Our documents are based on successfully executed projects which save you time and money.
business , compliances , security

Websense Web Filtering Software Overview

February 27, 2010

How Websense Works Websense is based on pass-through filtering technology, the most accurate, reliable and scalable method of Internet filtering. Pass-through filtering requires all requests for Web pages to pass through an Internet control point such as a firewall, proxy server or caching device. Websense is integrated with these...

Img
application , security

Database Security Assessment Overview

February 27, 2010

Oracle Security Assessment Checklist 1. Is the Oracle software owner account locked to prevent remote logins? 2. Are the Audit database user activities – logins and failures – logged? 3. Where is the Audit information stored? 4. Does the Oracle user own all of the files in $Oracle_root$/bin? 5. Are there any help and...

Img
compliances , policies , security

IT Auditing Standards Guidance

February 27, 2010

Guidelines provide guidance in applying IT Auditing Standards. The IT auditor should consider them in determining how to achieve Implementation of the standards, use professional judgment in their application and be prepared to justify any departure. The objective of the IS Auditing Guidelines is to provide further information on...

Img
email , policies

Email Retention Policy – Scope

February 26, 2010

Email A primary communication vehicle • An enterprise collaboration tool • A personal filing cabinet • An electronic record repository • A storage glutton • A legal and data management liability To start with most companies make when creating an email retention policy is not involving all areas of the company in the...

Img
business , compliances , security

IT Auditing Cobit Mapping

February 26, 2010

Linkage to COBIT COBIT Framework states, “It is management’s responsibility to safeguard all the assets of the enterprise. To discharge this responsibility as well as to achieve its expectations, management should establish an adequate system of internal control.” COBIT Management Guidelines provides a management-oriented framework for continuous and proactive...

Img
business , networking , security

Sample Cisco Options Matrix

February 25, 2010

  Networking Devices Description Type Comments Firewall (Internal) Embedded into internal switch   Load Balancer (Internal) Cisco CSS 11500 With SSL Termination/Fiber GigE Load Balancer (Perimeter) Cisco CSS 11500 With SSL Termination/Fiber GigE Router (Border) Cisco 7600 Router Fiber GigE Interface Switch (BOso) Cisco 2900   Switch (Internal) Cisco Catalyst...

Img
business

Vendor Management Considerations

February 25, 2010

Critical Vendors Are they critical to your organization continued viability? Do they capture, house, process, store or dispose of member or organization s confidential information? Are there regulatory requirements? What is our dependence on the vendor? Would they be difficult to replace? Contract Owner Responsibilities Critical Vendor Reviews Performance...

Img
email

Email Archiving Concepts

February 25, 2010

 (Author unknown) • Journaling email creates a real-time copy of all email flowing between the mail server and the secure email boundary, writing this copy to a journaling mailbox within the mail server • Archiving email empties the journaling mailbox at configurable intervals, moving the data to an archive container...

Img
application , security , web-services

Directx, Java and Activex runtime errors and diagnostics

February 25, 2010

52 Runtime Error This is a “bad file name or number” error in JavaScript. It means that the script cannot find a file it is looking for (web-page, course component) and is most likely a connectivity problem. Try to clear your temporary internet files which should resolve any further...

Img
business

Download The Best Research and Visualization Tools

February 25, 2010

Today more than ever it’s important to be able to view many different kinds of data, from many different sources, formats and view them in one perspective. This document represents the sum of many hours of research and conclusions. Enjoy. Research and Visualization Tools.doc https://www.bestitdocuments.com/Samples

Img
email

What the Anti-Spam Laws

February 24, 2010

California Spam Law (formerly SB 186)   Unsolicited commercial e-mail may not be sent from California or to a California address.  The law applies to senders as well as to advertisers on whose behalf messages are sent.  Damages may be up to $1000 for each message sent to an...

Img
email

Email Spam and Attachments

February 24, 2010

What is Spam? Spam is unsolicited email. From the sender’s point-of-view, it’s a form of bulk mail, often to a list culled from subscribers to a discussion group or obtained by companies that specialize in creating email distribution lists. To the receiver, it usually seems like junk email. In...

