The cost of SPAM

When automation is used to send out unwanted emails to very many people the total wasted time becomes a significant resource. An 80 year life expectancy is 2,524,608,000 seconds. If it takes just 2 seconds to identify and delete each unwanted email, sending out 631,152,000 unwanted emails, which arrive in inboxes in one sense, is… Continue reading The cost of SPAM

12 Security Awareness Considerations

Encourage users to log off when absent and require password-protected screensavers on PCs. Encourage use of strong passwords made of mixed letters, numbers and special characters. Encourage a clear, well-defined, written security policy, with all users having a copy. Discourage installing modems on networked workstations. Encourage use of encryption techniques when handling or sending confidential… Continue reading 12 Security Awareness Considerations

The Project Summary

It’s not enough to say what you’re going to do… …You must explain, in detail, how  you’re going to do it! The project summary may be the only part of your proposal that some reviewers read. Funding agencies typically assemble panels of experts to review dozens of proposals at the same time. A “primary” and… Continue reading The Project Summary

Setting up your PC

The Configuration When you first set up a new PC, you should refer to the owner’s manual for all technical specifications. To start your PC Notebook, document the following basic configuration information:  Make, model, and speed of CPU Amount of RAM and what type the system uses The make, model, and speed of any internal/external… Continue reading Setting up your PC

Application Security Related Activities

Security Objectives. Define security objectives and requirements early in the process. Security objectives are goals and constraints that affect the confidentiality, integrity, and availability of your data and application. Design Guidelines for Security. To avoid many of the vulnerabilities introduced by poor design choices, your design activity should use proven design practices, patterns, and principles.… Continue reading Application Security Related Activities

Sample – Internet Footprint Intelligence Review

Purpose Scouting and scavenged information from a Network and Internet presence that can be analyzed as business intelligence. Objective Size and scope of the Internet presence Task A measurement of the security policy to future network plans Tasks to perform for a thorough Competitive Intelligence Scouting Map and measure the directory structure of the web… Continue reading Sample – Internet Footprint Intelligence Review

Internet Footprint Intelligence Review

Purpose Scouting and scavenged information from a Network and Internet presence that can be analyzed as business intelligence. Objective Size and scope of the Internet presence Task A measurement of the security policy to future network plans Tasks to perform for a thorough Competitive Intelligence Scouting Map and measure the directory structure of the web… Continue reading Internet Footprint Intelligence Review

Application Testing

Testing plays a critical role in the development of the web site and its long-term maintenance. While smaller web sites—especially those with more limited budgets—may not need to follow the formal testing procedures that are required for large-scale, commercial web sites, every site needs to be thoroughly tested to ensure that it’s error-free, user-friendly, accessible,… Continue reading Application Testing

OS Jobs Scripts Can Do

Windows Script Host provides objects for manipulation of your scripts. Here are some of the tasks that these objects and services can do for you: Map network drives Connect to printers Modify environment variables e.g. Temp Run basic functions such as CreateObject and GetObject Print a message to a Message Box on screen Modify keys… Continue reading OS Jobs Scripts Can Do

MySQL Installation Notes on Windows 200x and IIS 6 / 7

This document describes the steps necessary to do a basic mySQL database engine installation on a computer running Windows 2000x Server and IIS 6. What you’ll need Windows 200x Server running Internet Information Server (IIS) 6.0 A copy of the mySQL binary distribution for Windows NT / 200X The Steps: Download the mySQL binary for… Continue reading MySQL Installation Notes on Windows 200x and IIS 6 / 7

Basic SQL Parameters

Memory, max size in 2 kb units available to SQL User connections, max number of worker threads that are available for SQL server process, default is 255. Max Worker Threads, the number of worker threads that are available for SQL server processes. Default is 255. SMP concurrency, controls the number of threads SQL server will… Continue reading Basic SQL Parameters

Setting your MySQL Administrator password and creating Guest Passwords

Once MySQL installed & operational, you should immediately set the password for your administrator account (called “root”) and set up at least one guest account, which has limited privileges. Iin the case of the example specified below, the user named “guest” only has SELECT privileges for the database database_name and all tables (specified by the… Continue reading Setting your MySQL Administrator password and creating Guest Passwords

Service-Oriented Architecture (SOA)

Service-Oriented Architecture (SOA) is an architectural style that supports service orientation. Service orientation is a way of thinking in terms of services and service-based development and the outcomes of services. A service: Is a logical representation of a repeatable business activity that has a specified outcome (e.g., check customer credit; provide weather data, consolidate drilling… Continue reading Service-Oriented Architecture (SOA)

TCP and UDP ports

  Port Category Port Number Range Description Well-known ports 0 – 1023 Typically used by standard system processes or programs executed by users with administrator credentials. Assigned by IANA. Registered ports 1024 – 49151 Used by ordinary user processes or programs executed by ordinary users. IANA does not assign these ports, but registers use of… Continue reading TCP and UDP ports

Physical and Perimters test cases

Perimeter Review This is a method of testing the physical security of an organization and its assets by reviewing is its physical perimeter security measures. Expected Results: 1        Map of physical perimeter 2        Types of physical protective measures 3        List of unprotected / weakly protected areas Tasks to perform for a thorough Perimiter review: Map… Continue reading Physical and Perimters test cases

Identity Theft

Identity theft is a crime where a person’s legal identity is stolen and used to conduct financial fraud. Identity thieves steal information about a victim such as bank account information, Social Security number and driver’s license number in order to open accounts in the victim’s name or to change the victim’s account information. In 2009,… Continue reading Identity Theft

