Our documents are based on successfully executed projects which save you time and money.
compliances , information-rights-management , security

ISO-17799:2000 Overview

January 22, 2010

127 controls distributed within 10 categories Information security policy Organizational security Asset classification and control Personnel security Physical & environmental security Communication & operations management Access control System development & maintenance Business continuity management Compliance Uses a Plan/Do/Check/Act implementation and operation model that starts with a risk assessment to...

Img
compliances , security

What’s new in ISO-17799:2005

January 21, 2010

Risk management where addressed only in part 2 document, the part 1 now includes a new chapter on ‘Risk Assessment and Treatment’ requirements ‘Asset classification and control’ evolve into a more holistic ‘Asset management’ approach ‘Personnel Security’ evolve into ‘Human resources security’ which now emphasis on what’s needed before,...

Img
compliances , security

ISO-17799 Overview

January 20, 2010

BS7799 was created in 1999 as a two part document (standard + certification scheme) by the British Standards Institution (BSI) The standard portion was adopted and converted into an ISO standard in 2000 The certification scheme portions is still a BSI only standard and it’s latest revision is dated...

Img
information-rights-management , security

Threat Modeling

January 18, 2010

Threats must be understood to build secure systems  Every spec/design goes through threat analysis  Model of component is created  Threats categorized based on STRIDE  Severity ranked based on DREAD  Stride:  S—Spoofing  T—Tampering of Data  R—Repudiation   I—information Disclosure  D—Denial of Service   E—Escalation of Privileges  Dread:  D—Damage potential  R—Reproducibility  E—Exploitability  A—Affected...

Img
compliances , security

PCI Report on Compliance and Visa

January 17, 2010

PCI Compliance Validation. European Payment Council (EPC). Audits and Self-Assessments Network Scans Report on Compliance PCI Report on Compliance and Visa Level 1–3 Merchants Level 1 Merchants (via Acquirer) On-site PCI data security assessment completed by QSA Letter signed by a merchant officer Confirmation of report accuracy form completed...

Img
compliances , security

IT Security Management

January 12, 2010

What is Security Management. A proactively discover and detect intrusive activities/vulnerabilities Provide real-time prevention Provide a multi-layered approach to intrusion defense (Host/Network) Integrate any event from the enterprise Collect, consolidate, and normalize events  across the enterprise Filter events, alert and notify personnel,  execute countermeasures Suppress meaningless data Correlate events...

Img
networking , security

Next Generation Real-time Network Defense

January 11, 2010

Requirements: Near Continuous Scanning System Change Alerts Identify “unmanaged” nodes on network Receive frequent vulnerability updates Ongoing monitoring for baseline compliance, vulnerabilities, and threats Standards-based interface to firewall, anti-virus and intrusion prevention systems to support rapid shielding https://www.bestitdocuments.com/Samples

Img
networking , security

Sample RSA Server Architecture

January 10, 2010

Free – Document download Sample RSA Server Architecture https://www.bestitdocuments.com/Samples

Img
o-s , security

Download Windows 2kx Active Directory Properties

December 29, 2009

Active Directory Properties https://www.bestitdocuments.com/Samples

Img
information-rights-management , security

12 Security Awareness Considerations

December 11, 2009

Encourage users to log off when absent and require password-protected screensavers on PCs. Encourage use of strong passwords made of mixed letters, numbers and special characters. Encourage a clear, well-defined, written security policy, with all users having a copy. Discourage installing modems on networked workstations. Encourage use of encryption...

Img
application , security , web-services

Application Security Related Activities

November 9, 2009

Security Objectives. Define security objectives and requirements early in the process. Security objectives are goals and constraints that affect the confidentiality, integrity, and availability of your data and application. Design Guidelines for Security. To avoid many of the vulnerabilities introduced by poor design choices, your design activity should use...

Img
security

Sample – Internet Footprint Intelligence Review

November 7, 2009

Purpose Scouting and scavenged information from a Network and Internet presence that can be analyzed as business intelligence. Objective Size and scope of the Internet presence Task A measurement of the security policy to future network plans Tasks to perform for a thorough Competitive Intelligence Scouting Map and measure...

Img
security

Internet Footprint Intelligence Review

November 2, 2009

Purpose Scouting and scavenged information from a Network and Internet presence that can be analyzed as business intelligence. Objective Size and scope of the Internet presence Task A measurement of the security policy to future network plans Tasks to perform for a thorough Competitive Intelligence Scouting Map and measure...

Img
application , security , web-services

MySQL Installation Notes on Windows 200x and IIS 6 / 7

October 13, 2009

This document describes the steps necessary to do a basic mySQL database engine installation on a computer running Windows 2000x Server and IIS 6. What you’ll need Windows 200x Server running Internet Information Server (IIS) 6.0 A copy of the mySQL binary distribution for Windows NT / 200X The...

Img
application , security , web-services

Basic SQL Parameters

October 10, 2009

Memory, max size in 2 kb units available to SQL User connections, max number of worker threads that are available for SQL server process, default is 255. Max Worker Threads, the number of worker threads that are available for SQL server processes. Default is 255. SMP concurrency, controls the...

