Best IT Documents.com Blog


Sample Visio – ITIL SDLC Framework

Posted in Visio Samples - Stencils (457) by Guest on the December 28th, 2013
Comments Off on Sample Visio – ITIL SDLC Framework

Sample Mindmap – IT Real Estate Infrastructure

Posted in Mindmap (100) by Guest on the December 26th, 2013
Comments Off on Sample Mindmap – IT Real Estate Infrastructure

VPN’s Use IPSec to Protect Users against the following attacks

Spoofing – One machine or user on a network masquerades as another

Sniffing – An eavesdropper listens in on a transmission between users

Hijacking – Spoofing and other techniques are used to take control of a communications session, allowing the attacker to masquerade as one of the communicating parties 

Protecting the perimeter

For the purposes of this discussion we will focus on Firewall and Intrusion detection deployments – an integral part of any security policy, the effective deployment of these internet security appliances create a trusted network environment for business. 

Installing a firewall is critical as the first line of defense, both at the corporate campus and remote sites including the homes of mobile workers. A firewall will inspect the connection and assure that it is allowable within a defined policy.  However, firewalls only inspect connections, they do not look for abnormalities in the packet header or malicious code within the data portion of the packet.  

For maximum perimeter protection, network intrusion detection sensors should be strategically located to monitor and protect the firewall and internal network.  The best coverage is obtained by placing NIDS / IPS sensors both inside and outside the firewall.  The external sensor detects attacks on the firewall and monitors for denial-of-service, probes and firewall exploits.  The internal sensor detects unusual activity such as trojan horse and back door infections and other externally addressed traffic. 

Another critical element of perimeter protection is using a NIDS on VPN and WAN links.  Hackers will often target branch offices – which tend to have lax security policy adherence and poor physical security – to attack an organization’s network resources.  In this way, a hacker can bypass a firewall by accessing the network through the VPN or WAN.

http://www.bestitdocuments.com/Edge_services.html

 

Comments Off on VPN’s Use IPSec to Protect Users against the following attacks

Sample Visio – Training / External Seminar Approval Process Flow

Posted in Visio Samples - Stencils (457) by Guest on the December 22nd, 2013
Comments Off on Sample Visio – Training / External Seminar Approval Process Flow

Sample Visio – Sample DNS Flows

Posted in Visio Samples - Stencils (457) by Guest on the December 20th, 2013

Sample approach to a webcommerce DNS design.

The webcommerce.local domain will be authoritatively hosted by Active Directory Integrated DNS on at least two DC’s / DNS servers.  One of these servers will be located in Dallas and the other, for fault tolerance reasons, will be located at the San Jose site.  All DC’s and member servers of the webcommerce.local domain will use the above DNS servers as primary and secondary in their DNS configurations.  These DNS servers will forward on any un-resolvable queries to the Infoblox appliances at their site which will, in turn, forward on to the internal DNS servers.

Free Visio document download

Sample DNS Flow

http://www.bestitdocuments.com/Services.html

 

Comments Off on Sample Visio – Sample DNS Flows

Sample Mindmap – Access Controls

Posted in Mindmap (100) by Guest on the December 15th, 2013
Comments Off on Sample Mindmap – Access Controls

Sample Visio – ISO 9000-2000 Details

Posted in Compliances (1300),Security (1500) by Guest on the December 15th, 2013
Comments Off on Sample Visio – ISO 9000-2000 Details

Sample Visio – IT Team Services Structure

Posted in Visio Samples - Stencils (457) by Guest on the December 12th, 2013
Comments Off on Sample Visio – IT Team Services Structure

Sample – Software Architecture High Level Considerations

Posted in Application (380),Compliances (1300),Security (1500),Web Services (250) by Guest on the December 7th, 2013

Architectural Goals and Constraints

Below is a subset of the requirements that have the most impact on the Integration Framework Architecture.

  1. Agnostic – The Architecture should be platform-independent and technology neutral.
  2. Flexible – The architecture should deliver services to a variety of channels and touch points
  3. Changeable – The architecture should leverage existing components today and provide an easy migration path for leveraging emerging technologies. This will allow to effectively minimize the impact of future efforts to reduce costs and/or increase efficiency.
  4. Non-Intrusive – The architecture should have minimal initial impact on existing legacy applications.
  5. Reliable – Reliability should be an inherent consideration of this architecture.  It is accomplished primarily by the physical architecture (infrastructure).  Technologies such as fail-over clusters and distributed system management can be used to promote reliability. Reliability should also be supported by the Integration Frameworks with such features as:
    • Coding best practices
    • Documentation best practices
    • Results mapped to project deliverables and requriements
    • Automated online testing and debugging  hooks
    • Instrumentation
  6. Secure – The architecture should be built around a robust security model.
  7. Loosely-coupled. The architecture should provide a set of interfaces that are loosely bound to their respective implementation (underlying technology).  Service implementations should be allowed to change with no impact on the service by defining stable framework interfaces.
  8. Scalable – Scalability is primarily a function of the physical architecture. 

 http://www.bestitdocuments.com/Web_services.html

 

Comments Off on Sample – Software Architecture High Level Considerations

Sample Mindmap – IT Business Coordination

Posted in Mindmap (100) by Guest on the December 6th, 2013
Comments Off on Sample Mindmap – IT Business Coordination

Sample Visio – IT Disaster Recovery Balances

Posted in Visio Samples - Stencils (457) by Guest on the December 3rd, 2013
Comments Off on Sample Visio – IT Disaster Recovery Balances