Our documents are based on successfully executed projects which save you time and money.
information-rights-management , security

IAM Useful Glossary

March 2, 2010

Access Control An access control limits the use of a resource. Only those people, programs or devices that are specifically permitted to use the resource will have access. In addition, an access control will usually limit use to specific types of access; someone can read a file but not...

Img
information-rights-management , security

Sample SSO Deployment

March 2, 2010

Process / Functional Requirements Functionality: Users should login only once to their PC.  Then be able to access all applications without logging in again. If integration of Single Sign On solution is not possible with NT domain/AD, users should be able to log into one application and be automatically...

Img
information-rights-management , security , visio-stencils

Sample Visio – IAM Deployment Process

March 2, 2010

The first step in implementing an identity management solution is identifying business objectives, policies and strategies both current and future.  next, a complete evaluation of the identity repositories, current identity management implementations (i.e., synchronizing messaging and desktop Ids), political boundaries and current vendor capital investments and loyalty.  This is...

Img
security

Knowledge Management Key Points

March 2, 2010

Regulators have updated Contingency Planning guidance since 9-11.  Financial institutions should ensure that Disaster Recovery and contingency include any new requirements. Financial institutions should compare federal and state regulatory requirements to ensure more stringent requirements are adequately addressed. Review existing plans to ensure natural area, building complex and terrorist...

Img
business , compliances , networking , security

Personal Computer / LAN Security Guidelines

February 28, 2010

Incorporate the following tips into your daily routine to ensure that any pc or LAN you use is secure · Lock your pc with a power on password · Lock your pc with a keyboard password when away from your desk · Back up your work regularly · Store and lock diskettes...

Img
compliances , security

What is a DoS Attack

February 28, 2010

A specific directed attempt by individuals to cripple or deny access to technology resources. Most Dos attacks are directed to Internet online services. Techniques: Resource Exhaustion Attacks Flood the victim (server) with packets Bandwidth Consumption Attacks Overload packet processing capacity Saturate network bandwidth Result of the attack Network starvation...

Img
compliances , security

Anatomy of a hack

February 28, 2010

1. Acquire target 2. Footprint the system 3. Gain entry to system 4. Escalate privileges 5. Exploit system resources 6. Leave backdoor for later 7. Clean up, get out, cover tracks Risk management · It’s not a matter of if a computer security breach will happen, it’s a matter of when, and how prepared will you...

Img
application , security , web-services

Useful SQL Commands

February 28, 2010

SQL Commands Begin Statements that make up the block. Built In functions Most SQL data functions are supported within PL/SQL blocks. Code storage Blocks may be stored within an Oracle database as procedures, functions, packages (a group of blocks) and triggers. Composite Datatypes Records allow groups of fields to...

Img
application , security , web-services

SQL Design Considerations

February 28, 2010

In order to assist us in designing your database, please have your applications and dba review and answer the following questions. SQL: • Has SQL been explained/optimized? • Have ‘bind variables’ been used? ie select * from my.table where name = :b1; Bind variables are not actually substituted until...

Img
application , security , web-services

SQL Security Overview

February 28, 2010

SQL, maintains it own internal security umbrella including password encryption, password aging, minimum length restrictions on passwords and user account management resources. Integrated security relies on trusted connections, which are only available with both named pipes protocol and MS new RPC based multi-protocol net library. Because SQL Server supports...

Img
o-s , policies , security

Hotel Room Security

February 28, 2010

Security in your own hotel room should be a top priority, whether you are traveling for business or pleasure. In an attempt to make your valuables more secure, many hotels are tightening security by installing small safes in every room and issuing coded insert cards instead of numbered keys...

Img
business , compliances , security

Websense Web Filtering Software Overview

February 27, 2010

How Websense Works Websense is based on pass-through filtering technology, the most accurate, reliable and scalable method of Internet filtering. Pass-through filtering requires all requests for Web pages to pass through an Internet control point such as a firewall, proxy server or caching device. Websense is integrated with these...

Img
application , security

Database Security Assessment Overview

February 27, 2010

Oracle Security Assessment Checklist 1. Is the Oracle software owner account locked to prevent remote logins? 2. Are the Audit database user activities – logins and failures – logged? 3. Where is the Audit information stored? 4. Does the Oracle user own all of the files in $Oracle_root$/bin? 5. Are there any help and...

Img
compliances , policies , security

IT Auditing Standards Guidance

February 27, 2010

Guidelines provide guidance in applying IT Auditing Standards. The IT auditor should consider them in determining how to achieve Implementation of the standards, use professional judgment in their application and be prepared to justify any departure. The objective of the IS Auditing Guidelines is to provide further information on...

Img
business , compliances , security

IT Auditing Cobit Mapping

February 26, 2010

Linkage to COBIT COBIT Framework states, “It is management’s responsibility to safeguard all the assets of the enterprise. To discharge this responsibility as well as to achieve its expectations, management should establish an adequate system of internal control.” COBIT Management Guidelines provides a management-oriented framework for continuous and proactive...

Img
business , networking , security

Sample Cisco Options Matrix

February 25, 2010

  Networking Devices Description Type Comments Firewall (Internal) Embedded into internal switch   Load Balancer (Internal) Cisco CSS 11500 With SSL Termination/Fiber GigE Load Balancer (Perimeter) Cisco CSS 11500 With SSL Termination/Fiber GigE Router (Border) Cisco 7600 Router Fiber GigE Interface Switch (BOso) Cisco 2900   Switch (Internal) Cisco Catalyst...