Img
security

Physical and Perimters test cases

September 21, 2009

Perimeter Review This is a method of testing the physical security of an organization and its assets by reviewing is its physical perimeter security measures. Expected Results: 1        Map of physical perimeter 2        Types of physical protective measures 3        List of unprotected / weakly protected areas Tasks to perform...

Img
information-rights-management , security

Identity Theft

September 5, 2009

Identity theft is a crime where a person’s legal identity is stolen and used to conduct financial fraud. Identity thieves steal information about a victim such as bank account information, Social Security number and driver’s license number in order to open accounts in the victim’s name or to change...

Img
security

What is Tempest

August 3, 2009

Tempest stands for Transient Electromagnetic Pulse Surveillance Technology. Computers and other electronic equipment release interference to their surrounding environment. You may observe this by placing two video monitors close together. The pictures will behave erratically until you space them apart. What is important for an observer is the emission...

Img
security

Operating System Defacement statistics

May 15, 2009

48581 time(s)               “Windows“       which is 58.184% of all defacements 16976 time(s)                 “Linux”             which is 21.844% of all defacements 2762 time(s)                 “Unknown”       which is 8.649% of all  defacements 2242 time(s)                 “Solaris”           which is 3.889% of all  defacements 8275...

Img
data-center-soc-noc , security

What to do with Correlated Data

April 19, 2009

Threat Analysis – This is a process of taking the correlated data and determining what it means and then prioritizing the data. Includes the reduction of False Positives. Forensic Analysis – The ability to analyze correlated events historically for trending and for prosecution. Policy Analysis – Correlation provides a...

Img
security

Why is Correlation and Threat Analysis Important

April 16, 2009

Reduce operating costs through efficiency and better resource allocation: Monitor existing environment and deploy additional security measures without increasing resources Improve decision-making processes Dramatically reduce response times Avoid the costs associated with a breach Downtime, theft, or damage to reputation Maximize utilization of existing security infrastructure Allows customers to...

Img
security

Viruses, Spyware and Malware Impacts

April 14, 2009

Performance Impacts to your System(s) Tax – Memory resources Tax – Processor resources Pop-ups Trojans Malware Spyware Greyware Virus propagation P2P applications / file sharing Hidden applications Removal of restore points Keystroke loggers Results in a: Compromise use Compromise data Compromise email Compromise confidentiality System could be used to...

Img
information-rights-management , security , visio-stencils

Sample Visio – Requirements for Security Auditing – Logging Tool

April 13, 2009

Log Consolidation – Must have the capability to consolidate security logs of various types across platforms and software. Log Consolidation – Must have the capability to consolidate security logs of various types across platforms and software. Log Audit Reports – Intelligent reporting, not just dumps of logs. Real time...

Img
security

Blended Threats

April 12, 2009

A blended threat is a security attack or threat that uses multiple methods and techniques to propagate an attack Combine hacking, DoS, and worm-like propagation Can rapidly compromise millions of machines Often spread without human interaction Require multiple layers of protection and response to neutralize Exploit software vulnerabilities Email...

Img
business , o-s , security

Legacy IE Browser Settings

April 11, 2009

Microsoft Internet Explorer 6.0 Advanced Properties Tab – within Internet Options (the ones that are checked) Browsing Always send URLs as UTF-8 Close unused folders in History and Favorites Disable script debugging Enable folder view for FTP sites Enable Install On Demand Enable Offline items to be synchronized on...

Img
business , security

Unhappy employees Risk Factors

April 10, 2009

Employees are a greater risk to computer-security for companies than the much-feared hacker, and experts say. Eight in 10 computer-security breaches are caused by staff members, many of whom are simply disgruntled, says a risk consultant Eighty per cent of IT security breaches are the result of actions by...

Img
application , security , web-services

Excellent Resource – Vulnerability Assessments

April 8, 2009

Excellent Links: http://www.juniper.net/techpubs/software/management/strm/2008_1/VA_Book.pdf      

Img
security

Did you know?

March 26, 2009

Interesting tidbits of information: E-mails, contracts, and PowerPoint files account for 80 percent of corporate information. 71% Use Email to Negotiate Contracts and Agreements 69% Use Email to Exchange Invoices, Statements, and Payment Information 93% Use Email to Communicate with Customers. 38% Use Email to Respond to Regulators 44%...

Img
application , security , web-services

Application Security Testing Concerns / Advice

March 17, 2009

Cross Site Scripting Cross-site scripting allows hackers to: 1)      Execute malicious script in a client’s Web browser 2)      Embed <script>, <object>, <applet>, and <embed> tags 3)      Steal web session information 4)      Modify user’s screen a.       Any Dynamic HTML code based on content that users submit is vulnerable SQL Injection...

Img
business , security

Are you the Next Target?

March 12, 2009

They’re after you, who are they? Competitors Disgruntled employees Upset customers Hackers out for a lark  Hactivists Cartels that can buy the latest gadgets and best brainpower Hostile foreign governments / nations Your organization may not be a specific target, just on that had a few vulnerabilities as it...

Img
business , compliances , information-rights-management , security

Securing the confidentiality of PHI

March 8, 2009

PHI (Protected Health Information) requires passwords but…. a) Easy-to-guess passwords are one of the top ten threats to network security b) When passwords change often to improve security, users write them down, increasing the risk of a breach In addition, employers must block terminated staff from continued access to systems...

Img