Our documents are based on successfully executed projects which save you time and money.
Img (719) 315-0404
networking , security

Network Security Items to Consider

March 8, 2010

Hardware Security Hardware asset management Inventory of assets Inventory of IT assets Hardware maintenance and support Network Security Network security management Security of network services Network controls Security of network services Network access control Network routing control User authentication for external connections User authentication for external connections Equipment identification...

Img
compliances , information-rights-management , security

Identifying Identity Management Needs

March 8, 2010

Author unknown  Is your network a collection of different systems and applications? Are there multiple directories and data systems? Are there users and other data objects stored in multiple places? How is the environment managed? How are new accounts created for users each time a new application is added?...

Img
compliances , information-rights-management , security

Solaris Role-Based Access Controls

March 7, 2010

UNIX administrators have wanted more fine-grained access control to administrative features almost since the first administrator accidentally destroyed his first system. As of Solaris 8, Sun has delivered a solution to that problem. But is the solution for you? The Current State The UNIX concept of a “superuser” who...

Img
information-rights-management , security

Manually Configuring Privileges

March 7, 2010

The manual process for provisioning poses a huge challenge for today’s businesses. Believe it or not, most companies still use manual processes to provision access rights to users. Step 1  First, when an employee is hired, a new user profile is created and stored in an HR database. Step...

Img
application , security , web-services

Application Threats and Vulnerabilities

March 7, 2010

  Application Threats and Vulnerabilities    Oracle MS SQL Server Sybase Lotus Domino Denial of Service SNMP DoS   Malformed RPC Absolute value of numeric DoS Unicode DoS Redirection DoS   Request DoS   Select All DoS  IIOP DoS ID/Password Control Issues Default passwords Default passwords Default passwords Default passwords Brute force...

Img
compliances , security , web-services

What is an x.509 Digital Certificate Structure

March 7, 2010

X.509 certificates have the following fields. Version x.509 version:  0=v1, 1=v2, 2=v3 serialNumber Controlled by CA, assigned to each cert signature algorithm OID of the algorithm used for digital signature issuer name Ex “sha1WithRSAEncryption” or “dsa-with-sha1” validity period x.500 Distinguished Name (DN) of the CA subject name Expiration date...

Img
business , compliances , networking , o-s , security

IT administrators are not doing enough to patch vulnerabilities

March 7, 2010

Stringent patching and patch management is key to anti-virus security management 1. Protection from malware 2. Secure connectivity 3. Protection from Inappropriate Content 4. Maximization of Network Resources 5. Protection of Resources 6. Ease of IT administration 7. Maximization of performance 8. Budget Management How to Secure Malware Threat...

Img
compliances , o-s , security

Event Viewer Log Review

March 5, 2010

It is important to frequently check the XP / Vista and Server Event Viewer to review log files for possible security concerns. It is optimal to log a minimum of seven days of activity in the application, system, and security logs. In order to maintain the information for seven...

Img
networking , security

Switching Analysis Check Considerations

March 4, 2010

1. Scale-able Speeds 2. Bandwidth & Connection Management 3. Congestion Control & Switch Capacity 4. Industry standards 5. Internetworking 6. Fault Tolerance 7. Modularity 8. Common Manageability § Common Console § Common Alerting o Trap implementation across all products o Importing new MIBs § Your customers § Other vendors o Start Sniffer Trace File Capture o Quarantine (AV from enterprise) 9.   Common Reporting 10. Common...

Img
information-rights-management , security

IAM Useful Glossary

March 2, 2010

Access Control An access control limits the use of a resource. Only those people, programs or devices that are specifically permitted to use the resource will have access. In addition, an access control will usually limit use to specific types of access; someone can read a file but not...

Img
information-rights-management , security

Sample SSO Deployment

March 2, 2010

Process / Functional Requirements Functionality: Users should login only once to their PC.  Then be able to access all applications without logging in again. If integration of Single Sign On solution is not possible with NT domain/AD, users should be able to log into one application and be automatically...

Img
information-rights-management , security , visio-stencils

Sample Visio – IAM Deployment Process

March 2, 2010

The first step in implementing an identity management solution is identifying business objectives, policies and strategies both current and future.  next, a complete evaluation of the identity repositories, current identity management implementations (i.e., synchronizing messaging and desktop Ids), political boundaries and current vendor capital investments and loyalty.  This is...

Img
security

Knowledge Management Key Points

March 2, 2010

Regulators have updated Contingency Planning guidance since 9-11.  Financial institutions should ensure that Disaster Recovery and contingency include any new requirements. Financial institutions should compare federal and state regulatory requirements to ensure more stringent requirements are adequately addressed. Review existing plans to ensure natural area, building complex and terrorist...

Img
business , compliances , networking , security

Personal Computer / LAN Security Guidelines

February 28, 2010

Incorporate the following tips into your daily routine to ensure that any pc or LAN you use is secure · Lock your pc with a power on password · Lock your pc with a keyboard password when away from your desk · Back up your work regularly · Store and lock diskettes...

Img
compliances , security

What is a DoS Attack

February 28, 2010

A specific directed attempt by individuals to cripple or deny access to technology resources. Most Dos attacks are directed to Internet online services. Techniques: Resource Exhaustion Attacks Flood the victim (server) with packets Bandwidth Consumption Attacks Overload packet processing capacity Saturate network bandwidth Result of the attack Network starvation...

