Our documents are based on successfully executed projects which save you time and money.
security

Computer Forensics

February 7, 2010

Great links www.purdue.edu/securepurdue/docs/ComputerForensics.ppt

Img
o-s , virtual-vmware

Alternative Desktop ROI Comparison

February 6, 2010

Environmental factors increasing pressure for new solutions Audit/Control requirements such as Sarbanes Oxley, etc. New legislation; i.e., eDiscovery Desire for ‘Green’ solutions Security and Identity theft grow Disasters Technology Improvements bringing forth new solutions today Server blades & virtualization (VMWare: ESX, GSX, VDI) Software virtualization (MS Softricity, Altiris SVS,...

Img
compliances , security

Things in common with Risk Assessments

February 5, 2010

Vulnerability assessment has many things in common with risk assessment. Assessments are typically performed according to the following steps: · Cataloging assets and capabilities (resources) in a system · Assigning quantifiable value and importance to the resources · Identifying the vulnerabilities or potential threats to each resource · Mitigating or eliminating the...

Img
security

DDOS Attacks – Attack Tools

February 3, 2010

Denial of Service Attacks Denial of service (DoS) attacks involve flooding a system or network with more data than it can handle, so the system crashes or network bandwidth is so clogged that legitimate communications cannot occur. Distributed DoS (DDoS) attacks are more sophisticated. In such an attack, the...

Img
security

Sample Information Security Program

January 30, 2010

A good Information Security Program should address all facets of IT security: Policies, Procedures, and Processes Network Security Physical Security Application Security Identity Management Business Continuity Compliance Information Sharing Threat/Vulnerability Management

Img
security

DoS Attack Details

January 25, 2010

DoS Attack Detail Maintaining a reliable and predictable network has become a strategic imperative for most businesses now dependent on the Internet. DoS attacks, which flood network links or Web sites with useless traffic, have become a serious threat to the reliability of critical business assets. In a DoS...

Img
compliances , information-rights-management , security

ISO-17799:2000 Overview

January 22, 2010

127 controls distributed within 10 categories Information security policy Organizational security Asset classification and control Personnel security Physical & environmental security Communication & operations management Access control System development & maintenance Business continuity management Compliance Uses a Plan/Do/Check/Act implementation and operation model that starts with a risk assessment to...

Img
compliances , security

What’s new in ISO-17799:2005

January 21, 2010

Risk management where addressed only in part 2 document, the part 1 now includes a new chapter on ‘Risk Assessment and Treatment’ requirements ‘Asset classification and control’ evolve into a more holistic ‘Asset management’ approach ‘Personnel Security’ evolve into ‘Human resources security’ which now emphasis on what’s needed before,...

Img
compliances , security

ISO-17799 Overview

January 20, 2010

BS7799 was created in 1999 as a two part document (standard + certification scheme) by the British Standards Institution (BSI) The standard portion was adopted and converted into an ISO standard in 2000 The certification scheme portions is still a BSI only standard and it’s latest revision is dated...

Img
compliances

IT Service Management

January 19, 2010

Components of an IT Service Management service HelpDesk Service Level Management Service Catalog Metering Billing Chargeback https://www.bestitdocuments.com/Samples

Img
information-rights-management , security

Threat Modeling

January 18, 2010

Threats must be understood to build secure systems  Every spec/design goes through threat analysis  Model of component is created  Threats categorized based on STRIDE  Severity ranked based on DREAD  Stride:  S—Spoofing  T—Tampering of Data  R—Repudiation   I—information Disclosure  D—Denial of Service   E—Escalation of Privileges  Dread:  D—Damage potential  R—Reproducibility  E—Exploitability  A—Affected...

Img
compliances , security

PCI Report on Compliance and Visa

January 17, 2010

PCI Compliance Validation. European Payment Council (EPC). Audits and Self-Assessments Network Scans Report on Compliance PCI Report on Compliance and Visa Level 1–3 Merchants Level 1 Merchants (via Acquirer) On-site PCI data security assessment completed by QSA Letter signed by a merchant officer Confirmation of report accuracy form completed...

Img
networking

Sort IP Addresses in Microsoft Excel

January 15, 2010

Excellent excel tip for networking solutions. http://blog.zztopping.com/2009/02/05/how-to-sort-ip-addresses-in-microsoft-excel  

Img
compliances , security

IT Security Management

January 12, 2010

What is Security Management. A proactively discover and detect intrusive activities/vulnerabilities Provide real-time prevention Provide a multi-layered approach to intrusion defense (Host/Network) Integrate any event from the enterprise Collect, consolidate, and normalize events  across the enterprise Filter events, alert and notify personnel,  execute countermeasures Suppress meaningless data Correlate events...

