Our documents are based on successfully executed projects which save you time and money.
Img (719) 315-0404
security

Sample Information Security Program

January 30, 2010

A good Information Security Program should address all facets of IT security: Policies, Procedures, and Processes Network Security Physical Security Application Security Identity Management Business Continuity Compliance Information Sharing Threat/Vulnerability Management

Img
security

DoS Attack Details

January 25, 2010

DoS Attack Detail Maintaining a reliable and predictable network has become a strategic imperative for most businesses now dependent on the Internet. DoS attacks, which flood network links or Web sites with useless traffic, have become a serious threat to the reliability of critical business assets. In a DoS...

Img
compliances , information-rights-management , security

ISO-17799:2000 Overview

January 22, 2010

127 controls distributed within 10 categories Information security policy Organizational security Asset classification and control Personnel security Physical & environmental security Communication & operations management Access control System development & maintenance Business continuity management Compliance Uses a Plan/Do/Check/Act implementation and operation model that starts with a risk assessment to...

Img
compliances , security

What’s new in ISO-17799:2005

January 21, 2010

Risk management where addressed only in part 2 document, the part 1 now includes a new chapter on ‘Risk Assessment and Treatment’ requirements ‘Asset classification and control’ evolve into a more holistic ‘Asset management’ approach ‘Personnel Security’ evolve into ‘Human resources security’ which now emphasis on what’s needed before,...

Img
compliances , security

ISO-17799 Overview

January 20, 2010

BS7799 was created in 1999 as a two part document (standard + certification scheme) by the British Standards Institution (BSI) The standard portion was adopted and converted into an ISO standard in 2000 The certification scheme portions is still a BSI only standard and it’s latest revision is dated...

Img
compliances

IT Service Management

January 19, 2010

Components of an IT Service Management service HelpDesk Service Level Management Service Catalog Metering Billing Chargeback https://www.bestitdocuments.com/Samples

Img
information-rights-management , security

Threat Modeling

January 18, 2010

Threats must be understood to build secure systems  Every spec/design goes through threat analysis  Model of component is created  Threats categorized based on STRIDE  Severity ranked based on DREAD  Stride:  S—Spoofing  T—Tampering of Data  R—Repudiation   I—information Disclosure  D—Denial of Service   E—Escalation of Privileges  Dread:  D—Damage potential  R—Reproducibility  E—Exploitability  A—Affected...

Img
compliances , security

PCI Report on Compliance and Visa

January 17, 2010

PCI Compliance Validation. European Payment Council (EPC). Audits and Self-Assessments Network Scans Report on Compliance PCI Report on Compliance and Visa Level 1–3 Merchants Level 1 Merchants (via Acquirer) On-site PCI data security assessment completed by QSA Letter signed by a merchant officer Confirmation of report accuracy form completed...

Img
networking

Sort IP Addresses in Microsoft Excel

January 15, 2010

Excellent excel tip for networking solutions. http://blog.zztopping.com/2009/02/05/how-to-sort-ip-addresses-in-microsoft-excel  

Img
compliances , security

IT Security Management

January 12, 2010

What is Security Management. A proactively discover and detect intrusive activities/vulnerabilities Provide real-time prevention Provide a multi-layered approach to intrusion defense (Host/Network) Integrate any event from the enterprise Collect, consolidate, and normalize events  across the enterprise Filter events, alert and notify personnel,  execute countermeasures Suppress meaningless data Correlate events...

Img
networking , security

Next Generation Real-time Network Defense

January 11, 2010

Requirements: Near Continuous Scanning System Change Alerts Identify “unmanaged” nodes on network Receive frequent vulnerability updates Ongoing monitoring for baseline compliance, vulnerabilities, and threats Standards-based interface to firewall, anti-virus and intrusion prevention systems to support rapid shielding https://www.bestitdocuments.com/Samples

Img
networking , security

Sample RSA Server Architecture

January 10, 2010

Free – Document download Sample RSA Server Architecture https://www.bestitdocuments.com/Samples

Img
compliances , networking , sample-it-spreadsheets

Sample Excel – CA – Spectrum Polling spreadsheet

January 4, 2010

Free – Document download Spectrum Polling Collection Spreadsheet https://www.bestitdocuments.com/Samples

Img
compliances , sample-it-spreadsheets , web-services

Sample Excel – Gartner Web Evaluation Tool

January 4, 2010

Free Excel document download Gartner Web Evaluation Tool: http://www.aworc.org/went2001/tracks/joint/all-tool-web-evaluation.xls https://www.bestitdocuments.com/Samples

Img