Our documents are based on successfully executed projects which save you time and money.
business , compliances , security

Healthcare Industry Segmentation

March 14, 2010

Healthcare Payers National Health Insurance Plans Federal Government (CMS – Medicare) State Government (DHHS – Medicaid) Healthcare Providers Hospitals Long-Term Care Facilities Physician Medical Practices Specialty Care Providers (Outpatient, Oncology, etc) Affiliated Organizations Clearinghouses, Third Party Administrators, etc. Key Business Drivers The revenue source of a hospital is driven...

Img
o-s , security

Which User Files on your Windows 200x Workstation Should Be Backed Up?

March 13, 2010

Introduction: All PC users are provided with a hard drive in order to store their local data. To assure that important information is not lost in the event disk drive disaster, each person must establish a strategy to back up their own data. “Back up” is the process used...

Img
o-s , security

Startup Apps and Windows 2000-based Services

March 13, 2010

Excellent reference – Searchable, comprehensive list of the programs you may find that run when you switch on your PC: http://www.pacs-portal.co.uk/startup_content.php#THE_PROGRAMS – Full-list ZIP Windows 2000 startup services   Service Full Name Default Alerter  Alerter  Automatic  AppMgmt  Application Management  Manual  ClipSrv  ClipBook  Manual  EventSystem  COM+ Event System  Manual  Browser ...

Img
o-s , security

Assets

March 13, 2010

An asset is anything that has some value to an organization. Asset Identification • It is necessary to determine the assets that need protection, their value, and level of protection required • Two Types: » Tangible » Intangible Tangible Assets • Tangible assets are physical • Examples: » Personnel » Offices, workspaces, warehouses, etc. » Inventory, stores,...

Img
security

Fine-Grained Access Controls

March 13, 2010

Implement Security Policy · Create rules to enforce access control policy · Control ports, protocols, and direction · Implement policy schedule based on operational needs • Limit exposure to application vulnerabilities • Dynamically open and close networking ports · Provide Forensic Information • Monitor and log all network connections · Provide In-Line Protection • React and intervene...

Img
compliances , information-rights-management , security

Consderations for Securing your environment

March 13, 2010

Identify Access Points In the electronically open organization… • Who has access to your internal network? – Employees in the office or remote, using VPNs – Contractors, consultants, temporary workers – Customers, suppliers, and partners via extranet – Outsiders who have penetrated the perimeter • Operations and resources are becoming more distributed –...

Img
o-s , security

How to Stop and Restart the Ace Service on the RSA Service

March 13, 2010

Analysis:             On the RSA Server do:                         ps – ef | greg ace  (lower-case)  – check to see if the ace process is running if not su –             su – ace   “provide password” To start from scratch (note the order):         /var/ace/prog/aceserver stop        1st (stops the ACE...

Img
application , security

Sample Directory Services Consolidation Project

March 12, 2010

Directory Services is an integral component of the solutions an enterprise data center should offer its clients.  It is advisable to initiate a project to migrate and consolidate the Corporate departments, existing directory services, including Windows, Netware, and any others.  It is recommended to consolidate all directory services to...

Img
application , security , web-services

Sample – Shared Application Development and Testing Environment Project

March 12, 2010

The availability of a shared application development and testing environment will provide agencies parallel production-like environments without having to maintain and purchase equipment for the department sites. Multiple standard environments can quickly be provisioned into a server partition in less than 15 minutes (based on predefined server builds and the...

Img
networking , security

Download Sample External Vulnerability Assessment

March 12, 2010

External Vulnerability Assessment https://www.bestitdocuments.com/Samples

Img
compliances , security

Regulation Impact by IT Technology Domains

March 11, 2010

Sarbanes Oxley Act HIPAA Gramm-Leach-Bliley Act SEC 17a-4 and NASD and NASD Financial compliance, business process measurement applications X Enterprise resource planning X Business intelligence and data warehousing X Content/document  management and search X X X X Data/application integration X Business process automation X X Records management and email...

Img
networking , security

Suggested Perimeter Network TCP/IP Filters

March 11, 2010

Carefully consider which TCP/IP services will be allowed through and to the perimeter routers and firewalls (inbound and outbound). Use the following guidelines for creating filters:  those services that are not explicitly permitted are prohibited.  The following tables present common services to restrict because they can be used to...

Img
compliances , networking , sample-it-spreadsheets , security

Sample Architectural Key Components Planning Document

March 11, 2010

Introduction Technology Component Name: Initiator: Problem/Opportunity Definition This is the problem or opportunity that caused the inception of the project. Business Drivers This section contains any business drivers that are associated with this component (if applicable). High Level Business Requirements This section provides the “what” of the business need....

Img
networking , security

Network Fault Management Description

March 11, 2010

Faults can be defined as any failure or outage in the network.  These can be system or service related and often times are masked as a downstream product of a combination of the two.  Proactive fault analysis is an essential component of network management deployment. The same type of...

Img
compliances , security , visio-stencils

Sample Visio – MIL-STD-100 and DOD-STD-1000

March 11, 2010

Free Visio Document download MIL-STD100_Sample.vsd The MIL-STD-100 and DOD-STD-1000 standards suck, they are vague and generally interpretive and un-atainable. Below are some recommendations for at least good guidelines. Items necessary for good network documentation Identification of servers, workstations, printers, routers, switches, etc. IP addresses NetBIOS/Host names MAC addresses Description...

