Our documents are based on successfully executed projects which save you time and money.
security

Sample Support System Security Plan

December 1, 2010

Sample Support System Security Plan System Identification · General Information · System Name / Title · Unique Identifier & Name Given to the System. Responsible Organization · List organization responsible for the application o Name: o Title: o Address: o Phone: o E-mail: Information Contact(s) · Name of person(s) knowledgeable about, or the owner of, the system. More than...

Img
visio-stencils

Sample Remedy Ticket Flow Visio – Help Desk

November 26, 2010

Free Sample Remedy Ticket Flow Visio download Sample Remedy Ticket Flow Visio https://www.bestitdocuments.com/Samples

Img
o-s

NFS vs Coda

November 22, 2010

NFS vs Coda Considerations NFS Coda Design goals Access transparency High availability Communication RPC RPC Access model Remote Up/Download Mount granularity Directory File system Server groups No Yes Name space Per client Global Sharing sem Session Transactional Cache consist. write-back write-back Fault tolerance Reliable comm. Replication and caching Recovery...

Img
security , visio-stencils

Sample Visio – NFS Security Architecture

November 18, 2010

Sample NFS Visio NFS Security Architecture Visio https://www.bestitdocuments.com/Samples

Img
visio-stencils

Sample Visio – Satellite Internet ISA Sample

November 17, 2010

Free Sample Document Visio download Satellite Internet ISA Satellite Internet ISA Sample.vsd https://www.bestitdocuments.com/Samples

Img
visio-stencils

Sample Visio – RPC Security Architecture

November 15, 2010

Free Sample Visio Document download RPC Security Architecture.vsd https://www.bestitdocuments.com/Samples

Img
o-s , visio-stencils

Sample Visio – Unix Kernal Layer

November 12, 2010

Free Sample Document download Unix Kernal Visio Sample  Unix Kernal Layer  https://www.bestitdocuments.com/Samples

Img
o-s

Sample Word – Cyclades ACS Appliance – Out of Band Management

November 9, 2010

One possible solution for Out of Band Network Management. Cyclades_ACS_Appliance.doc https://www.bestitdocuments.com/Samples

Img
security

Secure your servers

November 8, 2010

Review and implement my company’s security policies as they relate to web security. Implement a secure network infrastructure by controlling access to/from your web server by using: Firewalls, Routers and Switches. Implement a Network Intrusion Detection System to monitor attacks against the web server. Patched servers. Implement load-balancing /fail...

Img
security

Web Server Pieces

November 7, 2010

Server OS + Hardware •Web Server Database Server Web application framework or language Scripting language or Application Client & Browser Security •Authentication and Session Management Web Server •Apache and IIS 6 / 7 are not secure OTB •Configurations can become complex over time –Look for unused modules or paths...

Img
email

Exchange Pre-Migration Data Collection considerations

November 6, 2010

Accounts and Mailboxes How many mailboxes are there? How many exceed the 200MB limit? Please list. How many contacts and custom recipients are there? Which mailboxes have no quotas set? How many lists and distribution lists are there? What clients are in use? • Outlook 200x • Outlook 2003...

Img
security

Web Security Attacks

November 5, 2010

•Abuse of Functionality •Brute Force •Buffer Overflow •Content Spoofing •Credential/Session Prediction •Cross-site Scripting •Denial of Service •Directory Indexing •Format String Attack •Information Leakage •Insufficient Anti-automation •Insufficient Authentication •Insufficient Authorization •Insufficient Process Validation •Insufficient Session Expiration •LDAP Injection •OS Commanding •Path Traversal •Predictable Resource Location •Session Fixation SQL Injection •SSL...

Img
security

Top 10 Web Security Vulnerabilities

November 4, 2010

1.      Poorly validated Input 2.      Broken Access Control 3.      Broken Authentication and Session Management 4.      Cross Site Scripting 5.      Buffer Overflow 6.      Injection Flaws 7.      Improper Error Handling 8.      Insecure Storage 9.      Application Denial of Service 10.  Insecure Configuration Management How to counteract these issues: Test existing web applications...

