Sample Visio Document download, Web / Server Architecture drawings: Sample Shared Web Tiers.vsd Sample Server Architecture.vsd www.bestitdocuments.com
Tag: ITIL Application Services – SDLC – Web Services
DataFort E-Series appliance uses the following network ports and protocols
Port ID Port Protocol Appliance Interface Communication Interface Communicate over VIP Programmable Port ID 21 TCP FTP For data access over FTP Management Client Yes No 22 TCP SSH Secure Shell Management Client No No 53 UDP DNS DNS network client Management client Storage Yes No 69 UDP TFTP TFTP Traffic Management Client Storage… Continue reading DataFort E-Series appliance uses the following network ports and protocols
Evaluating a Vendor product
1) Provide a high level overview of what the product is marketed to do. 2) Now, provide the details of what “you” (the buyer) are expecting it to do. 3) Find someplace where the product can be installed and tested. Before you begin, document what your expectations of how the install will go, and your… Continue reading Evaluating a Vendor product
RSA 7.x – Port Usage
RSA 7.x – Port Usage Port Protocol Description 1161 UDP SNMP agent – Used to communicate with a Network Management Server using the Simple Network Management Protocol. 1162 UDP SNMP agent -Used to communicate with a Network Management Server using the Simple Network Management Protocol. 1645 UDP RADIUS authentication (legacy port) – Used for… Continue reading RSA 7.x – Port Usage
Sample Excel – SQL Patch sets – Serious – Critical – Urgent listings
Free Spread Sheet Document download: SQL Patch sets – Serious – Critical – Urgent Details.xls https://www.bestitdocuments.com/Samples
Sample Web Monitor Content Considerations
Web Monitor HTTP_Servers This rule logs URLs and hosts in the URL Log. This rule, like LogUnmatched, does not match connections. It is used for data collection only, not for blocking or allowing. When adding this rule, some options in the Rule Properties window are unavailable. It is recommended that you place this rule near… Continue reading Sample Web Monitor Content Considerations
Default Oracle Ports
Default Oracle TCP / UDP Ports usage Description Port Application Actions Oracle HTTP Server listen port / Oracle HTTP Server port 80 Oracle Application Server Edit httpd.conf and restart OHS Oracle Internet Directory(non-SSL) 389 Oracle Application Server Oracle HTTP Server SSL port 443 Oracle Application Server Edit httpd.conf and restart OHS Oracle Internet Directory(SSL)… Continue reading Default Oracle Ports
MS Word 2003 How to turn OFF Delete Block dialogue in Microsoft Word
MS Word 2003 How to turn OFF Delete Block dialogue in Microsoft Word MS word 2003 To turn OFF “Delete Block?” (no / yes) Tool / Options / General Uncheck 2 boxes pertaining to “Word Perfect help and Navigation” Outlook Repair. Then, please type the following at “Start” “run”: Regsvr32.exe %Windir%System32Ole32.dll Once doing this, you… Continue reading MS Word 2003 How to turn OFF Delete Block dialogue in Microsoft Word
Oracle 8 -9 Vulnerabilities Patches
Priority Oracle 8 -9 Vulnerabilities Patches Security Alert Number And Description MetaLink Note ID Latest Version/Date Alert 68, Oracle Security Update 281188.1 Rev 4, 2 March 2005 Alert 67, Unauthorized Access Vulnerabilities in Oracle E-Business Suite 274356.1 Rev 1, 3 June 2004 Alert 66, Security Vulnerabilities in Oracle Application Server Web Cache 265308.1 Rev 2,… Continue reading Oracle 8 -9 Vulnerabilities Patches
Web Server Security – Suggestions
Common Web Vulnerabilities Buffer Overflow Attacks Denial of Service Attacks on vulnerable scripts URL Manipulation Sniffing / Spoofing Credentials Client Parameter Manipulation Brute Force Attacks Web Server Fingerprinting Web Defacements Take web servers seriously, server security is essential for web security, recommendations: Harden servers from attack • Use a hardening guide like CIS or MS… Continue reading Web Server Security – Suggestions
System and Application Unit Testing
Testing must be an on-going activity throughout all phases of a project and should be an integral component of quality assurance efforts. A complete testing strategy cannot be developed until after vendor selection, so this section contains suggestions for possible activities that could be included in a testing strategy, and a general description of the… Continue reading System and Application Unit Testing
SDLC – Application System Definition Model