Img
email

The eMail Threat

February 24, 2010

Security Policy Item  Mail– SMTP (25/tcp) to all machines, which are not external mail relays, POP (109/tcp and 110/tcp), IMAP (143/tcp) Vulnerability  Mail vulnerabilities occupy two spots in the SANS Top Ten:  (sendmail) and (IMAP/POP), and the most common version, sendmail, has sent a constant stream of reports and...

Img
email

Sample eMail Disclaimers

February 24, 2010

Sample: Notice: The information contained in this email and in any attachments is intended only for the person or entity to which it is addressed and may contain confidential and/or privileged material.  If you have received this email in error, please notify us immediately by replying to the message...

Img
business , projects

Why do Software Development Projects fail?

February 23, 2010

For the same reason any other project fails wrong requirements, wrong expectations, wrong outcome. No time to re-use and learn from lessons learned. Worse case scenarios is your project plan just not detailed enough. Below is an example of failed project attempt. Sample software development project Initiation phase Project...

Img
business , security

How to Develop a Network Security Policy

February 23, 2010

An Overview of Internetworking Site Security Introduction This document is for business executives, and others, who want to know more about Internet and internetworking security, and what measures you can take to protect your site. Presented is a high-level overview of the issues, realities, and technologies available to protect...

Img
business

Disaster Recovery Planning Checklist

February 22, 2010

1. Does your firm have the ability to recreate and service the product throughout its life cycle? a. If so, during a disaster would is the cycle to do this? b. Is the cycle short enough to not risk the potential market share loss? c. If not, how long is the cycle,...

Img
business , compliances , security

Checklist for Disaster Recovery

February 22, 2010

When reviewing disaster recovery plans, the first step is to determine the financial impact of data downtime. How long can your business remain afloat without your critical data? This information will affect your decisions concerning the sophistication and capabilities of your disaster recovery solution. Governmental regulations should also be...

Img
o-s

Disk Write Methods

February 22, 2010

  Writing method Write / Read Passes Description Ref: Overwriting with Zero data. 1 Write each byte to 0x00.   Overwriting with Random data. 1 Write each byte to random data or pseudo-random data.   U.S. Government DoD 5220.22-M 4 Pass 1, Random data; Pass 2, Bit-wise complement of...

Img
business , compliances , data-center-soc-noc , security

Sample Disaster Recovery Test Plan (Structure)

February 22, 2010

1.      Test Planning a.       Objectives b.      Test Procedures c.       Test Plan Review d.      Assumption Validation   2.      Test Scope a.       Orientation b.      Table Top c.       Functional d.      Full Scope   3.      Test  Coordinator and Team   4.      Result Analysis a.       Objectives Completed b.      Validity and accuracy of test data...

Img
compliances , networking , security

DoS

February 22, 2010

Aurthor unknown Whether launched by high school novices or savvy cyber-terrorists, Denial-of-Service (DoS) attacks have become a threat to network reliability. These attacks often result in considerable loss of time and money since they consume scarce and expensive resources: network bandwidth, memory and disk space, CPU time, access to...

Img
business , compliances , data-center-soc-noc

SOW Checklist Overview

February 21, 2010

Summary Requirements Scope Of Work In Scope Out Of Scope Term Assumptions, Risks And Constraints Assumptions Risks Constraints Deliverables And Acceptance Criteria Project Approach, Methods, And Tools Approach Methods Tools Facilities Office Locations Delivery Center Locations Environments Conversion Testing Project Management Project Plan      Work Descriptions      Schedule Team...

Img
business , compliances , security

Outsourcing

February 21, 2010

The most effective outsourcing model occurs when you develop a strong partnership with your supplier, hold regular high-level strategic reviews, and implement a process for continual improvement that is underpinned by both performance and client satisfaction measures. Maintaining quality, transparency, confidentiality and anonymity is paramount for a successful outsourcing...

