Our documents are based on successfully executed projects which save you time and money.
security

Viruses, Worms and Trojan Horses

August 19, 2010

Author unknown it was still worth publishing • Virus • Program that reproduces by attaching to another program •  May damage data directly or it may degrade system performance by taking over system resources, which are then not available to authorized users • Worm •  An independent program that...

Img
sample-it-spreadsheets , security

Sample Excel – Technical Reference Model Sample Descriptions

August 18, 2010

Free Excel document download Technical Reference Model Sample Descriptions.xls https://www.bestitdocuments.com/Samples

Img
compliances

Cross Industry Document Retention

August 15, 2010

Banking – FDIC/OCC Brokerage – SEC Rule 17a3 and 17a4 Telecom – Title 47, Part 42 Pharmaceutical – FDA Title 21, Part 11 Healthcare – HIPAA Defense – DOD 5015.2 Standard All publicly held – Sarbanes Oxley Act There is a renewed focus of these retention requirements have documented...

Img
o-s

Windows Service Checks

August 14, 2010

User mode services: Service name :Browser Display Name :Computer Browser Binary Path :E:WINNTSystem32services.exe Service is running in the security context of LocalSystem The Computer Browser contains a denial of service attack where many spoofed entries can be added. There are many occasions when the browse list is requested from...

Img
business , itil

What is the ITIL IT Service Request Catalog

August 13, 2010

The IT Service Request Catalog is usually a web portal inside your organization that contains information about your organization IT Services. It optimizes IT services and improvements over the current methods that your organization used to request, assign, and fulfill IT service requests. The IT Service Request Catalog provides:...

Img
o-s

Active Directory Structure

August 7, 2010

To understand Active Directory, the reader should have some knowledge of object oriented concepts. It should be helpful to read the Object Guide on this site. Features: · Network resources are easy to find. · Uses group policies for easier administration · Scalability · Flexibility with the ability to...

Img
business

Sample – Credit Union IT Systems Compliance and Legal Issues

July 15, 2010

1.0 Overview This policy defines the basic elements required for the <Company Name> Information Systems Compliance and Legal Issues Monitoring. 2.0 Purpose To evaluate whether management practices relative to IT have been designed to properly address regulatory compliance and other legal issues. 3.0 Scope The scope of this policy...

Img
o-s

Active Directory Sites

July 12, 2010

A site is a grouping of machines based on a subnet of TCP/IP addresses. An administrator determines what a site is. Sites may contain multiple subnets. There can be several domains in a site. Active Directory replication to various sites is performed using Active Directory Sites and Services. (Make...

Img
o-s

Sample System Administration Guide

July 11, 2010

What should be in your System Administrator’s Guide that will help you deploy, support, and maintain applications in your organization. It will also help you create a schedule of maintenance tasks to ensure that systems, servers, databases, and printers, are proactively monitored, audited and secured by your System Administrators....

Img
security

TACACS / XTACACS / TACACS+

July 10, 2010

Based on obscure ARPANET access control system for terminal servers, later documented and extended by Cisco Forwards username and password to TACACS server, returns authorization response XTACACS, Extended TACACS Adds support for multiple TACACS servers, logging, extended authorization Can independently authorize access via PPP, SLIP, telnet and ssh TACACS+...

Img
o-s , visio-stencils

Sample Visio – Unix Kernal Exec Layout

July 9, 2010

Free Sample Document download Unix Kernal Visio Sample  Unix_Kernal.vsd https://www.bestitdocuments.com/Samples

Img
business

Sample Corporate Compliance Agreement

July 5, 2010

Agreement to Comply With Information Security Policies A signed paper copy of this form must be submitted with all requests for 1) Authorization of a new user-ID, 2) Authorization of a change in privileges associated with an existing user-ID, or 3) Periodic reauthorization of an existing user-ID.  Modifications to the terms...

Img
o-s

Active Directory Object Naming

July 3, 2010

Active Directory Naming is based on Lightweight Directory Application Protocol (LDAP) (RFC 1777) and Domain Name System (DNS). Distinguished Name A Distinguished Name (DN) is used to uniquely name an Active Directory Object. All objects can be referenced using a Distinguished Name. A DN has three components:    DC...

Img
networking

Security Guide for Wireless Communications

June 30, 2010

The next time you pick up that car phone to conduct last-minute business on the way to the airport, take a second to consider whether it would matter if your conversation were overheard by an AT&T executive, or some other third party. Unless both parties are using encryption or...

Img
application

Guiding Principles for Software Security

June 29, 2010

Behind every attack & security problem is – bad software A major concern is that security professionals are often un-aware the problem is – bad software Encrypt your data lines? The riskiest category of software today is Internet-enabled apps “Using encryption on the Internet is the equivalent of arranging...

Img
application

Principles of Software Security

June 29, 2010

Secure the weakest link Low-hanging fruit is picked first, I.e. Attack end points, not encrypted links Risk analysis ID’s the weakest link Apportion resources according to risk Practice defense in depth One layer is never enough Overlapping & redundant    Fail securely Failure is unavoidable Allow least privilege Only...