Audience: Application & System Services Communication & Collaboration Service: Database Administration Desktop Computer Services Disaster Recovery & Business Continuity Services Facilities A formal model of a complete system All information pertinent to deployment and operations Machine-readable, capturing intent of developers and administrators System topology Developer constraints IT policy Installation directives Health model Monitoring rules Service… Continue reading SDLC – Application System Definition Model
Testing Approach and Strategy
Testing Approach and strategy helps you prepare the list of testing requirements and the testing strategy for supporting the new corporate procurement and application module. Included are descriptions of the target audience, delivery method, and objectives. In addition, the testing approach and strategy identify: The high level objectives and tasks of each testing phase The… Continue reading Testing Approach and Strategy
Sample SDLC Development Project Deliverables
Deliverables and Combined Processes Discovery Project Roadmap Planning Customer & Stakeholder requirements prioritization & signoff Internal Services Catalog Project Risks Identified UI Models List of Alternative Solutions Selection of Best Solutions for further research Hardware Solutions Demos Financial Approval Potential Solutions Modeled in Test Lab Initial Security Requirements Definition Initial Project Plan & completion Estimate… Continue reading Sample SDLC Development Project Deliverables
Basic Oracle Hardening
Disable install and demo accounts: Disallow default user/password PUBLIC has execute System privilege PUBLIC has execute Object privilege PUBLIC has execute UTL_FILE privilege PUBLIC has execute UTL_SMTP privilege PUBLIC has execute UTL_HTTP privilege PUBLIC has execute UTL_TCP privilege PUBLIC has execute DBMS_RANDOM Password complexity Restrict number of failed login attempts Authentication protocol fallback Connect and… Continue reading Basic Oracle Hardening
Datacenter – Application Lifecycle Considerations
Service Monitoring • Availability• Logging• Auditing• Performance Metrics• Debugging & Tracing• Synthetic Transactions Exception Management • Error Trapping• Root Cause Analysis• Notification Services Version Management • Data Contracts• Message & Operation Contracts• Endpoints (Addresses)• Policies• Internal Dependencies• Claims• Service Retirement• Dependency Analysis Service Delivery • Methodology• Standardized Service Delivery Lifecycles Policy and Security Considerations •… Continue reading Datacenter – Application Lifecycle Considerations
Guiding Principles for Software Security
Behind every attack & security problem is – bad software A major concern is that security professionals are often un-aware the problem is – bad software Encrypt your data lines? The riskiest category of software today is Internet-enabled apps “Using encryption on the Internet is the equivalent of arranging an armored car to deliver credit… Continue reading Guiding Principles for Software Security
Principles of Software Security
Secure the weakest link Low-hanging fruit is picked first, I.e. Attack end points, not encrypted links Risk analysis ID’s the weakest link Apportion resources according to risk Practice defense in depth One layer is never enough Overlapping & redundant Fail securely Failure is unavoidable Allow least privilege Only the minimum access is allowed For… Continue reading Principles of Software Security
eGIS Imagery Hosting Considerations
Goal to have all imagery served to all A -B Corporate users from a single location Evaluation Outsource to Spatial Energy Host Internal via ESRI Image Server www.bestitdocuments.com
Sample eGIS Collaboration
Single storage location for all eGIS data Access for Corporate Users Web Based Mapping Access to all Geo-spatial Data Compliant with Corporate Security Policy Subscription Service to Download Geo-spatial Data Map based access to Documents in Document Management System Map based access to Permits including geographic coverage Collaboration Geo-spatial Functionality Map based access to Environmental… Continue reading Sample eGIS Collaboration
Sample Application Hosting Services
Server Administration Application Support Infrastructure Support Upgrades DB Overlays, Cloning, creation and data population Database Maintenance Patch Management Middleware Optimization and Mnagement Databased Backup Administration Database Security Administration Database Connection… Continue reading Sample Application Hosting Services
Knowledge Lake Imaging Server
KnowledgeLake Imaging Server eliminates the costs and challenges of using paper documents, as well as the limitations it puts on your business processes. Built on Microsoft® SharePoint®, KnowledgeLake Imaging Server uses the latest technology to provide features that extend SharePoint’s enterprise content management capabilities throughout your organization. With KnowledgeLake Imaging Server, you can: Provide easy… Continue reading Knowledge Lake Imaging Server
