Our documents are based on successfully executed projects which save you time and money.
security

Viruses, Worms and Trojan Horses

August 19, 2010

Author unknown it was still worth publishing • Virus • Program that reproduces by attaching to another program •  May damage data directly or it may degrade system performance by taking over system resources, which are then not available to authorized users • Worm •  An independent program that...

Tags: , , Img
business

Sample – Credit Union IT Systems Compliance and Legal Issues

July 15, 2010

1.0 Overview This policy defines the basic elements required for the <Company Name> Information Systems Compliance and Legal Issues Monitoring. 2.0 Purpose To evaluate whether management practices relative to IT have been designed to properly address regulatory compliance and other legal issues. 3.0 Scope The scope of this policy...

Tags: , , Img
security

TACACS / XTACACS / TACACS+

July 10, 2010

Based on obscure ARPANET access control system for terminal servers, later documented and extended by Cisco Forwards username and password to TACACS server, returns authorization response XTACACS, Extended TACACS Adds support for multiple TACACS servers, logging, extended authorization Can independently authorize access via PPP, SLIP, telnet and ssh TACACS+...

Tags: , , Img
business

Sample Corporate Compliance Agreement

July 5, 2010

Agreement to Comply With Information Security Policies A signed paper copy of this form must be submitted with all requests for 1) Authorization of a new user-ID, 2) Authorization of a change in privileges associated with an existing user-ID, or 3) Periodic reauthorization of an existing user-ID.  Modifications to the terms...

Tags: , , Img
networking

Security Guide for Wireless Communications

June 30, 2010

The next time you pick up that car phone to conduct last-minute business on the way to the airport, take a second to consider whether it would matter if your conversation were overheard by an AT&T executive, or some other third party. Unless both parties are using encryption or...

Tags: , , , , Img
application

Guiding Principles for Software Security

June 29, 2010

Behind every attack & security problem is – bad software A major concern is that security professionals are often un-aware the problem is – bad software Encrypt your data lines? The riskiest category of software today is Internet-enabled apps “Using encryption on the Internet is the equivalent of arranging...

Tags: , , , , Img
application

Principles of Software Security

June 29, 2010

Secure the weakest link Low-hanging fruit is picked first, I.e. Attack end points, not encrypted links Risk analysis ID’s the weakest link Apportion resources according to risk Practice defense in depth One layer is never enough Overlapping & redundant    Fail securely Failure is unavoidable Allow least privilege Only...

Tags: , , , , Img
security

Assurance of trustworthiness

June 29, 2010

It’s all a “confidence” game. Providing adequate confidence that … … Data will not be altered or misused. … Only authorized access is allowed. … Customers’ wishes are being honored. Recent surveys of online consumers 70% said privacy was important to them, but only 40% read privacy statements 53%...

Tags: , , Img
security

Loose Unix Technical Security Notes

June 22, 2010

When you start talking about lots of bytes, you get into prefixes like kilo, mega and giga, as in kilobyte, megabyte and gigabyte (also shortened to K, M and G, as in Kbytes, Mbytes and Gbytes or KB, MB and GB). The following table shows the multipliers: Basic UNIX...

Tags: , , Img
security

FIPS 196

June 9, 2010

Entity authentication using public key cryptography Extends and clarifies ISO 9798 entity authentication standard Signed challenge/response protocol: Server sends server nonce SN Client generates client nonce CN Client signs SN and CN and returns to server Server verifies signature on the data Mutual authentication uses a three-pass protocol Server...

Tags: , , Img
security

Basic Windows Incident response tools

June 8, 2010

  Tool Use Netstat.exe Displays protocol statistics and current TCP/IP network connections. Arp.exe Displays and modifies the IP-to-Physical address translation tables used by address resolution protocol (ARP). Net.exe Net used with [ ACCOUNTS | COMPUTER | CONFIG | CONTINUE | FILE | GROUP | HELP |   HELPMSG | LOCALGROUP...

Tags: , , Img
security

Logfile Auditing Spectrum

June 7, 2010

Things to consider: Full Administrative Audit Trail All management operations logged Full User Audit Trail All session activity (login, logout, timeout) All network flows (not just web) All System Events Support for External Syslog Servers https://www.bestitdocuments.com/Samples

Tags: , , Img
security

CIRT and other Incident sources of information

June 6, 2010

Audit Evidence Requirement. IS Auditing Guideline. Information Systems Audit and Control Computer Security Incident Handling: Step-by-Step. System Administration Networking and Security (SANS) Institute Publications. Computer Security Incident Response Policy. The Center for Information Technology. Detecting Signs of Intrusion. CERT Coordination Center. Carnegie Mellon Software Prepare to respond to intrusions....

Tags: , , Img
security

Radious Authentication

June 5, 2010

Remote authentication for user services Provides an authentication server for one or more clients VPN, Wreless or legacy (dial-in hosts) Client communicates with RADIUS server via encrypted communications using a shared secret key Radius Protocol: Client forwards user access request to RADIUS server Server replies with Reject access Allow...

Tags: , , Img
security

Data Archiving Landscape Today

June 4, 2010

Databases Structured data Application specific Performance driven Limited solutions available       Email Out of control Semi-structured data Well-understood applications       Distributed files Unstructured data Content searchable (documents) Non-content searchable (media) SRM/HSM type solutions Emerging data indexing solutions       Mainframe files Semi-structured data HSM solutions Many products...

