Healthy organizations have goals at all levels. Both organizations and individuals need to manage their affairs against goals Explicit Measurable Obtainable Hard, specific goals, if accepted by the individual, will lead to increased team performance. Teams Teams outperform individuals acting alone or in larger organizational groupings, especially when performance requires multiple skills, judgments and experiences.… Continue reading Goal Setting Info
Tag: Authentication – RBAC – SOD – IRM (342)
Challenges of IT Infrastructure
The development of the internet has been seen as the most significant advance in IT for many years. In essence, what it does is to allow any computer with a communication channel to offer its contents to anyone else and to get material back from any other connected computer in return. This has come about… Continue reading Challenges of IT Infrastructure
Business goals for the future
Corporate America needs to develop a clear understanding of what it will take to become profitable and build on or Extend market share. Developing tactical strategies to attain these goals should be based on short-term and strategic long-term goals. Reduce and Control Operating Costs The single most important tactical reason for outsourcing is to reduce… Continue reading Business goals for the future
Bull or Bear in IT
Bull Market Bear Market Big spending wins eyeballs. Smart spending wins customers. Customer acquisition is a priority. Smart spending wins customers. Company merge to look big. Customer retention is a priority. We’ll be the next Yahoo. Companies merge order to survive. Free offers lure new customers. We’re not the next Yahoo. It’s an ad sellers… Continue reading Bull or Bear in IT
Legal Compliance and E-Discovery
Aurthor unknown. Always verify your research. Targeted audience: (Attorneys and legal practitioners) New rules for electronic discovery adopted as part of the Federal Rules of Civil Procedure (FRCP) went into effect December 1, 2006. The purpose of these rules is to streamline e-discovery requests. In an attempt to minimize the number of motions to compel… Continue reading Legal Compliance and E-Discovery
Technology Sustainment
In sustainment, the system is in use and evolves through periodic and event-driven maintenance and upgrades. For software-intensive systems, Sustainment presents critical challenges to maintaining the security posture. Maintenance in the operational environment is essential to provide for system restoral in the case of failure and for rapid resolution of Business objectives-impacting deficiencies. In the… Continue reading Technology Sustainment
Protocol Overviews
A number of different protocols exist that each satisfies the key characteristics of a VPN. The most commonly recognized protocols are: SOCKS SSL · SSL (Secure Sockets Layer), working only with TCP/IP protocols is the primary protocol for secure connections to web servers, requiring a valid site certificate issued from an authorized certificate authority. · SSL… Continue reading Protocol Overviews
Sample Access & Authentication Scope
A high-level outline was developed with input from the each discipline. The outline centers on the ability to identify data classifications and the assignment of access controls. The documents that will be generated are: 1. Summary document in outline form 2. Authentication and Access Control Strategy 3. Network Access Strategy Action Items 1. A 2. … Continue reading Sample Access & Authentication Scope
Sample Consulting Insurance Requirements
Always seek proper legal advise for your organization. These pages provide an explanation and example of corporate’s minimum insurance requirements. During the term of an agreement and without cost to corporate, suppliers are required to maintain and ensure that their subcontractors maintain the following insurance coverage with reputable insurance companies satisfactory to Corporate. Primary Commercial… Continue reading Sample Consulting Insurance Requirements
Sample Course Development Guidelines
Considerations for each class: · Create agenda – sessions and approximate timings · Create detailed course outline · Consider prerequisite reading and assignments that would help folks prepare for the class · Identify any prerequisite hardware,& software (including downloads) · Plan course exercises and activities · Plan testing strategy · Course logistics Track Strategy courses (1/2 day web cast course · Class… Continue reading Sample Course Development Guidelines
Healthcare Industry Segmentation
Healthcare Payers National Health Insurance Plans Federal Government (CMS – Medicare) State Government (DHHS – Medicaid) Healthcare Providers Hospitals Long-Term Care Facilities Physician Medical Practices Specialty Care Providers (Outpatient, Oncology, etc) Affiliated Organizations Clearinghouses, Third Party Administrators, etc. Key Business Drivers The revenue source of a hospital is driven by patient flow Physician referral is… Continue reading Healthcare Industry Segmentation
Which User Files on your Windows 200x Workstation Should Be Backed Up?