Application Fix Suggestions
Create or modify standardized processes or procedures for: Business requirements Project Management eCommerce Services Web Design (CSS) Development Coding Interdependent transactions Authentication Storybook’s Testing Use cases Acceptance processes Pre-production security scans and remediation Dependencies should be: Accurate Asset Management Accurate IP Control Reliable Network infrastructure Governance: Policies, Standard and Procedures Business processes Upstream / Downstream… Continue reading Application Fix Suggestions
Success of your Business
Outsourced solutions insure the success of your business The road to profitability is paved with criteria that, if achieved successfully, can ensure your site’s success. In today’s Intranet economy, whether you are a service or content provider, you need to differentiate your offering from your competitors’ by: · Building customer loyalty and strengthening relationships · Identifying… Continue reading Success of your Business
Application Development Services
ERP – CRM Sample details Common Corporate Departments: Application Architecture and Internal Consulting Application Development Tools Research and Deployment Application Development Training Coordination Application Needs Analysis and Project Identification Application Security and End User Access Control (Some Applications) Application Systems Development Application Systems Operational Support Applications Integration and Systems Interfaces Applications Systems Enhancement Application Vendor Support… Continue reading Application Development Services
Sample Visio – Application Testing
Unit Testing Unit testing of internal and external objects in the patch set or application release is conducted in the development environment by the application developers. Unit testing ensures that the object will execute and desired outputs are produced. Debugging and verification of output results are performed by the developer. When unit testing has completed,… Continue reading Sample Visio – Application Testing
Sample Simple Coding Project Plan
Finalize Packaging Publish High Level Assessment Prepare Project Schedule Scope Closure & Exec Approval Analysis & Design Publish Design Documentation Code and Unit Test Perl or script Distribution Compilation Proxy Compilations for Design Application Create XML File Update Development Testing System Testing Availability of Contractor Test Planning & Preparation Test Strategy Document Test Strategy Document… Continue reading Sample Simple Coding Project Plan
Sample Directory Services Consolidation Project
Directory Services is an integral component of the solutions an enterprise data center should offer its clients. It is advisable to initiate a project to migrate and consolidate the Corporate departments, existing directory services, including Windows, Netware, and any others. It is recommended to consolidate all directory services to a single platform, like Microsoft Active… Continue reading Sample Directory Services Consolidation Project
Sample Application Server Consolidation
File / Print / Utility Servers Ability to provide a more predictable and dense application consolidation which will result in a further reduction of server footprint Save time and money by accelerating costs savings through deeper consolidation Lower the risks involved in a higher density of applications per server in a consolidated environment Provides the… Continue reading Sample Application Server Consolidation
Sample – Shared Application Development and Testing Environment Project
The availability of a shared application development and testing environment will provide agencies parallel production-like environments without having to maintain and purchase equipment for the department sites. Multiple standard environments can quickly be provisioned into a server partition in less than 15 minutes (based on predefined server builds and the proper tools) and can be tested… Continue reading Sample – Shared Application Development and Testing Environment Project
Software Security and SDLC Considerations
Technical security architecture Application security architecture Application security architecture document Architecture control board Data model Data security architecture document Data security architecture Platform security architecture Platform security architecture document Enterprise architecture governance Security in the system development lifecycle Security requirements of information systems Security requirements analysis and specification Define information system security requirements Information system… Continue reading Software Security and SDLC Considerations