Img
compliances , security

Anatomy of a hack

February 28, 2010

1. Acquire target 2. Footprint the system 3. Gain entry to system 4. Escalate privileges 5. Exploit system resources 6. Leave backdoor for later 7. Clean up, get out, cover tracks Risk management · It’s not a matter of if a computer security breach will happen, it’s a matter of when, and how prepared will you...

Img
application , security , web-services

Useful SQL Commands

February 28, 2010

SQL Commands Begin Statements that make up the block. Built In functions Most SQL data functions are supported within PL/SQL blocks. Code storage Blocks may be stored within an Oracle database as procedures, functions, packages (a group of blocks) and triggers. Composite Datatypes Records allow groups of fields to...

Img
application , security , web-services

SQL Design Considerations

February 28, 2010

In order to assist us in designing your database, please have your applications and dba review and answer the following questions. SQL: • Has SQL been explained/optimized? • Have ‘bind variables’ been used? ie select * from my.table where name = :b1; Bind variables are not actually substituted until...

Img
application , security , web-services

SQL Security Overview

February 28, 2010

SQL, maintains it own internal security umbrella including password encryption, password aging, minimum length restrictions on passwords and user account management resources. Integrated security relies on trusted connections, which are only available with both named pipes protocol and MS new RPC based multi-protocol net library. Because SQL Server supports...

Img
o-s , policies , security

Hotel Room Security

February 28, 2010

Security in your own hotel room should be a top priority, whether you are traveling for business or pleasure. In an attempt to make your valuables more secure, many hotels are tightening security by installing small safes in every room and issuing coded insert cards instead of numbered keys...

Img
business , compliances , security

Websense Web Filtering Software Overview

February 27, 2010

How Websense Works Websense is based on pass-through filtering technology, the most accurate, reliable and scalable method of Internet filtering. Pass-through filtering requires all requests for Web pages to pass through an Internet control point such as a firewall, proxy server or caching device. Websense is integrated with these...

Img
application , security

Database Security Assessment Overview

February 27, 2010

Oracle Security Assessment Checklist 1. Is the Oracle software owner account locked to prevent remote logins? 2. Are the Audit database user activities – logins and failures – logged? 3. Where is the Audit information stored? 4. Does the Oracle user own all of the files in $Oracle_root$/bin? 5. Are there any help and...

Img
compliances , policies , security

IT Auditing Standards Guidance

February 27, 2010

Guidelines provide guidance in applying IT Auditing Standards. The IT auditor should consider them in determining how to achieve Implementation of the standards, use professional judgment in their application and be prepared to justify any departure. The objective of the IS Auditing Guidelines is to provide further information on...

Img
business , compliances , security

IT Auditing Cobit Mapping

February 26, 2010

Linkage to COBIT COBIT Framework states, “It is management’s responsibility to safeguard all the assets of the enterprise. To discharge this responsibility as well as to achieve its expectations, management should establish an adequate system of internal control.” COBIT Management Guidelines provides a management-oriented framework for continuous and proactive...

Img
business , networking , security

Sample Cisco Options Matrix

February 25, 2010

  Networking Devices Description Type Comments Firewall (Internal) Embedded into internal switch   Load Balancer (Internal) Cisco CSS 11500 With SSL Termination/Fiber GigE Load Balancer (Perimeter) Cisco CSS 11500 With SSL Termination/Fiber GigE Router (Border) Cisco 7600 Router Fiber GigE Interface Switch (BOso) Cisco 2900   Switch (Internal) Cisco Catalyst...

Img
application , security , web-services

Directx, Java and Activex runtime errors and diagnostics

February 25, 2010

52 Runtime Error This is a “bad file name or number” error in JavaScript. It means that the script cannot find a file it is looking for (web-page, course component) and is most likely a connectivity problem. Try to clear your temporary internet files which should resolve any further...

Img
business , security

How to Develop a Network Security Policy

February 23, 2010

An Overview of Internetworking Site Security Introduction This document is for business executives, and others, who want to know more about Internet and internetworking security, and what measures you can take to protect your site. Presented is a high-level overview of the issues, realities, and technologies available to protect...

Img
business , compliances , security

Checklist for Disaster Recovery

February 22, 2010

When reviewing disaster recovery plans, the first step is to determine the financial impact of data downtime. How long can your business remain afloat without your critical data? This information will affect your decisions concerning the sophistication and capabilities of your disaster recovery solution. Governmental regulations should also be...

Img
business , compliances , data-center-soc-noc , security

Sample Disaster Recovery Test Plan (Structure)

February 22, 2010

1.      Test Planning a.       Objectives b.      Test Procedures c.       Test Plan Review d.      Assumption Validation   2.      Test Scope a.       Orientation b.      Table Top c.       Functional d.      Full Scope   3.      Test  Coordinator and Team   4.      Result Analysis a.       Objectives Completed b.      Validity and accuracy of test data...

Img
compliances , networking , security

DoS

February 22, 2010

Aurthor unknown Whether launched by high school novices or savvy cyber-terrorists, Denial-of-Service (DoS) attacks have become a threat to network reliability. These attacks often result in considerable loss of time and money since they consume scarce and expensive resources: network bandwidth, memory and disk space, CPU time, access to...

Img
business , compliances , security

Outsourcing

February 21, 2010

The most effective outsourcing model occurs when you develop a strong partnership with your supplier, hold regular high-level strategic reviews, and implement a process for continual improvement that is underpinned by both performance and client satisfaction measures. Maintaining quality, transparency, confidentiality and anonymity is paramount for a successful outsourcing...

Img