Img
compliances , itil , security

ISO 17999, 2700x and COBIT shorthand

February 19, 2010

The 27000 standard contains 11 security control clauses collectively containing a total of 39 main security categories and one introductory clause introducing risk assessment and treatment. 1. Security Policy (1); 2. Organizing Information Security (2); 3. Asset Management (2); 4. Human Resources Security (3); 5. Physical and Environmental Security (2); 6. Communications and Operations...

Img
compliances , itil , security

ISO-17799 Overview

February 19, 2010

Complementary standards and guidelines where inspired by ISO17799, design to or supports the implementation of ISO17799: AS/NSZ-4360:2004, Risk Management Guidelines HB-231:2004, Information Security Risk Management Guidelines ISO-19011:1996, Guidelines for Management System Auditing PAS56:2003, Guide to Business Continuity Management ISO/TR-18044:2004, Information Security Incident Management ISO-GMITS:1996/2001 (Guidelines for the Management of...

Img
information-rights-management , security

The New E-Discovery Rules

February 18, 2010

Take the Lead in Ensuring Compliance New rules for electronic discovery adopted as part of the Federal Rules of Civil Procedure (FRCP) went into effect December 1, 2006. The purpose of these rules is to streamline e-discovery requests. In an attempt to minimize the number of motions to compel...

Img
compliances , data-center-soc-noc , information-rights-management

Data and Storage Considerations

February 18, 2010

Data Storage – Contents Storage Issues Magnetic Disks File Systems Remote File Access NFS, CIFS, DAFS Disk organizations JBOD, SBOD RAID Storage Virtualization Scatter/Gather Comparing the various RAID levels RAID Performance RAID Implementation Architectural options for storage virtualization Storage Architectures: DAS, SAN, NAS and iSCSI Integration of Fibre Channel...

Img
o-s , virtual-vmware , visio-stencils

VMWare Examples and Visio Stencils

February 14, 2010

Free Sample Document download VMWARE Stencils: Virtual Template 1.vss VMWare_Templates.vsd Virtual Temples.zip AV_Connectors_1.02_drawing.vsd AV_connectors_ver1.01.vss AV_connectors_ver1.02.vss AV_connectors_ver1.02_Visio2002.vss AV.ZIP ActvDir.vsd BFlowcht.vsd BldgPlan.vsd Block Diagram.vsd BNetwork.vsd Brainstm.vsd Calendar.vsd Conference Room.vsd Database.vsd DNetwork.vsd EEctrl.vsd FluidPwr.vsd Meeting Room.vsd mind-map.vsd OrgChart.vsd ProcEng.vsd Project Server Setup Flowchart.vsd Rack.vsd Timeline.vsd UML.vsd Workflow Example.vsd SampleVisio1.zip SampleVisio2.zip SampleVisio3.zip Bunch...

Img
virtual-vmware , visio-stencils

Desktop Virtualization – Alternative Desktop Functional Comparisons vs Tradition PC

February 14, 2010

   Function Traditional PC SMC Thin Client Server Virtualization Video/Audio performance same as traditional PC Yes Yes No No Peripherals compatibility with traditional PC Yes Yes No No Personal settings same as traditional PC Yes Yes No No Printer Compatibility and speed same as traditional PC Yes Yes No...

Img
information-rights-management , security

IRM-Enabled SharePoint Documents in Groove Workspace

February 13, 2010

  Windows Server 2008 has Rights Management Services (RMS, which is a server add-on feature) as an installable role and seamlessly integrated into the OS. Further Information Rights Management (IRM, which is the client ability to comply with what is set to be enforced by RMS) can be enabled in SharePoint...

Img
information-rights-management , sharepoint

AvePoint DocAve

February 8, 2010

AvePoint DocAve 4.5 DocAve is the only truly integrated, easy-to-use, enterprise software that offers a complete set of SharePoint Platform protection and management tools. The award winning gDocAve software platform addresses the need for fast, flexible, and real-time backup, disaster recovery, and administration solutions for MOSS. DocAve Compliance Archiver...

Img