Introduction: All PC users are provided with a hard drive in order to store their local data. To assure that important information is not lost in the event disk drive disaster, each person must establish a strategy to back up their own data. “Back up” is the process used to duplicate files on an alternate… Continue reading Which User Files on your Windows 200x Workstation Should Be Backed Up?
Startup Apps and Windows 2000-based Services
Excellent reference – Searchable, comprehensive list of the programs you may find that run when you switch on your PC: http://www.pacs-portal.co.uk/startup_content.php#THE_PROGRAMS – Full-list ZIP Windows 2000 startup services Service Full Name Default Alerter Alerter Automatic AppMgmt Application Management Manual ClipSrv ClipBook Manual EventSystem COM+ Event System Manual Browser Computer Browser Automatic DHCP DHCP Client … Continue reading Startup Apps and Windows 2000-based Services
Sample End-to-End Performance Goals
End-To-End Performance Performance Goals System and Application Windows SAP GUI End-to-end Performance ([Client] will consider these as goals and monitor the actual results): Macintosh JAVA GUI 90% of identified representative transactions complete: < 3 seconds Windows HTML GUI 90% of identified representative transactions complete: < 6 seconds
Assets
An asset is anything that has some value to an organization. Asset Identification • It is necessary to determine the assets that need protection, their value, and level of protection required • Two Types: » Tangible » Intangible Tangible Assets • Tangible assets are physical • Examples: » Personnel » Offices, workspaces, warehouses, etc. » Inventory, stores, supplies, etc. » Servers and workstations » Network… Continue reading Assets
Help Desk System Assessment
Overall Objective [Vendor] Consultant will conduct a working session with all relevant personnel to review Customers goals and processes as they relate to their current Help Desk installation in order to provide specific system and process recommendations. [Vendor] Consultant will spend one day at client site and a second day completing assessment report. Typical Client… Continue reading Help Desk System Assessment
How to Stop and Restart the Ace Service on the RSA Service
Analysis: On the RSA Server do: ps – ef | greg ace (lower-case) – check to see if the ace process is running if not su – su – ace “provide password” To start from scratch (note the order): /var/ace/prog/aceserver stop 1st (stops the ACE Server) /var/ace/prog/sdconnect stop 2nd (stops… Continue reading How to Stop and Restart the Ace Service on the RSA Service
Sample Help Desk Consolidation Project
The help desk consolidation project will start with an assessment of the existing Help Desk structure, and include the collection of the current staffing model, organization chart, the flow and management of incidents and reporting, review of the tiered support model, review of the volume and types of incidents, review of the amount of time… Continue reading Sample Help Desk Consolidation Project
Master Project Plan Check List
Project Code Project/Application Name Project Acronym Project Coordinator QCC Date Received Date Completed Document Section Description First Review Second Review Third Review Mandatory Checks Does the cover page identify the Application with its Name and Project Code? Have the appropriate Authorities approved this deliverable (via signature or appropriate email approval)? Is the Revision History current?… Continue reading Master Project Plan Check List
Keep project team meetings on task
How many times has this happened to you? You attend a meeting where members of a project team have enthusiastically volunteered to complete a variety of assignments. Then, a week later at a follow-up meeting, very few team members completed their assignments while others could not even remember the task they were assigned to complete. … Continue reading Keep project team meetings on task
Regulation Impact by IT Technology Domains
Sarbanes Oxley Act HIPAA Gramm-Leach-Bliley Act SEC 17a-4 and NASD and NASD Financial compliance, business process measurement applications X Enterprise resource planning X Business intelligence and data warehousing X Content/document management and search X X X X Data/application integration X Business process automation X X Records management and email archiving X X Storage, software, and… Continue reading Regulation Impact by IT Technology Domains
Sample Visio – MIL-STD-100 and DOD-STD-1000