Img
networking , security

Next Generation Real-time Network Defense

January 11, 2010

Requirements: Near Continuous Scanning System Change Alerts Identify “unmanaged” nodes on network Receive frequent vulnerability updates Ongoing monitoring for baseline compliance, vulnerabilities, and threats Standards-based interface to firewall, anti-virus and intrusion prevention systems to support rapid shielding https://www.bestitdocuments.com/Samples

Img
networking , security

Sample RSA Server Architecture

January 10, 2010

Free – Document download Sample RSA Server Architecture https://www.bestitdocuments.com/Samples

Img
compliances , networking , sample-it-spreadsheets

Sample Excel – CA – Spectrum Polling spreadsheet

January 4, 2010

Free – Document download Spectrum Polling Collection Spreadsheet https://www.bestitdocuments.com/Samples

Img
compliances , sample-it-spreadsheets , web-services

Sample Excel – Gartner Web Evaluation Tool

January 4, 2010

Free Excel document download Gartner Web Evaluation Tool: http://www.aworc.org/went2001/tracks/joint/all-tool-web-evaluation.xls https://www.bestitdocuments.com/Samples

Img
o-s , security

Download Windows 2kx Active Directory Properties

December 29, 2009

Active Directory Properties https://www.bestitdocuments.com/Samples

Img
email

The cost of SPAM

December 28, 2009

When automation is used to send out unwanted emails to very many people the total wasted time becomes a significant resource. An 80 year life expectancy is 2,524,608,000 seconds. If it takes just 2 seconds to identify and delete each unwanted email, sending out 631,152,000 unwanted emails, which arrive...

Img
information-rights-management , security

12 Security Awareness Considerations

December 11, 2009

Encourage users to log off when absent and require password-protected screensavers on PCs. Encourage use of strong passwords made of mixed letters, numbers and special characters. Encourage a clear, well-defined, written security policy, with all users having a copy. Discourage installing modems on networked workstations. Encourage use of encryption...

Img
projects

The Project Summary

November 27, 2009

It’s not enough to say what you’re going to do… …You must explain, in detail, how  you’re going to do it! The project summary may be the only part of your proposal that some reviewers read. Funding agencies typically assemble panels of experts to review dozens of proposals at...

Img
o-s

Setting up your PC

November 11, 2009

The Configuration When you first set up a new PC, you should refer to the owner’s manual for all technical specifications. To start your PC Notebook, document the following basic configuration information:  Make, model, and speed of CPU Amount of RAM and what type the system uses The make,...

Img
application , security , web-services

Application Security Related Activities

November 9, 2009

Security Objectives. Define security objectives and requirements early in the process. Security objectives are goals and constraints that affect the confidentiality, integrity, and availability of your data and application. Design Guidelines for Security. To avoid many of the vulnerabilities introduced by poor design choices, your design activity should use...

Img
security

Sample – Internet Footprint Intelligence Review

November 7, 2009

Purpose Scouting and scavenged information from a Network and Internet presence that can be analyzed as business intelligence. Objective Size and scope of the Internet presence Task A measurement of the security policy to future network plans Tasks to perform for a thorough Competitive Intelligence Scouting Map and measure...

Img
security

Internet Footprint Intelligence Review

November 2, 2009

Purpose Scouting and scavenged information from a Network and Internet presence that can be analyzed as business intelligence. Objective Size and scope of the Internet presence Task A measurement of the security policy to future network plans Tasks to perform for a thorough Competitive Intelligence Scouting Map and measure...

Img
application , web-services

Application Testing

October 20, 2009

Testing plays a critical role in the development of the web site and its long-term maintenance. While smaller web sites—especially those with more limited budgets—may not need to follow the formal testing procedures that are required for large-scale, commercial web sites, every site needs to be thoroughly tested to...

Img
application , networking , web-services

OS Jobs Scripts Can Do

October 14, 2009

Windows Script Host provides objects for manipulation of your scripts. Here are some of the tasks that these objects and services can do for you: Map network drives Connect to printers Modify environment variables e.g. Temp Run basic functions such as CreateObject and GetObject Print a message to a...

Img
application , security , web-services

MySQL Installation Notes on Windows 200x and IIS 6 / 7

October 13, 2009

This document describes the steps necessary to do a basic mySQL database engine installation on a computer running Windows 2000x Server and IIS 6. What you’ll need Windows 200x Server running Internet Information Server (IIS) 6.0 A copy of the mySQL binary distribution for Windows NT / 200X The...

Img
application , security , web-services

Basic SQL Parameters

October 10, 2009

Memory, max size in 2 kb units available to SQL User connections, max number of worker threads that are available for SQL server process, default is 255. Max Worker Threads, the number of worker threads that are available for SQL server processes. Default is 255. SMP concurrency, controls the...

Img
application

Setting your MySQL Administrator password and creating Guest Passwords

October 8, 2009

Once MySQL installed & operational, you should immediately set the password for your administrator account (called “root”) and set up at least one guest account, which has limited privileges. Iin the case of the example specified below, the user named “guest” only has SELECT privileges for the database database_name...

Img