Img
sample-it-spreadsheets

Sample Excel – Performance Reference Model Sample Descriptions

November 3, 2010

Free Excel document download Performance Reference Model Sample Descriptions.xls https://www.bestitdocuments.com/Samples

Img
sample-it-spreadsheets

Sample Excel – Data Reference Model Sample Descriptions

November 2, 2010

Free Excel document download Data Reference Model Sample Descriptions.xls https://www.bestitdocuments.com/Samples

Img
sample-it-spreadsheets

Sample Excel – Business Reference Model Sample Descriptions

November 1, 2010

Free Excel document download Business Reference Model Sample Descriptions.xls https://www.bestitdocuments.com/Samples

Img
sample-it-spreadsheets

Sample Excel – Service Reference Model Sample Descriptions

November 1, 2010

Free Excel Document download Service Reference Model Sample Descriptions.xls https://www.bestitdocuments.com/Samples

Img
o-s

Imperva – Port Usage

October 23, 2010

Imperva – Port Usage Port Protocol Description 443 TCP HTTPS – Web console 80 TCP HTTPS – Imperva Update Server 22 TCP SSH – Remote Management 8083 TCP Proxy – Appliance Agent communications 53 UDP DNS Server 123 UDP NTP Server 514 UDP Syslog Server 162 UDP SNMP Trap...

Img
o-s

IBM Guardium Appliance Port Usage

October 17, 2010

IBM Guardium Appliance port usage Database Server to Collector Appliance: Port Protocol Description 16016 TCP Linux/UNIX only, both directions, STAP (the probe installed on the database servers) registration, heartbeat, & data 16018 TCP Encrypted:Linux/UNIX only, both directions, STAP registration, heartbeat, & data 8075 UDP Windows only, both directions, STAP...

Img
security

Suggested Security Architecture Overview

October 8, 2010

The security architecture is the layout and design of hardware employed to protect private networks. Best practices dictate that the architecture of a private network linked to the internet be divided by four distinct barriers: front – end firewall, proxy server, web server and back-end-firewall. These barriers are ordered...

Img
business

Impact of the Internet

October 7, 2010

Impact on Business When the Internet first came to the workplace it was looked upon as though it was almost a toy.  People would talk about how fun it was and all the cool things they could find on the web.  It wasn’t long before browsing became far more...

Img
business

Business Requirements for Network Performance

October 4, 2010

Look for a complete picture of the network performance across both the WAN and the LAN regardless of network technology • Measure and verify key service level parameters including latency, availability, packet loss and jitter from an independent, third party point of view. • Monitor key performance indicators including...

Img
o-s

Windows 2008 Security Guide

October 3, 2010

Windows 2008 Security Guide Windows Server 2008 Security Guide https://www.bestitdocuments.com/Samples

Img
o-s

Linux System Administration Commands

October 1, 2010

Compression/decompression utilities (software installation): compress <file>                      compress -d <file>.Z (or uncompress <file>.Z) gzip <file>                                gzip -d <file>.gz (or gunzip <file>.gz) tar cvf <device> <files>         tar xvf <device>.tar System Shutdown: reboot halt shutdown [-h now] [-r now] User Management: 1.  To add a user  (a) adduser: add a new user...

Img
business , sample-it-spreadsheets

Sample Excel – Vendor Technology Organizations and Service Descriptions

September 20, 2010

Free Excel document download Vendor Technology Organizations and Service Descriptions.xls https://www.bestitdocuments.com/Samples

Img
o-s

HP System Insight Port Usage

September 12, 2010

HP System Insight Port Usage

Img
o-s

Network Administration on Linux / UNIX

September 1, 2010

TCP/IP Networking origin: ARPANET by the United States Defense Advanced Research Projects Agency (DARPA), 1969 TCP/IP protocol suite ARP, IP, ICMP, UDP, TCP SLIP and PPP Socket Library Networking Hardware Configuration hardware: Ethernet, serial line (RS-232), point-to-point, parallel port device drivers: Ethernet: 3Com, Novell, WD/SMC, HP, D-Link, DEC, …...

Img
o-s

Linux / UNIX Basics

August 27, 2010

Login: login: <user account> password: <user password> Logout: logout exit Ctrl-D File Systems: pwd: print current working directory ls [-l] [-a]: List the contents of current directory File attributes: drwxr-xr-x  2 root  root  1024 Jun 4 17:01 bin/ d: [-dlsbc] -> [file,directory,link,special,block,char] permission modes: user (owner)       ...

Img
email , sample-it-spreadsheets

PowerPoint – Blackberry Enterprise Server

August 25, 2010

Blackberry Enterprise Server Training. BlackBerry_Enterprise Server.ppt https://www.bestitdocuments.com/Samples

Img
compliances

Sanctions for Regulatory Non-Compliance

August 21, 2010

There are penalties for stakeholders; CISO is liable. The first column indicates when the year when the regulation came into existence The next column shows the fine the maximum fine.  As you can see, there are some hefty fines associated with non-compliance. This is driving behaviour. The next column...

Img
o-s

Excellent windows Tweaks and Internal Information

August 20, 2010

Great site for Tweaking Windows and understanding some of the internals. http://www.blackviper.com/

Img