Best IT Documents.com Blog


Sample Visio – ITIL SDLC Framework

Posted in Visio Samples - Stencils (457) by Guest on the December 28th, 2013
Comments Off on Sample Visio – ITIL SDLC Framework

Sample Mindmap – IT Real Estate Infrastructure

Posted in Mindmap (100) by Guest on the December 26th, 2013
Comments Off on Sample Mindmap – IT Real Estate Infrastructure

VPN’s Use IPSec to Protect Users against the following attacks

Spoofing – One machine or user on a network masquerades as another

Sniffing – An eavesdropper listens in on a transmission between users

Hijacking – Spoofing and other techniques are used to take control of a communications session, allowing the attacker to masquerade as one of the communicating parties 

Protecting the perimeter

For the purposes of this discussion we will focus on Firewall and Intrusion detection deployments – an integral part of any security policy, the effective deployment of these internet security appliances create a trusted network environment for business. 

Installing a firewall is critical as the first line of defense, both at the corporate campus and remote sites including the homes of mobile workers. A firewall will inspect the connection and assure that it is allowable within a defined policy.  However, firewalls only inspect connections, they do not look for abnormalities in the packet header or malicious code within the data portion of the packet.  

For maximum perimeter protection, network intrusion detection sensors should be strategically located to monitor and protect the firewall and internal network.  The best coverage is obtained by placing NIDS / IPS sensors both inside and outside the firewall.  The external sensor detects attacks on the firewall and monitors for denial-of-service, probes and firewall exploits.  The internal sensor detects unusual activity such as trojan horse and back door infections and other externally addressed traffic. 

Another critical element of perimeter protection is using a NIDS on VPN and WAN links.  Hackers will often target branch offices – which tend to have lax security policy adherence and poor physical security – to attack an organization’s network resources.  In this way, a hacker can bypass a firewall by accessing the network through the VPN or WAN.

http://www.bestitdocuments.com/Edge_services.html

 

Comments Off on VPN’s Use IPSec to Protect Users against the following attacks

Sample Visio – Training / External Seminar Approval Process Flow

Posted in Visio Samples - Stencils (457) by Guest on the December 22nd, 2013
Comments Off on Sample Visio – Training / External Seminar Approval Process Flow

Sample Visio – Sample DNS Flows

Posted in Visio Samples - Stencils (457) by Guest on the December 20th, 2013

Sample approach to a webcommerce DNS design.

The webcommerce.local domain will be authoritatively hosted by Active Directory Integrated DNS on at least two DC’s / DNS servers.  One of these servers will be located in Dallas and the other, for fault tolerance reasons, will be located at the San Jose site.  All DC’s and member servers of the webcommerce.local domain will use the above DNS servers as primary and secondary in their DNS configurations.  These DNS servers will forward on any un-resolvable queries to the Infoblox appliances at their site which will, in turn, forward on to the internal DNS servers.

Free Visio document download

Sample DNS Flow

http://www.bestitdocuments.com/Services.html

 

Comments Off on Sample Visio – Sample DNS Flows

Sample Mindmap – Access Controls

Posted in Mindmap (100) by Guest on the December 15th, 2013
Comments Off on Sample Mindmap – Access Controls
Next Page »