Our documents are based on successfully executed projects which save you time and money.
Img (719) 315-0404
information-rights-management , security , visio-stencils

Sample Visio – Requirements for Security Auditing – Logging Tool

April 13, 2009

Log Consolidation – Must have the capability to consolidate security logs of various types across platforms and software. Log Consolidation – Must have the capability to consolidate security logs of various types across platforms and software. Log Audit Reports – Intelligent reporting, not just dumps of logs. Real time...

Img
security

Blended Threats

April 12, 2009

A blended threat is a security attack or threat that uses multiple methods and techniques to propagate an attack Combine hacking, DoS, and worm-like propagation Can rapidly compromise millions of machines Often spread without human interaction Require multiple layers of protection and response to neutralize Exploit software vulnerabilities Email...

Img
business , o-s , security

Legacy IE Browser Settings

April 11, 2009

Microsoft Internet Explorer 6.0 Advanced Properties Tab – within Internet Options (the ones that are checked) Browsing Always send URLs as UTF-8 Close unused folders in History and Favorites Disable script debugging Enable folder view for FTP sites Enable Install On Demand Enable Offline items to be synchronized on...

Img
business , security

Unhappy employees Risk Factors

April 10, 2009

Employees are a greater risk to computer-security for companies than the much-feared hacker, and experts say. Eight in 10 computer-security breaches are caused by staff members, many of whom are simply disgruntled, says a risk consultant Eighty per cent of IT security breaches are the result of actions by...

Img
application , security , web-services

Excellent Resource – Vulnerability Assessments

April 8, 2009

Excellent Links: http://www.juniper.net/techpubs/software/management/strm/2008_1/VA_Book.pdf      

Img
security

Did you know?

March 26, 2009

Interesting tidbits of information: E-mails, contracts, and PowerPoint files account for 80 percent of corporate information. 71% Use Email to Negotiate Contracts and Agreements 69% Use Email to Exchange Invoices, Statements, and Payment Information 93% Use Email to Communicate with Customers. 38% Use Email to Respond to Regulators 44%...

Img
application , security , web-services

Application Security Testing Concerns / Advice

March 17, 2009

Cross Site Scripting Cross-site scripting allows hackers to: 1)      Execute malicious script in a client’s Web browser 2)      Embed <script>, <object>, <applet>, and <embed> tags 3)      Steal web session information 4)      Modify user’s screen a.       Any Dynamic HTML code based on content that users submit is vulnerable SQL Injection...

Img
business , security

Are you the Next Target?

March 12, 2009

They’re after you, who are they? Competitors Disgruntled employees Upset customers Hackers out for a lark  Hactivists Cartels that can buy the latest gadgets and best brainpower Hostile foreign governments / nations Your organization may not be a specific target, just on that had a few vulnerabilities as it...

Img
business , compliances , information-rights-management , security

Securing the confidentiality of PHI

March 8, 2009

PHI (Protected Health Information) requires passwords but…. a) Easy-to-guess passwords are one of the top ten threats to network security b) When passwords change often to improve security, users write them down, increasing the risk of a breach In addition, employers must block terminated staff from continued access to systems...

Img
networking , security

Short list of IEEE Standards

February 26, 2009

802.1 Internetworking 802.2 Logical Link Control 802.3 CMSA/CD or Ethernet 802.4 Token Bus LAN 802.5 Token Ring LAN 802.6 Metropolitan Area Network or MAN 802.7 Broadband Technical Advisory Group 802.8 Fiber-Optic Technical Advisory Group 802.9 Integrated Voice/Data Networks 802.10 Network Security 802.11 Wireless Networks 802.12 Demand Priority Access LAN...

Img
compliances , policies , security

Why should I bother with a Security Policy?

February 14, 2009

The image that most frequently comes to mind when discussing security is that of the great firewall standing guard at the opening to your network, fending off attacks from malevolent hackers. Although a firewall will play a crucial role, it is only a tool that should be part of...

Img
business , security

What CEO’s need to be concerned about

January 20, 2009

Security Internet / External Shortage of key skills Industry consolidation Changes in type/level of competition Impact of the Internet Downward pressure prices Environment, health, and safety issues Change in supply/distribution systems Access to / cost of capital Changing technology Regulatory issues (labor, market access, etc) Effect of corruption Currency...

Img
business , networking , security

Liability of Internetwork Carriers

January 10, 2009

The Internet is undergoing a rapid transition.  Two key, interrelated trends are easily discerned.  First, commercial traffic is now being carried on and across many networks.  Second, many networks are being operated more like businesses than research experiments.  New entities have been created as profit-seeking enterprises.   In this environment,...

Img
compliances , information-rights-management , security , web-services

Identity Management Glossary of Terms

January 8, 2009

Acquisition device: The hardware used to acquire biometric samples. Acquisition device: The hardware/sensors used to acquire biometric samples. These would include finger sensors or readers, iris scanning devices, facial recognition cameras. Automated Fingerprint Identification System (AFIS): A system that compares a single fingerprint with a database of fingerprint images....

Img
data-center-soc-noc , information-rights-management , security

SLA / OLA Service Considerations for Building Computing Operating Environments

October 15, 2008

Describe the environment in which the system will be used and define the major availability, reliability, performance, and integrity requirements. This information will significantly influence the definition of the systems architecture. Consider questions such as: Are the users widely distributed geographically or located close to each other? How many...

Img
information-rights-management , security , web-services

Identity (IdM) Warehouse described

August 26, 2008

Support for hierarchical organizational units-organizational structure, reporting structure or functional units Application Metadata Definition Simplified user and entitlements import process – Import from csv, xml, txt and other format files – Import directly from some ldap & odbc sources – Import from Identity Management Systems – Import using RBAC ETL processing • Flexible...

