IT 2042 Information Security 4-1

Size: px
Start display at page:

Download "IT 2042 Information Security 4-1"

Transcription

1 IT 2042 Infrmatin Security 4-1 UNIT IV LOGICAL DESIGN Blueprint fr Security, Infrmatin Security plicy, Standards and Practices, ISO 17799/BS 7799, NIST Mdels, VISA Internatinal Security Mdel, Design f Security Architecture, Planning fr Cntinuity. Planning fr Security - Creatin f infrmatin security prgram begins with creatin and/r review f rganizatin s infrmatin security plicies, standards, and practices Then, selectin r creatin f infrmatin security architecture and the develpment and use f a detailed infrmatin security blueprint creates plan fr future success Security educatin and training t successfully implement plicies and ensure secure envirnment Why Plicy? A quality infrmatin security prgram begins and ends with plicy Plicies are least expensive means f cntrl and ften the mst difficult t implement Sme basic rules must be fllwed when shaping a plicy: Never cnflict with law Stand up in curt Prperly supprted and administered Cntribute t the success f the rganizatin Invlve end users f infrmatin systems Definitins Plicy: curse f actin used by an rganizatin t cnvey instructins frm management t thse wh perfrm duties Organizatinal rules fr acceptable/unacceptable behavir Penalties fr vilatins Appeals prcess Standards: mre detailed statements f what must be dne t cmply with plicy Practices, prcedures and guidelines effectively explain hw t cmply with plicy Fr a plicy t be effective it must be Prperly disseminated Read Understd Agreed t by all members f rganizatin

2 IT 2042 Infrmatin Security 4-2 Types f Plicies Enterprise infrmatin Security prgram Plicy(EISP) Issue-specific infrmatin Security Plicy ( ISSP) Systems-specific infrmatin Security Plicy (SysSP) Enterprise Infrmatin Security Plicy (EISP) Als Knwn as a general Security plicy, IT security plicy, r infrmatin security plicy. Sets strategic directin, scpe, and tne fr all security effrts within the rganizatin Assigns respnsibilities t varius areas f infrmatin security Guides develpment, implementatin, and management f infrmatin security prgram Issue-Specific Security Plicy (ISSP) The ISSP: Addresses specific areas f technlgy Requires frequent updates Cntains statement n psitin n specific issue Appraches t creating and managing ISSPs: Create number f independent ISSP dcuments

3 IT 2042 Infrmatin Security 4-3 Create a single cmprehensive ISSP dcument Create a mdular ISSP dcument ISSP tpics culd include: , use f Web, cnfiguratins f cmputers t defend against wrms and viruses, prhibitins against hacking r testing rganisatin security cntrls, hme use f cmpany-wned cmputer equipment, use f persnal equipment n cmpany netwrks, use f telecmmunicatins technlgies(fax and phne), use f phtcpiers Cmpnents f the ISSP Statement f Plicy Scpe and Applicability Definitin f Technlgy Addressed Respnsibilities Authrized Access and Usage f Equipment User Access Fair and Respnsible Use Prtectin f Privacy Prhibited Usage f Equipment Disruptive Use r Misuse Criminal Use Offensive r Harassing Materials Cpyrighted, Licensed r ther Intellectual Prperty Other Restrictins Systems Management Management f Stred Materials Emplyer Mnitring Virus Prtectin Physical Security Encryptin Vilatins f Plicy Prcedures fr Reprting Vilatins Penalties fr Vilatins Plicy Review and Mdificatin Scheduled Review f Plicy and Prcedures fr Mdificatin Limitatins f Liability Statements f Liability r Disclaimers Systems-Specific Plicy (SysSP) SysSPs are frequently cdified as standards and prcedures t be used when cnfiguring r maintaining systems Systems-specific plicies fall int tw grups: Access cntrl lists (ACLs) cnsist f the access cntrl lists, matrices, and capability tables gverning the rights and privileges f a particular user t a particular system Cnfiguratin rules cmprise the specific cnfiguratin cdes entered int security systems t guide the executin f the system

