Our documents are based on successfully executed projects which save you time and money.
Img (719) 315-0404
compliances , itil , security

ISO 17999, 2700x and COBIT shorthand

February 19, 2010

The 27000 standard contains 11 security control clauses collectively containing a total of 39 main security categories and one introductory clause introducing risk assessment and treatment. 1. Security Policy (1); 2. Organizing Information Security (2); 3. Asset Management (2); 4. Human Resources Security (3); 5. Physical and Environmental Security (2); 6. Communications and Operations...

Img
compliances , itil , security

ISO-17799 Overview

February 19, 2010

Complementary standards and guidelines where inspired by ISO17799, design to or supports the implementation of ISO17799: AS/NSZ-4360:2004, Risk Management Guidelines HB-231:2004, Information Security Risk Management Guidelines ISO-19011:1996, Guidelines for Management System Auditing PAS56:2003, Guide to Business Continuity Management ISO/TR-18044:2004, Information Security Incident Management ISO-GMITS:1996/2001 (Guidelines for the Management of...

Img
information-rights-management , security

The New E-Discovery Rules

February 18, 2010

Take the Lead in Ensuring Compliance New rules for electronic discovery adopted as part of the Federal Rules of Civil Procedure (FRCP) went into effect December 1, 2006. The purpose of these rules is to streamline e-discovery requests. In an attempt to minimize the number of motions to compel...

Img
information-rights-management , security

IRM-Enabled SharePoint Documents in Groove Workspace

February 13, 2010

  Windows Server 2008 has Rights Management Services (RMS, which is a server add-on feature) as an installable role and seamlessly integrated into the OS. Further Information Rights Management (IRM, which is the client ability to comply with what is set to be enforced by RMS) can be enabled in SharePoint...

Img
security

Computer Forensics

February 7, 2010

Great links www.purdue.edu/securepurdue/docs/ComputerForensics.ppt

Img
compliances , security

Things in common with Risk Assessments

February 5, 2010

Vulnerability assessment has many things in common with risk assessment. Assessments are typically performed according to the following steps: · Cataloging assets and capabilities (resources) in a system · Assigning quantifiable value and importance to the resources · Identifying the vulnerabilities or potential threats to each resource · Mitigating or eliminating the...

Img
security

DDOS Attacks – Attack Tools

February 3, 2010

Denial of Service Attacks Denial of service (DoS) attacks involve flooding a system or network with more data than it can handle, so the system crashes or network bandwidth is so clogged that legitimate communications cannot occur. Distributed DoS (DDoS) attacks are more sophisticated. In such an attack, the...

Img
security

Sample Information Security Program

January 30, 2010

A good Information Security Program should address all facets of IT security: Policies, Procedures, and Processes Network Security Physical Security Application Security Identity Management Business Continuity Compliance Information Sharing Threat/Vulnerability Management

Img
security

DoS Attack Details

January 25, 2010

DoS Attack Detail Maintaining a reliable and predictable network has become a strategic imperative for most businesses now dependent on the Internet. DoS attacks, which flood network links or Web sites with useless traffic, have become a serious threat to the reliability of critical business assets. In a DoS...

Img
compliances , information-rights-management , security

ISO-17799:2000 Overview

January 22, 2010

127 controls distributed within 10 categories Information security policy Organizational security Asset classification and control Personnel security Physical & environmental security Communication & operations management Access control System development & maintenance Business continuity management Compliance Uses a Plan/Do/Check/Act implementation and operation model that starts with a risk assessment to...

Img
compliances , security

What’s new in ISO-17799:2005

January 21, 2010

Risk management where addressed only in part 2 document, the part 1 now includes a new chapter on ‘Risk Assessment and Treatment’ requirements ‘Asset classification and control’ evolve into a more holistic ‘Asset management’ approach ‘Personnel Security’ evolve into ‘Human resources security’ which now emphasis on what’s needed before,...

Img
compliances , security

ISO-17799 Overview

January 20, 2010

BS7799 was created in 1999 as a two part document (standard + certification scheme) by the British Standards Institution (BSI) The standard portion was adopted and converted into an ISO standard in 2000 The certification scheme portions is still a BSI only standard and it’s latest revision is dated...

Img
information-rights-management , security

Threat Modeling

January 18, 2010

Threats must be understood to build secure systems  Every spec/design goes through threat analysis  Model of component is created  Threats categorized based on STRIDE  Severity ranked based on DREAD  Stride:  S—Spoofing  T—Tampering of Data  R—Repudiation   I—information Disclosure  D—Denial of Service   E—Escalation of Privileges  Dread:  D—Damage potential  R—Reproducibility  E—Exploitability  A—Affected...

Img
compliances , security

PCI Report on Compliance and Visa

January 17, 2010

PCI Compliance Validation. European Payment Council (EPC). Audits and Self-Assessments Network Scans Report on Compliance PCI Report on Compliance and Visa Level 1–3 Merchants Level 1 Merchants (via Acquirer) On-site PCI data security assessment completed by QSA Letter signed by a merchant officer Confirmation of report accuracy form completed...

Img
compliances , security

IT Security Management

January 12, 2010

What is Security Management. A proactively discover and detect intrusive activities/vulnerabilities Provide real-time prevention Provide a multi-layered approach to intrusion defense (Host/Network) Integrate any event from the enterprise Collect, consolidate, and normalize events  across the enterprise Filter events, alert and notify personnel,  execute countermeasures Suppress meaningless data Correlate events...