Img
networking , security

VLAN Security Test

March 11, 2010

Intrusion Detection FAQ: Are there Vulnerabilites in VLAN Implementations? VLAN Security Test Report http://www.sans.org/security-resources/idfaq/vlan.php  

Img
networking , security

Sample VLAN Project Charter

March 11, 2010

  Sample VLAN Project Charter Implement a Virtual Local Area Network Solution Project Overview Business Case Background and Rationale for the project As outlined by the gap analysis our internal auditors, our internal network has numerous security weaknesses. In short, once our local area network (LAN) has been accessed,...

Img
networking , security

Sample VLAN Request Form

March 11, 2010

  Overview   Add or Remove Specify “add” to add new access, or “remove” to remove access that is no longer required. Note that to achieve the best protection for your application, you should request the removal or any access that is no required. Subnet / Mask The IP...

Img
compliances , security

Wireless Security Checklist

March 10, 2010

Data collection: via Kismet. (freeware): · Is the access point (AP) beaconing? (Is the AP configured to send beacon packets?) · Is the access link layer encryption enabled? (Wireless Encryption Protocol) · Is strong link layer encryption enabled? (128 bit WEP) · What channel is the traffic broadcast on? · Is the network...

Img
compliances , security

Sample MIL-STD-100 Objectives

March 10, 2010

The primary objective of the Standard Operating Environment was to develop the platform baseline for the Network Management Systems for Corporate campuses (Corporate NSM).   This standard methodology would then be applied to all campuses in the implementation of the Enterprise Network Management Platform. · Detail the NSM solution including...

Img
security , virtual-vmware

Citrix Security Checklist

March 9, 2010

· Does a unique account group for Citrix users exist? · Are default user accounts disabled on the server? · Does the server have the latest security patches installed? · Is the Administrator account name default? · Are one-time-passwords used?

Img
o-s , security

Windows XP Host Assessment Checklist

March 9, 2010

· Are Physical Security measures in place? · Is the BIOS password protected? · Does the computer Boot from a CD? · Is AutoRun for the CD-ROM enabled? · Is it possible to run Programs from the CD? · Are Operating System Restrictions in place? · Is NTFS enabled on all partitions? · Is File Sharing...

Img
networking , security

Network Security Items to Consider

March 8, 2010

Hardware Security Hardware asset management Inventory of assets Inventory of IT assets Hardware maintenance and support Network Security Network security management Security of network services Network controls Security of network services Network access control Network routing control User authentication for external connections User authentication for external connections Equipment identification...

Img
compliances , information-rights-management , security

Identifying Identity Management Needs

March 8, 2010

Author unknown  Is your network a collection of different systems and applications? Are there multiple directories and data systems? Are there users and other data objects stored in multiple places? How is the environment managed? How are new accounts created for users each time a new application is added?...

Img
compliances , information-rights-management , security

Solaris Role-Based Access Controls

March 7, 2010

UNIX administrators have wanted more fine-grained access control to administrative features almost since the first administrator accidentally destroyed his first system. As of Solaris 8, Sun has delivered a solution to that problem. But is the solution for you? The Current State The UNIX concept of a “superuser” who...

Img
information-rights-management , security

Manually Configuring Privileges

March 7, 2010

The manual process for provisioning poses a huge challenge for today’s businesses. Believe it or not, most companies still use manual processes to provision access rights to users. Step 1  First, when an employee is hired, a new user profile is created and stored in an HR database. Step...

Img
application , security , web-services

Application Threats and Vulnerabilities

March 7, 2010

  Application Threats and Vulnerabilities    Oracle MS SQL Server Sybase Lotus Domino Denial of Service SNMP DoS   Malformed RPC Absolute value of numeric DoS Unicode DoS Redirection DoS   Request DoS   Select All DoS  IIOP DoS ID/Password Control Issues Default passwords Default passwords Default passwords Default passwords Brute force...

Img
compliances , security , web-services

What is an x.509 Digital Certificate Structure

March 7, 2010

X.509 certificates have the following fields. Version x.509 version:  0=v1, 1=v2, 2=v3 serialNumber Controlled by CA, assigned to each cert signature algorithm OID of the algorithm used for digital signature issuer name Ex “sha1WithRSAEncryption” or “dsa-with-sha1” validity period x.500 Distinguished Name (DN) of the CA subject name Expiration date...

Img
business , compliances , networking , o-s , security

IT administrators are not doing enough to patch vulnerabilities

March 7, 2010

Stringent patching and patch management is key to anti-virus security management 1. Protection from malware 2. Secure connectivity 3. Protection from Inappropriate Content 4. Maximization of Network Resources 5. Protection of Resources 6. Ease of IT administration 7. Maximization of performance 8. Budget Management How to Secure Malware Threat...

Img
compliances , o-s , security

Event Viewer Log Review

March 5, 2010

It is important to frequently check the XP / Vista and Server Event Viewer to review log files for possible security concerns. It is optimal to log a minimum of seven days of activity in the application, system, and security logs. In order to maintain the information for seven...

Img
networking , security

Switching Analysis Check Considerations

March 4, 2010

1. Scale-able Speeds 2. Bandwidth & Connection Management 3. Congestion Control & Switch Capacity 4. Industry standards 5. Internetworking 6. Fault Tolerance 7. Modularity 8. Common Manageability § Common Console § Common Alerting o Trap implementation across all products o Importing new MIBs § Your customers § Other vendors o Start Sniffer Trace File Capture o Quarantine (AV from enterprise) 9.   Common Reporting 10. Common...

Img