4 IT 2042 Infrmatin Security 4-4 ACL Plicies Bth Micrsft Windws NT/2000 and Nvell Netware 5.x/6.x families f systems translate ACLs int sets f cnfiguratins that administratrs use t cntrl access t their respective systems ACLs allw a cnfiguratin t restrict access frm anyne and anywhere ACLs regulate: Wh can use the system What authrized users can access When authrized users can access the system Where authrized users can access the system frm Hw authrized users can access the system The Infrmatin Security Blueprint It is the basis fr the design, selectin, and implementatin f all security plicies, educatin and training prgrams, and technlgical cntrls. Mre detailed versin f security framewrk, which is an utline f verall infrmatin security strategy fr rganizatin and a rad map fr planned changes t the infrmatin security envirnment f the rganizatin. Shuld specify tasks t be accmplished and the rder in which they are t be realized. Shuld als serve as a scalable, upgradeable, and cmprehensive plan fr the infrmatin security needs fr cming years. Security Mdels ISO 17799/BS 7799 One f the mst widely referenced and ften discussed security mdels is the Infrmatin Technlgy Cde f Practice fr Infrmatin Security Management, which was riginally published as British Standard BS 7799 In 2000, this Cde f Practice was adpted as an internatinal standard framewrk fr infrmatin security by the Internatinal Organizatin fr Standardizatin (ISO) and the Internatinal Electrtechnical Cmmissin (IEC) as ISO/IEC Drawbacks f ISO 17799/BS 7799 Several cuntries have nt adpted claiming there are fundamental prblems: The glbal infrmatin security cmmunity has nt defined any justificatin fr a cde f practice as identified in the ISO/IEC lacks the necessary measurement precisin f a technical standard There is n reasn t believe that is mre useful than any ther apprach currently available

5 IT 2042 Infrmatin Security is nt as cmplete as ther framewrks available is perceived t have been hurriedly prepared given the tremendus impact its adptin culd have n industry infrmatin security cntrls Objectives f ISO Organizatinal Security Plicy is needed t prvide management directin and supprt. Ten Sectins f ISO/IEC a. Organizatinal Security Plicy b. Organizatinal Security Infrastructure c. Asset Classificatin and Cntrl d. Persnnel Security e. Physical and Envirnmental Security f. Cmmunicatins and Operatins Management g. System Access Cntrl h. System Develpment and Maintenance i. Business Cntinuity Planning j. Cmpliance Alternate Security Mdels available ther than ISO 17799/BS 7799 NIST Security Mdels This refers t The Natinal Security Telecmmunicatins and Infrmatin systems Security Cmmittee dcument. This dcument presents a cmprehensive mdel fr infrmatin security. The mdel cnsists f three dimensins. Anther pssible apprach available is described in the many dcuments available frm the Cmputer Security Resurce Center f the Natinal Institute fr Standards and Technlgy (csrc.nist.gv). The fllwing NIST dcuments can assist in the design f a security framewrk: NIST SP : An Intrductin t Cmputer Security: The NIST Handbk NIST SP : Generally Accepted Security Principles and Practices fr Securing IT Systems NIST SP : The Guide fr Develping Security Plans fr IT Systems NIST SP : Security Self-Assessment Guide fr IT systems. NIST SP : Risk Management fr IT systems. NIST Special Publicatin SP SP is an excellent reference and guide fr the security manager r administratr in the rutine management f infrmatin security.