Img
networking , security

Next Generation Real-time Network Defense

January 11, 2010

Requirements: Near Continuous Scanning System Change Alerts Identify “unmanaged” nodes on network Receive frequent vulnerability updates Ongoing monitoring for baseline compliance, vulnerabilities, and threats Standards-based interface to firewall, anti-virus and intrusion prevention systems to support rapid shielding https://www.bestitdocuments.com/Samples

Img
networking , security

Sample RSA Server Architecture

January 10, 2010

Free – Document download Sample RSA Server Architecture https://www.bestitdocuments.com/Samples

Img
o-s , security

Download Windows 2kx Active Directory Properties

December 29, 2009

Active Directory Properties https://www.bestitdocuments.com/Samples

Img
information-rights-management , security

12 Security Awareness Considerations

December 11, 2009

Encourage users to log off when absent and require password-protected screensavers on PCs. Encourage use of strong passwords made of mixed letters, numbers and special characters. Encourage a clear, well-defined, written security policy, with all users having a copy. Discourage installing modems on networked workstations. Encourage use of encryption...

Img
application , security , web-services

Application Security Related Activities

November 9, 2009

Security Objectives. Define security objectives and requirements early in the process. Security objectives are goals and constraints that affect the confidentiality, integrity, and availability of your data and application. Design Guidelines for Security. To avoid many of the vulnerabilities introduced by poor design choices, your design activity should use...

Img
security

Sample – Internet Footprint Intelligence Review

November 7, 2009

Purpose Scouting and scavenged information from a Network and Internet presence that can be analyzed as business intelligence. Objective Size and scope of the Internet presence Task A measurement of the security policy to future network plans Tasks to perform for a thorough Competitive Intelligence Scouting Map and measure...

Img
security

Internet Footprint Intelligence Review

November 2, 2009

Purpose Scouting and scavenged information from a Network and Internet presence that can be analyzed as business intelligence. Objective Size and scope of the Internet presence Task A measurement of the security policy to future network plans Tasks to perform for a thorough Competitive Intelligence Scouting Map and measure...

Img
application , security , web-services

MySQL Installation Notes on Windows 200x and IIS 6 / 7

October 13, 2009

This document describes the steps necessary to do a basic mySQL database engine installation on a computer running Windows 2000x Server and IIS 6. What you’ll need Windows 200x Server running Internet Information Server (IIS) 6.0 A copy of the mySQL binary distribution for Windows NT / 200X The...

Img
application , security , web-services

Basic SQL Parameters

October 10, 2009

Memory, max size in 2 kb units available to SQL User connections, max number of worker threads that are available for SQL server process, default is 255. Max Worker Threads, the number of worker threads that are available for SQL server processes. Default is 255. SMP concurrency, controls the...

Img
security

Physical and Perimters test cases

September 21, 2009

Perimeter Review This is a method of testing the physical security of an organization and its assets by reviewing is its physical perimeter security measures. Expected Results: 1        Map of physical perimeter 2        Types of physical protective measures 3        List of unprotected / weakly protected areas Tasks to perform...

Img
information-rights-management , security

Identity Theft

September 5, 2009

Identity theft is a crime where a person’s legal identity is stolen and used to conduct financial fraud. Identity thieves steal information about a victim such as bank account information, Social Security number and driver’s license number in order to open accounts in the victim’s name or to change...

Img
security

What is Tempest

August 3, 2009

Tempest stands for Transient Electromagnetic Pulse Surveillance Technology. Computers and other electronic equipment release interference to their surrounding environment. You may observe this by placing two video monitors close together. The pictures will behave erratically until you space them apart. What is important for an observer is the emission...

Img
security

Operating System Defacement statistics

May 15, 2009

48581 time(s)               “Windows“       which is 58.184% of all defacements 16976 time(s)                 “Linux”             which is 21.844% of all defacements 2762 time(s)                 “Unknown”       which is 8.649% of all  defacements 2242 time(s)                 “Solaris”           which is 3.889% of all  defacements 8275...

Img
data-center-soc-noc , security

What to do with Correlated Data

April 19, 2009

Threat Analysis – This is a process of taking the correlated data and determining what it means and then prioritizing the data. Includes the reduction of False Positives. Forensic Analysis – The ability to analyze correlated events historically for trending and for prosecution. Policy Analysis – Correlation provides a...

Img
security

Why is Correlation and Threat Analysis Important

April 16, 2009

Reduce operating costs through efficiency and better resource allocation: Monitor existing environment and deploy additional security measures without increasing resources Improve decision-making processes Dramatically reduce response times Avoid the costs associated with a breach Downtime, theft, or damage to reputation Maximize utilization of existing security infrastructure Allows customers to...

Img
security

Viruses, Spyware and Malware Impacts

April 14, 2009

Performance Impacts to your System(s) Tax – Memory resources Tax – Processor resources Pop-ups Trojans Malware Spyware Greyware Virus propagation P2P applications / file sharing Hidden applications Removal of restore points Keystroke loggers Results in a: Compromise use Compromise data Compromise email Compromise confidentiality System could be used to...

Img