Img
application , policies , projects , security

Core XML Standards

August 19, 2008

Introduction to XML The eXtensible Markup Language (XML) is a specification introduced by the World Wide Web Consortium (W3C) for identifying and organizing elements of information in electronic documents. XML is the result of scaling down the Standard Generalised Markup Language or SGML for short an earlier standard for...

Img
projects , security

Zachman Framework

July 14, 2008

Architecture Frameworks Zachman Framework is the first and probably most influencing architecture framework. Two key ideas are illustrated in the Zachman Framework: 1. There is a set of architectural representations produced over the process of building a complex engineering product representing the different perspectives of the different participants. 2. The same...

Img
compliances , information-rights-management , security

Download Free – Data Research References

June 28, 2008

Excellent data references: Overview Architecture for Enterprise Data Warehouses Data Warehouse Documentation Roadmap Data Warehouse Database Reference Manual How Data Works We think this was an excellent site with excellent resources: http://www.datamgmt.com

Img
information-rights-management , security , web-services

Role Based Access Market Needs

June 14, 2008

Determine – ‘Who has access to what’ – ‘If people have the right access for their job’ • Demonstrate compliance to auditors – RBAC Model – Recertification of Entitlements • Efficient User Access Process – Assign access based on ‘business roles’ – Simplified process for creating and managing roles • Clean up orphaned accounts,...

Img
compliances , security

PCI Carholder Information Security Program

June 11, 2008

Carholder Information Security Program. European Payment Council (EPC). Securing Visa Cardholder Data When customers offer their bankcard at the point of sale, over the Internet, on the phone, or through the mail, they want assurance that their account information is safe. That’s why Visa USA has instituted the Cardholder...

Img
information-rights-management , networking , security , web-services

Identity Compliance Described

May 17, 2008

Supports enterprise level monitoring of access for segregation of duty (SoD) and security policy conflicts Ability to define rules across any platform / database / application or user’s attributes Support for inter and intra application security policy enforcement Monitoring of SoD, role vs actual exceptions, and terminated users with...

Img
compliances , sample-it-spreadsheets , security , web-services

What is an Application Audit

May 7, 2008

What is an Application Audit Usually required to assess • Business risk• Internal control• Strong linkage to corporate governance and compliances such as SOX, PCI, HIPAA and GLBA It is an audit of a single application • Example: audit of an Excel spreadsheet with embedded macros It could also be an...

Img
o-s , security

Simple Shutdown script for an Exchange Server

May 2, 2008

@echo off net stop MSExchangeES net stop IMAP4Svc net stop POP3Svc net stop RESvc net stop MSExchangeSRS net stop MSExchangeMGMT net stop MSExchangeMTA net stop MSExchangeIS /Y net stop MSExchangeSA /Y ! ! net stop “Computer Browser”” net stop “Messenger” net stop “Net Logon” net stop “NT LM Security...

Img
information-rights-management , security

Digital Rights Management Key Subjects

January 15, 2008

Management of the DRM Function Data Resource Management Sample Charter / Mission Statement Goals, Objectives and Critical Success Factors Benefits of Data Resource Management Enterprise-wide Data Management Process Maturity Data Resource Management Job Descriptions Data Resource Activities The Framework for Enterprise Architecture Information Stewardship Accountability for Information Quality Repository...

Img
compliances , networking , security

Common Referenced Related Laws, Regulations, and Policies

January 11, 2008

The following Federal laws, directives, regulations provide guidance pertaining to the security automated information systems: Privacy Act of 1974 (Public Law [PL] 93-579, United States Code [U.S.C.] 552A) Freedom of Information Act (5 U.S.C.522) Paperwork Reduction Act of 1986 (44 U.S.C. 35) Electronic Communications Privacy Act of 1986 (PL...

Img
compliances , security

Information Technology Requirements

December 21, 2007

The objectives of this activity are to: o Identify and document functional requirements related to potential systems, o Identify and document data requirements related to potential systems, o Identify and document technical requirements related to potential systems, o Identify and document integration requirements related to potential systems, o Identify and document communications requirements...

Img
projects , security

Sample Information Security Project Plan

December 3, 2007

Sample Information Security Project Plan Planning & Organization Define a Strategic IT Plan Define the Information Architecture Determine the Technological Direction Define the IT Organization and Relationships Manage the IT Investment Communicate Management Aims and Direction Manage Human Resources Ensure Compliance with External Requirements Assess Risks Manage Projects Manage...

Img
compliances , networking , policies , security

Cellular / Mobile Standards History

November 17, 2007

Cellular / Mobile Standards History 0G MTS (1946 – US, Bell System) IMTS (1969 – US, Bell System) OLT (1966 – Norway) AMTS (Japan) ARP (1971 – Finland) MTD (1971 – Sweden) 1G 1G cell phone technology encompassed analog standards introduced in the 1980s and continued until replaced by...

Img
o-s , security

UNIX sed Commands

November 17, 2007

Unix sed Commands  sed ‘s/wizard/guru/g’ file1                   replaces every occurrence of the string wizard with the string guru sed -n ‘s/wizard/guru/gp’ file1              replaces and prints only those lines where the substitution was                                                              made  -n print only when command p is given sed ‘/Comment:/d’ file1                          deletes all the lines that...

Img
compliances , security

Database Mirroring Best Practices

November 2, 2007

Free document download (Raid overview) Database Mirroring Best Practices

Img