6 IT 2042 Infrmatin Security 4-6 It prvides little guidance, hwever, n design and implementatin f new security systems, and therefre shuld be used nly as a valuable precursr t understanding an infrmatin security blueprint. NIST Special Publicatin SP Generally accepted Principles and practices fr Security Infrmatin Technlgy Systems. Prvides best practices and security principles that can direct the security team in the develpment f Security Blue Print. The scpe f NIST SP is brad. It is imprtant t cnsider each f the security principles it presents, and therefre the fllwing sectins examine sme f the mre significant pints in mre detail: Security Supprts the Missin f the Organizatin Security is an Integral Element f Sund Management Security Shuld Be Cst-Effective Systems Owners Have Security Respnsibilities Outside Their Own Organizatins Security Respnsibilities and Accuntability Shuld Be Made Explicit Security Requires a Cmprehensive and Integrated Apprach Security Shuld Be Peridically Reassessed Security is Cnstrained by Scietal Factrs 33 Principles enumerated NIST SP The Guide fr Develping Security plans fr Infrmatin Technlgy Systems can be used as the fundatin fr a cmprehensive security blueprint and framewrk. It prvides detailed methds fr assessing, and implementing cntrls and plans fr applicatins f varying size. It can serve as a useful guide t the activities and as an aid in the planning prcess. It als includes templates fr majr applicatin security plans. The table f cntents fr Publicatin is presented in the fllwing. System Analysis - System Bundaries - Multiple similar systems - System Categries Plan Develpment- All Systems - Plan cntrl - System identificatin - System Operatinal status - System Intercnnectin/ Infrmatin Sharing - Sensitivity f infrmatin handled - Laws, regulatins and plicies affecting the system Management Cntrls Risk Assessment and Management

7 IT 2042 Infrmatin Security 4-7 Review f Security Cntrls Rules f behavir Planning fr security in the life cycle Authrizatin f Prcessing (Certificatin and Accreditatin) System Security Plan Operatinal Cntrls 1. Persnnel Security 2. Physical Security 3. Prductin, Input/Output Cntrls 4. Cntingency Planning 5. Hardware and Systems Sftware 6. Data Integrity 7. Dcumentatin 8. Security Awareness, Training, and Educatin 9. Incident Respnse Capability Technical Cntrls Identificatin and Authenticatin Lgical Access Cntrls Audit Trails NIST SP : Security Self-Assessment Guide fr IT systems NIST SP Table f cntents Management Cntrls 1. Risk Management 2. Review f Security Cntrls 3. Life Cycle Maintenance 4. Authrizatin f Prcessing (Certificatin and Accreditatin) 5. System Security Plan Operatinal Cntrls 6. Persnnel Security 7. Physical Security 8. Prductin, Input/Output Cntrls 9. Cntingency Planning 10. Hardware and Systems Sftware 11. Data Integrity 12. Dcumentatin 13. Security Awareness, Training, and Educatin 14. Incident Respnse Capability Technical Cntrls 15. Identificatin and Authenticatin 16. Lgical Access Cntrls 17. Audit Trails Management cntrls address the design and implementatin f the security planning prcess and security prgram management. They als address risk management and security cntrl reviews. They further describe the necessity and scpe f legal cmpliance and the maintenance f the entire security life cycle.

8 IT 2042 Infrmatin Security 4-8 Operatinal cntrls deal with the peratinal functinality f security in the rganizatin. They include management functins and lwer level planning, such as disaster recvery and incident respnse planning. They als address persnnel security, physical security, and the prtectin f prductin inputs and utputs. They guide the develpment f educatin, training and awareness prgrams fr users, administratrs, and management. Finally, they address hardware and sftware systems maintenance and the integrity f data. Technical cntrls address the tactical and technical issues related t designing and implementing security in the rganizatin, as well as issues related t examining and selecting the technlgies apprpriate t prtecting infrmatin. They address the specifics f technlgy selectin and the acquisitin f certain technical cmpnents. They als include lgical access cntrls, such as identificatin, authenticatin, authrizatin, and accuntability. They cver cryptgraphy t prtect infrmatin in strage and transit. Finally, they include the classificatin f assets and users, t facilitate the authrizatin levels needed. Using the three sets f cntrls, the rganizatin shuld be able t specify cntrls t cver the entire spectrum f safeguards, frm strategic t tactical, and frm managerial t technical. VISA Internatinal Security Mdel It prmtes strng security measures in its business assciates and has established guidelines fr the security f its infrmatin systems. It has develped tw imprtant dcuments 1. Security Assessment Prcess 2. Agreed Upn Prcedures. Bth dcuments prvide specific instructins n the use f the VISA Cardhlder Infrmatin Security Prgram. The Security Assessment Prcess dcument is a series f recmmendatins fr the detailed examinatin f an rganizatin s systems with the eventual gal f integratin int the VISA systems. The Agreed upn Prcedures dcument utlines the plicies and technlgies required fr security systems that carry the sensitive card hlder infrmatin t and frm VISA systems. Using the tw dcuments, a security team can develp a sund strategy fr the design f gd security architecture. The nly dwnside t this apprach is the specific fcus n systems that can r d integrate with VISA s systems with the explicit purpse f carrying the afrementined cardhlder infrmatin. Baselining & Best Business Practices Baselining and best practices are slid methds fr cllecting security practices, but prvide less detail than a cmplete methdlgy Pssible t gain infrmatin by baselining and using best practices and thus wrk backwards t an effective design

