network Configuration

  • Place a firewall between the wireless network and corporate production network as determined by a risk assessment.
  • Test and deploy software patches and updates in accordance with patch management standards. 

Wireless Access Points Connected to Corporate Networks

  • Configure each WAP to log all system activity and send logs to a central log server.
  • Deploy Intrusion Detection Systems (IDS) / Intrusion Protection Systems (IPS) on the wireless network to report suspicious activity (wireless event logs). 

Wireless Requirements For Clinical Systems

  • All clinical systems with wireless capabilities must be tested for compliance to the requirements listed above prior to releasing to the production environment. 

Monitoring

  • Review wireless event log files.
  • Continuously monitor to detect rogue and friendly WAPs.
  • Perform vulnerability scanning of wireless access points

Report rogue WAPs to the Manager, Security Service Management. 

http://www.bestitdocuments.com/IT_Security_Methodology_solutions.html

 

Comments Off on Sample – Corporate Minimal Wireless Security Requirements

Sample Word – Information Security Encryption Standard

Posted in Policies - Standards (600),Security (1500) by Guest on the February 26th, 2013
Comments Off on Sample Word – Information Security Encryption Standard

Sample Word – IT Hardware Support Policy

Posted in Policies - Standards (600) by Guest on the February 26th, 2013
Comments Off on Sample Word – IT Hardware Support Policy

Sample Word – Firewall Services – Sample Service Specific Permissions

Posted in Firewalls (75),Networking (340),Security (1500) by Guest on the February 26th, 2013
Comments Off on Sample Word – Firewall Services – Sample Service Specific Permissions

Sample Word – eMail Information Security Policy

Posted in Policies - Standards (600) by Guest on the February 26th, 2013
Comments Off on Sample Word – eMail Information Security Policy

Sample Visio – High Level Architecture of the Apache Web Server

Posted in Security (1500),Visio Samples - Stencils (457),Web Services (250) by Guest on the February 26th, 2013

The high level architecture of the Apache web server is not very different from the high level conceptual architecture, in the sense that we still find the same splitting of functionality between the core and the modules.

 In addition to the Apache core and the modules we can identify some new small modules. Two of them (ap, regex) are essentially libraries of utility functions, used by both the core and the modules. The third one (os) is the one that ensures the independence of the operating system from the Apache core and the standard modules.

 

The Apache Module

As you can see the designers of Apache decided to take a modular approach so that anyone can add to the basic functionality of the server without disturbing the basic Core implementation.

  • Web servers that can handle simultaneous requests, manage the requests in two ways. Either they start a new process or they start a new thread within a process. Web servers that start a new process on each request are called multi-processed Web servers, while those that start a new thread within the main process are called multithreaded Web servers.
  • IIS (Internet Information Services) on the Windows platform is an example of a multithreaded Web server. Apache on a Unix platform is a multi-processed Web server.
  • Windows platform lack forking for server client request interaction which put Apache on a Unix platform more efficient. Unix is the software for the hardware architecture of a web based server.

 http://www.bestitdocuments.com/Services.html

 

Comments Off on Sample Visio – High Level Architecture of the Apache Web Server

Sample Visio – New Hire Orientation Workflow

Posted in Visio Samples - Stencils (457) by Guest on the February 26th, 2013
Comments Off on Sample Visio – New Hire Orientation Workflow

Sample Visio – Student Tuition Workflow

Posted in Visio Samples - Stencils (457) by Guest on the February 26th, 2013
Comments Off on Sample Visio – Student Tuition Workflow

Sample Visio – Tuition Assistance Workflow

Posted in Visio Samples - Stencils (457) by Guest on the February 26th, 2013
Comments Off on Sample Visio – Tuition Assistance Workflow

Sample Visio – Salary Processing Workflow

Posted in Visio Samples - Stencils (457) by Guest on the February 26th, 2013
Comments Off on Sample Visio – Salary Processing Workflow

Sample ITIL – SDLC Framework

Sample ITIL – SDLC Framework

http://www.bestitdocuments.com

 

Comments Off on Sample ITIL – SDLC Framework

Sample Mindmap – High Level Security Governance Example

Posted in Mindmap (100) by Guest on the February 25th, 2013
Comments Off on Sample Mindmap – High Level Security Governance Example

Sample Mindmap – High Level Security Incident Response Team Members

Posted in Mindmap (100) by Guest on the February 24th, 2013
Comments Off on Sample Mindmap – High Level Security Incident Response Team Members

Sample Mindmap – Three Types of Security Attacks

Posted in Mindmap (100) by Guest on the February 23rd, 2013
Comments Off on Sample Mindmap – Three Types of Security Attacks

Sample Visio – VMWare DMZ Storage

Posted in Application (380),Business (600),Visio Samples - Stencils (457) by Guest on the February 22nd, 2013
Comments Off on Sample Visio – VMWare DMZ Storage

Sample Word – IT Business Continuity Planning

Posted in Policies - Standards (600) by Guest on the February 21st, 2013
Comments Off on Sample Word – IT Business Continuity Planning

Sample Mindmap – Security Confidentiality Integrity and Availability

Posted in Mindmap (100) by Guest on the February 21st, 2013
Comments Off on Sample Mindmap – Security Confidentiality Integrity and Availability

Sample Word – Corporate Physical Security Policy

Posted in Policies - Standards (600) by Guest on the February 20th, 2013
Comments Off on Sample Word – Corporate Physical Security Policy

Sample Mindmap – Four Factors Critical to Successful IT Project

Posted in Mindmap (100) by Guest on the February 20th, 2013
Comments Off on Sample Mindmap – Four Factors Critical to Successful IT Project

Sample Visio – DataFort NAS Encryption Infrastructure

Posted in Compliances (1300),Security (1500),Visio Samples - Stencils (457) by Guest on the February 19th, 2013
Comments Off on Sample Visio – DataFort NAS Encryption Infrastructure

Sample Mindmap – IT Executive Management Structure

Posted in Mindmap (100) by Guest on the February 19th, 2013
Comments Off on Sample Mindmap – IT Executive Management Structure

Sample Visio – Microsoft 2003 SMS Configuration

Posted in Compliances (1300),Visio Samples - Stencils (457) by Guest on the February 18th, 2013
Comments Off on Sample Visio – Microsoft 2003 SMS Configuration

Sample Mindmap – Project Office Program Delivery Objectives

Posted in Mindmap (100) by Guest on the February 18th, 2013
Comments Off on Sample Mindmap – Project Office Program Delivery Objectives
Next Page »