Tags: , , Img
security

Public-key-based Authentication

June 1, 2010

Simple PKC-based challenge/response protocol Server sends challenge Client signs challenge and returns it Server verifies clients signature on the challenge Vulnerable to chosen-protocol attacks Server can have client sign anything Algorithm-specific attacks (eg RSA signature/encryption duality) https://www.bestitdocuments.com/Samples

Tags: , , Img
firewalls , security

Introducing Firewalls

May 29, 2010

Firewall Advantages and Limitations Now that the theory behind a firewall has been presented, this section will focus on examining the several kinds of firewalls available as well as highlighting the kind of protection they can offer. The position that a firewall sits with respect to the rest of...

Tags: , , Img
firewalls , security

What are the basic types of firewalls?

May 29, 2010

Conceptually, there are two types of firewalls: 1. Network Level 2. Application Level They are not as different as you might think, and latest technologies are blurring the distinction to the point where it’s no longer clear if either one is “better” or “worse.” As always, you need to...

Tags: , , Img
firewalls , security

Glossary of Firewall Related Terms

May 29, 2010

Abuse of Privilege: When a user performs an action that they should not have, according to organizational policy or law. Access Control Lists: Rules for packet filters (typically routers) that define which packets to pass and which to block. Access Router: A router that connects your network to the...

Tags: , , Img
firewalls , security

Firewall Security Lifecycle

May 27, 2010

Define network domain security policy Create high level structure Examine other firewalls Create low-level structure Test firewall / Review security policy Periodic testing /Maintenance Firewall Product Evaluation Checklist Identification – Who are we buying from Education and Documentation – Is there sufficient and clear documentation that comes with the...

Tags: , , Img
compliances , security

Disaster Recovery Requirements

May 26, 2010

Set the institution’s definition of “disaster” Driven by Business Impact Priority of Mission Critical Applications   Priority of Mission Critical Business and IT Services Define Requirements Set Threshold for Recovery Questions to Consider: What is the threshold on recovery time (RTO) and recovered data (RPO)? What is the objective during...

Tags: , , Img
security

High Level – High Availability

May 25, 2010

HA offers Application Resiliency Critical Applications can remain active even when the primary hardware they rely on goes down Applications can remain active through maintenance cycles and backups HA offers the promise of minimal down time Staff can remain working on HA equipment almost transparently Customers can keep using...

Tags: , , Img
security

Disaster Recovery Considerations

May 23, 2010

What is it “Ability to recover from the loss of a complete site, whether due to a natural disaster or malicious intent.” “A plan of action to recover from an unlikely event of a severe or catastrophic business disruption.” It’s NOT a planning for Mean-Time-To-Recovery (MTTR) from daily operational...

Tags: , , Img
security

What is a Blended Threat ?

May 22, 2010

Any threat that uses multiple means of propagation AND requires an integrated response from more than one technology Discovering Vulnerabilities How vulnerabilities are discovered: By accident or chance Browsing through CVS entries, software development, bug databases, or change logs Using source code scanning tools ITS4, Flawfinder, or RATS Utilizing...

Tags: , , Img
security

Data Archive Strategy

May 21, 2010

The best backup strategy starts with the Restore! Determine what data needs to be archived Create a plan Base backup Incremental backup Differential backup Frequency and speed of data restore Consider your network environment Operating systems (Windows, Unix, etc.) Firewalls (bandwidth, etc.) Routers, Switches Carefully consider the backup media...

Tags: , , Img
compliances , itil

ITIL – Compliances Considerations

May 19, 2010

Compliance now impacts all companies. European Payment Council (EPC). Information must be retained Information must be secure Information must be retrievable Information must be handled properly Evidence of compliance must be demonstrated Industry-specific drivers Health Care: HIPAA Pharmaceutical: 21 CFR Part 11 Financial/Securities: SEC 17a-3/4, Gramm-Leach-Bliley Act, numerous NYSE,...

Tags: Img
information-rights-management

Common Data Protection Issues

May 18, 2010

No integrated view of data protection Management of discreet components Predominantly server-centric perspective More focused on getting servers back up and running (availability)… …Rather than truly protecting the data (compliance) Virtually nothing is truly expired Many companies save old backups forever Value-of-data not adequately managed – equal treatment of:...

Tags: , , , Img
application

eGIS Imagery Hosting Considerations

May 17, 2010

Goal to have all imagery served to all A -B Corporate users from a single location Evaluation Outsource to Spatial Energy Host Internal via ESRI Image Server www.bestitdocuments.com

Tags: , , , , Img
application

Sample eGIS Collaboration

May 16, 2010

Single storage location for all eGIS data Access for Corporate Users Web Based Mapping Access to all Geo-spatial Data Compliant with Corporate Security Policy Subscription Service to Download Geo-spatial Data Map based access to Documents in Document Management System Map based access to Permits including geographic coverage Collaboration Geo-spatial...

Tags: , , , , Img
security

Log Management SIM / SEM Justification

May 15, 2010

Background Companies are suffering from an overwhelming influx of security data from an array of software and hardware solutions, including antivirus software, firewalls, intrusion detection systems, access control, identity management, single sign-on, authentication and many more. A typical enterprise has one or more of each of these solutions deployed,...

Tags: , , Img
security

Sample Qualys Statement of Work (SOW)

May 13, 2010

Business Need / Problem Statement The current Vulnerability Assessment is inadequate and requires a large number of customization and man-hours to produce any meaningful report data. Current system is lacking key features such as centralized management, role-based access control, limited data export formats and lacks the reports that management...

Tags: , , Img