What is Tempest

Tempest stands for Transient Electromagnetic Pulse Surveillance Technology. Computers and other electronic equipment release interference to their surrounding environment. You may observe this by placing two video monitors close together. The pictures will behave erratically until you space them apart. What is important for an observer is the emission of digital pulses (1s and 0s)… Continue reading What is Tempest

Email Archiving Software Products

Different product options to consider: AXS-One C2C Archive One CA Message Manager (iLumin) EMC Documentum Archive Services for Email EMC EmailXtender (Legato) FileNet HP StorageWorks Reference Information Manager (RIM) for Messaging IBM DB2 Content Manager CommonStore Messaging Architects GWArchive Mimosa Systems NearPoint for Exchange Open Text Livelink ECM-Email Archiving Quest Archive Manager (AfterMail) Symantec Enterprise… Continue reading Email Archiving Software Products

How to pretend to be succesful in IT Today

Items to Consider Target Behaviors: Analysis and Problem Solving 1        Follows technical interrelated sets of complex issues without difficulty 2        Asks clarifying and shaping questions geared towards thoroughly assessing critical issues 3        Demonstrates creative and occasionally innovative approaches to information gathering within a structured framework 4        Able to enlist the aid of client staff to… Continue reading How to pretend to be succesful in IT Today

Operating System Defacement statistics

48581 time(s)               “Windows“       which is 58.184% of all defacements 16976 time(s)                 “Linux”             which is 21.844% of all defacements 2762 time(s)                 “Unknown”       which is 8.649% of all  defacements 2242 time(s)                 “Solaris”           which is 3.889% of all  defacements 8275 time(s)                   “FreeBSD”       which… Continue reading Operating System Defacement statistics

Building Mission & Vision Statements

Mission statements are defining statements for an organization. An organization exists to accomplish its mission. The mission statement typically defines: o The business of the organization, o The product of the organization, o The customers of the organization. When stating the mission of the organization, focus outside of the organization, looking at customers, suppliers, and… Continue reading Building Mission & Vision Statements

What to do with Correlated Data

Threat Analysis – This is a process of taking the correlated data and determining what it means and then prioritizing the data. Includes the reduction of False Positives. Forensic Analysis – The ability to analyze correlated events historically for trending and for prosecution. Policy Analysis – Correlation provides a holistic view, providing a complete picture… Continue reading What to do with Correlated Data

Why is Correlation and Threat Analysis Important

Reduce operating costs through efficiency and better resource allocation: Monitor existing environment and deploy additional security measures without increasing resources Improve decision-making processes Dramatically reduce response times Avoid the costs associated with a breach Downtime, theft, or damage to reputation Maximize utilization of existing security infrastructure Allows customers to manage their “Best of Breed” products… Continue reading Why is Correlation and Threat Analysis Important

Download Tons of free miscellanious Research Documents

Download all files here: All_PPTs.zip 101 Security.ppt As time permits this list of files will increase in content 2000 Accounts.ppt 8021x simplified.ppt Administration of a Windows 2000 Network.ppt Advanced Windows NT Security.ppt Application Support with MSI.ppt Business Data Communications and Networking.ppt Communications Decency Act.doc COPPA.ppt Distributed File System.ppt Distributed Firewall Architecture.ppt Download Windows 2000 Performance Tuning &… Continue reading Download Tons of free miscellanious Research Documents

Viruses, Spyware and Malware Impacts

Performance Impacts to your System(s) Tax – Memory resources Tax – Processor resources Pop-ups Trojans Malware Spyware Greyware Virus propagation P2P applications / file sharing Hidden applications Removal of restore points Keystroke loggers Results in a: Compromise use Compromise data Compromise email Compromise confidentiality System could be used to attack other systems Shares Hidden Shares… Continue reading Viruses, Spyware and Malware Impacts

Sample Visio – Requirements for Security Auditing – Logging Tool

Log Consolidation – Must have the capability to consolidate security logs of various types across platforms and software. Log Consolidation – Must have the capability to consolidate security logs of various types across platforms and software. Log Audit Reports – Intelligent reporting, not just dumps of logs. Real time problem alerting.  Centralized security console –… Continue reading Sample Visio – Requirements for Security Auditing – Logging Tool

Blended Threats

A blended threat is a security attack or threat that uses multiple methods and techniques to propagate an attack Combine hacking, DoS, and worm-like propagation Can rapidly compromise millions of machines Often spread without human interaction Require multiple layers of protection and response to neutralize Exploit software vulnerabilities Email virus Network virus/worm Backdoors Instant Messenger… Continue reading Blended Threats

Legacy IE Browser Settings

Microsoft Internet Explorer 6.0 Advanced Properties Tab – within Internet Options (the ones that are checked) Browsing Always send URLs as UTF-8 Close unused folders in History and Favorites Disable script debugging Enable folder view for FTP sites Enable Install On Demand Enable Offline items to be synchronized on a schedule Enable page transitions Enable… Continue reading Legacy IE Browser Settings

Unhappy employees Risk Factors

Employees are a greater risk to computer-security for companies than the much-feared hacker, and experts say. Eight in 10 computer-security breaches are caused by staff members, many of whom are simply disgruntled, says a risk consultant Eighty per cent of IT security breaches are the result of actions by staff Fifty per cent are disgruntled… Continue reading Unhappy employees Risk Factors