Free Visio Document download MIL-STD100_Sample.vsd The MIL-STD-100 and DOD-STD-1000 standards suck, they are vague and generally interpretive and un-atainable. Below are some recommendations for at least good guidelines. Items necessary for good network documentation Identification of servers, workstations, printers, routers, switches, etc. IP addresses NetBIOS/Host names MAC addresses Description of each device on the network,… Continue reading Sample Visio – MIL-STD-100 and DOD-STD-1000
Sample MIL-STD-100 Objectives
The primary objective of the Standard Operating Environment was to develop the platform baseline for the Network Management Systems for Corporate campuses (Corporate NSM). This standard methodology would then be applied to all campuses in the implementation of the Enterprise Network Management Platform. · Detail the NSM solution including hardware architecture, software architecture and Operating… Continue reading Sample MIL-STD-100 Objectives
Software Security and SDLC Considerations
Technical security architecture Application security architecture Application security architecture document Architecture control board Data model Data security architecture document Data security architecture Platform security architecture Platform security architecture document Enterprise architecture governance Security in the system development lifecycle Security requirements of information systems Security requirements analysis and specification Define information system security requirements Information system… Continue reading Software Security and SDLC Considerations
Information system Catalog service management Considerations
Configuration and asset management Release Management Development Integration Service Desk / Help Desk Capacity management Create and maintain a capacity plan Operational procedures and responsibilities Documented operating procedures Change control procedures Technical review of applications after operating system changes Restrictions on changes to software packages Change management Information security aspects of problem management Change… Continue reading Information system Catalog service management Considerations
Autocad 2006/7 File Path Settings
Suggested Autocad Settings for reliable and optimal performance. Support File Search Path C:Document and SettingsAdministratorapplication DataAutodeskAutodesk Land Desktop 2006/7R16.2enusupport C:Program FilesAutodesk Land Desktop 2006/7support C:Program FilesAutodesk Land Desktop 2006/7fonts C:Program FilesAutodesk Land Desktop 2006/7help C:Program FilesAutodesk Land Desktop 2006/7express C:Program FilesAutodesk Land Desktop 2006/7supportcolor C:Program FilesAutodesk Land Desktop 2006/7land C:Document and SettingsAdministratorLocal SettingsApplication DataAutodeskAutodesk Land… Continue reading Autocad 2006/7 File Path Settings
Identifying Identity Management Needs
Author unknown Is your network a collection of different systems and applications? Are there multiple directories and data systems? Are there users and other data objects stored in multiple places? How is the environment managed? How are new accounts created for users each time a new application is added? Does a single change event cause… Continue reading Identifying Identity Management Needs
Solaris Role-Based Access Controls
UNIX administrators have wanted more fine-grained access control to administrative features almost since the first administrator accidentally destroyed his first system. As of Solaris 8, Sun has delivered a solution to that problem. But is the solution for you? The Current State The UNIX concept of a “superuser” who could do all is a good… Continue reading Solaris Role-Based Access Controls
Manually Configuring Privileges
The manual process for provisioning poses a huge challenge for today’s businesses. Believe it or not, most companies still use manual processes to provision access rights to users. Step 1 First, when an employee is hired, a new user profile is created and stored in an HR database. Step 2 A request for access is… Continue reading Manually Configuring Privileges
Suggested Exchange pre-requisites
Exchange 2000 Pre-requisites Server OS Domain Version Domain mode Runs NT4 All Versions All Modes NO W2k NT4 NO W2k3 NT4 NO W2k W2k All Modes YES W2k W2k3 All Modes YES W2k3 All Versions All Modes NO Exchange 2k3 runs well in Windows 2000 Server OS Domain Version Domain mode Runs… Continue reading Suggested Exchange pre-requisites
Sample Server Configurations
Sample Server Configurations Server Type Reference Description Lab Implementation 1 Dual P3, with 2Gb of RAM, 2 18GB disks for OS 4 NIC ports, 1 Remote Mgmt Port HP DL360G2 (2 – PIII 1.266Ghz) with NC3134 dual port card, 2 10KRPM 18GB drives, iLO Mgmt Port 2 Dual P4, with 2Gb of RAM, 2 18GB… Continue reading Sample Server Configurations