Img
application , security , web-services

Directx, Java and Activex runtime errors and diagnostics

February 25, 2010

52 Runtime Error This is a “bad file name or number” error in JavaScript. It means that the script cannot find a file it is looking for (web-page, course component) and is most likely a connectivity problem. Try to clear your temporary internet files which should resolve any further...

Img
business , security

How to Develop a Network Security Policy

February 23, 2010

An Overview of Internetworking Site Security Introduction This document is for business executives, and others, who want to know more about Internet and internetworking security, and what measures you can take to protect your site. Presented is a high-level overview of the issues, realities, and technologies available to protect...

Img
business , compliances , security

Checklist for Disaster Recovery

February 22, 2010

When reviewing disaster recovery plans, the first step is to determine the financial impact of data downtime. How long can your business remain afloat without your critical data? This information will affect your decisions concerning the sophistication and capabilities of your disaster recovery solution. Governmental regulations should also be...

Img
business , compliances , data-center-soc-noc , security

Sample Disaster Recovery Test Plan (Structure)

February 22, 2010

1.      Test Planning a.       Objectives b.      Test Procedures c.       Test Plan Review d.      Assumption Validation   2.      Test Scope a.       Orientation b.      Table Top c.       Functional d.      Full Scope   3.      Test  Coordinator and Team   4.      Result Analysis a.       Objectives Completed b.      Validity and accuracy of test data...

Img
compliances , networking , security

DoS

February 22, 2010

Aurthor unknown Whether launched by high school novices or savvy cyber-terrorists, Denial-of-Service (DoS) attacks have become a threat to network reliability. These attacks often result in considerable loss of time and money since they consume scarce and expensive resources: network bandwidth, memory and disk space, CPU time, access to...

Img
business , compliances , security

Outsourcing

February 21, 2010

The most effective outsourcing model occurs when you develop a strong partnership with your supplier, hold regular high-level strategic reviews, and implement a process for continual improvement that is underpinned by both performance and client satisfaction measures. Maintaining quality, transparency, confidentiality and anonymity is paramount for a successful outsourcing...

Img
compliances , itil , security

ISO 17999, 2700x and COBIT shorthand

February 19, 2010

The 27000 standard contains 11 security control clauses collectively containing a total of 39 main security categories and one introductory clause introducing risk assessment and treatment. 1. Security Policy (1); 2. Organizing Information Security (2); 3. Asset Management (2); 4. Human Resources Security (3); 5. Physical and Environmental Security (2); 6. Communications and Operations...

Img
compliances , itil , security

ISO-17799 Overview

February 19, 2010

Complementary standards and guidelines where inspired by ISO17799, design to or supports the implementation of ISO17799: AS/NSZ-4360:2004, Risk Management Guidelines HB-231:2004, Information Security Risk Management Guidelines ISO-19011:1996, Guidelines for Management System Auditing PAS56:2003, Guide to Business Continuity Management ISO/TR-18044:2004, Information Security Incident Management ISO-GMITS:1996/2001 (Guidelines for the Management of...

Img
information-rights-management , security

The New E-Discovery Rules

February 18, 2010

Take the Lead in Ensuring Compliance New rules for electronic discovery adopted as part of the Federal Rules of Civil Procedure (FRCP) went into effect December 1, 2006. The purpose of these rules is to streamline e-discovery requests. In an attempt to minimize the number of motions to compel...

Img
information-rights-management , security

IRM-Enabled SharePoint Documents in Groove Workspace

February 13, 2010

  Windows Server 2008 has Rights Management Services (RMS, which is a server add-on feature) as an installable role and seamlessly integrated into the OS. Further Information Rights Management (IRM, which is the client ability to comply with what is set to be enforced by RMS) can be enabled in SharePoint...

Img
security

Computer Forensics

February 7, 2010

Great links www.purdue.edu/securepurdue/docs/ComputerForensics.ppt

Img
compliances , security

Things in common with Risk Assessments

February 5, 2010

Vulnerability assessment has many things in common with risk assessment. Assessments are typically performed according to the following steps: · Cataloging assets and capabilities (resources) in a system · Assigning quantifiable value and importance to the resources · Identifying the vulnerabilities or potential threats to each resource · Mitigating or eliminating the...

Img
security

DDOS Attacks – Attack Tools

February 3, 2010

Denial of Service Attacks Denial of service (DoS) attacks involve flooding a system or network with more data than it can handle, so the system crashes or network bandwidth is so clogged that legitimate communications cannot occur. Distributed DoS (DDoS) attacks are more sophisticated. In such an attack, the...

Img
security

Sample Information Security Program

January 30, 2010

A good Information Security Program should address all facets of IT security: Policies, Procedures, and Processes Network Security Physical Security Application Security Identity Management Business Continuity Compliance Information Sharing Threat/Vulnerability Management

Img
security

DoS Attack Details

January 25, 2010

DoS Attack Detail Maintaining a reliable and predictable network has become a strategic imperative for most businesses now dependent on the Internet. DoS attacks, which flood network links or Web sites with useless traffic, have become a serious threat to the reliability of critical business assets. In a DoS...

Img