Img
security

Assurance of trustworthiness

June 29, 2010

It’s all a “confidence” game. Providing adequate confidence that … … Data will not be altered or misused. … Only authorized access is allowed. … Customers’ wishes are being honored. Recent surveys of online consumers 70% said privacy was important to them, but only 40% read privacy statements 53%...

Img
security

Loose Unix Technical Security Notes

June 22, 2010

When you start talking about lots of bytes, you get into prefixes like kilo, mega and giga, as in kilobyte, megabyte and gigabyte (also shortened to K, M and G, as in Kbytes, Mbytes and Gbytes or KB, MB and GB). The following table shows the multipliers: Basic UNIX...

Img
security

FIPS 196

June 9, 2010

Entity authentication using public key cryptography Extends and clarifies ISO 9798 entity authentication standard Signed challenge/response protocol: Server sends server nonce SN Client generates client nonce CN Client signs SN and CN and returns to server Server verifies signature on the data Mutual authentication uses a three-pass protocol Server...

Img
security

Basic Windows Incident response tools

June 8, 2010

  Tool Use Netstat.exe Displays protocol statistics and current TCP/IP network connections. Arp.exe Displays and modifies the IP-to-Physical address translation tables used by address resolution protocol (ARP). Net.exe Net used with [ ACCOUNTS | COMPUTER | CONFIG | CONTINUE | FILE | GROUP | HELP |   HELPMSG | LOCALGROUP...

Img
security

Logfile Auditing Spectrum

June 7, 2010

Things to consider: Full Administrative Audit Trail All management operations logged Full User Audit Trail All session activity (login, logout, timeout) All network flows (not just web) All System Events Support for External Syslog Servers https://www.bestitdocuments.com/Samples

Img
security

CIRT and other Incident sources of information

June 6, 2010

Audit Evidence Requirement. IS Auditing Guideline. Information Systems Audit and Control Computer Security Incident Handling: Step-by-Step. System Administration Networking and Security (SANS) Institute Publications. Computer Security Incident Response Policy. The Center for Information Technology. Detecting Signs of Intrusion. CERT Coordination Center. Carnegie Mellon Software Prepare to respond to intrusions....

Img
security

Radious Authentication

June 5, 2010

Remote authentication for user services Provides an authentication server for one or more clients VPN, Wreless or legacy (dial-in hosts) Client communicates with RADIUS server via encrypted communications using a shared secret key Radius Protocol: Client forwards user access request to RADIUS server Server replies with Reject access Allow...

Img
security

Data Archiving Landscape Today

June 4, 2010

Databases Structured data Application specific Performance driven Limited solutions available       Email Out of control Semi-structured data Well-understood applications       Distributed files Unstructured data Content searchable (documents) Non-content searchable (media) SRM/HSM type solutions Emerging data indexing solutions       Mainframe files Semi-structured data HSM solutions Many products...

Img
o-s

Why Backups alone are not enough

June 3, 2010

Poor policy management No Standards or procedures No indexing or search capabilities Poor segmentation Data is “consolidated” on media haphazardly according to source time and place rather than according to policy Data sharing the same media cannot be truly expired Retrieval requests will bring back unrelated data Unworkable as...

Img
projects

Powerpoints – Project Training Slides

June 2, 2010

Project Training PowerPoints Project_Training.zip https://www.bestitdocuments.com/Samples

Img
business

Sample – TGIS – Scope of Work

June 2, 2010

System Planning, Design and Implementation Route Design Analysis and Seasonal Field Activity Support Software Development GIS System Automation Hardcopy and Digital Product Development Data Quality Assurance and Reporting Documentation and Standards Requirements gathering continues (will continue throughout the project) Engineering data (mostly in-house) Route design and seasonal field activity...

Img
o-s , visio-stencils

Sample Visio – What is a File System?

June 1, 2010

The software used to organize and manage the data stored on disk drives. In addition to storing the data contained in files, a file system also stores and manages important information about the files and about the file system itself. Modern File Systems UFS:  The archetypal Unix file system...

Img
security

Public-key-based Authentication

June 1, 2010

Simple PKC-based challenge/response protocol Server sends challenge Client signs challenge and returns it Server verifies clients signature on the challenge Vulnerable to chosen-protocol attacks Server can have client sign anything Algorithm-specific attacks (eg RSA signature/encryption duality) https://www.bestitdocuments.com/Samples

Img
compliances

Caring for Archives

May 31, 2010

Physical maintenance of the records All metal paper clips, rusting staples, and rubber bands should be removed. Documents should be in containers that prevent dust from entering Large items should be stored flat. The ideal storage area for records: Amenable to consistent environmental control (temperature and humidity) No water...

Img
business , security

The Loss of Corporate Knowledge

May 31, 2010

The challenges are related to people and strategy: Attracting & Retaining Talented People                                                      9% Identifying the Right Team/Leader for Knowledge                              15% Defining Standard Processes for Knowledge Work                                 24% Setting the Appropriate Scope for Knowledge Initiatives                 24% Mapping the Organizations Existing Knowledge                                     28% Justifying the...

Img