Our documents are based on successfully executed projects which save you time and money.
Img (719) 315-0404
networking

TCP and UDP ports

September 27, 2009

  Port Category Port Number Range Description Well-known ports 0 – 1023 Typically used by standard system processes or programs executed by users with administrator credentials. Assigned by IANA. Registered ports 1024 – 49151 Used by ordinary user processes or programs executed by ordinary users. IANA does not assign...

Img
security

Physical and Perimters test cases

September 21, 2009

Perimeter Review This is a method of testing the physical security of an organization and its assets by reviewing is its physical perimeter security measures. Expected Results: 1        Map of physical perimeter 2        Types of physical protective measures 3        List of unprotected / weakly protected areas Tasks to perform...

Img
information-rights-management , security

Identity Theft

September 5, 2009

Identity theft is a crime where a person’s legal identity is stolen and used to conduct financial fraud. Identity thieves steal information about a victim such as bank account information, Social Security number and driver’s license number in order to open accounts in the victim’s name or to change...

Img