9 IT 2042 Infrmatin Security 4-9 The Federal Agency Security Practices (FASP) site (fasp.nist.gv) designed t prvide best practices fr public agencies and adapted easily t private institutins. The dcuments fund in this site include specific examples f key plicies and planning dcuments, implementatin strategies fr key technlgies, and psitin descriptins fr key security persnnel. Of particular value is the sectin n prgram management, which includes the fllwing: - A summary guide: public law, executive rders, and plicy dcuments - Psitin descriptin fr cmputer system security fficer. - Psitin descriptin fr infrmatin security fficer - Psitin descriptin fr cmputer specialist. - Sample f an infrmatin technlgy(it) security staffing plan fr a large service applicatin(lsa) - Sample f an infrmatin technlgy(it) security prgram plicy - Security handbk and standard perating prcedures. - Telecmmuting and mbile cmputer security plicy. Hybrid Framewrk fr a Blueprint f an Infrmatin Security System -The framewrk f security includes philsphical cmpnents f the Human Firewall Prject, which maintain that peple, nt technlgy, are the primary defenders f infrmatin assets in an infrmatin security prgram, and are uniquely respnsible fr their prtectin. - The spheres f security are the fundatin f the security framewrk. - The sphere f use, at the left in fig, explains the ways in which peple access infrmatin; fr example, peple read hard cpies f dcuments and can als access infrmatin thrugh systems. - The sphere f prtectin at the right illustrates that between each layer f the sphere f use there must exist a layer f prtectin t prevent access t the inner layer frm the uter layer. - Each shaded band is a layer f prtectin and cntrl. Sphere f Prtectin The sphere f prtectin verlays each f the levels f the sphere f use with a layer f security, prtecting that layer frm direct r indirect use thrugh the next layer The peple must becme a layer f security, a human firewall that prtects the infrmatin frm unauthrized access and use Infrmatin security is therefre designed and implemented in three layers plicies peple (educatin, training, and awareness prgrams) technlgy

10 IT 2042 Infrmatin Security 4-10 As illustrated in the sphere f prtectin, a variety f cntrls can be used t prtect the infrmatin. The items f cntrl shwn in the figure are nt intended t be cmprehensive but rather illustrate individual safeguards that can prtect the varius systems that are lcated clser t the center f the sphere. Hwever, because peple can directly access each ring as well as the infrmatin at the cre f the mdel, the side f the sphere f prtectin that attempt t cntrl access by relying n peple requires a different apprach t security than the side that uses technlgy. Design f Security Architecture Defense in Depth - One f the basic fundatins f security architectures is the implementatin f security in layers. This layered apprach is called defense in depth. - Defense in depth requires that the rganizatin establish sufficient security cntrls and safeguards, s that an intruder faces multiple layers f cntrls. -These layers f cntrl can be rganized int plicy, training and educatin and technlgy as per the NSTISSC mdel. - While plicy itself may nt prevent attacks, they cupled with ther layers and deter attacks.

11 IT 2042 Infrmatin Security Training and Educatin are similar. - Technlgy is als implemented in layers, with detectin equipment, all perating behind access cntrl mechanisms. - Implementing multiple types f technlgy and thereby preventing the failure f ne system frm cmprmising the security f the infrmatin is referred t as redundancy. - Redundancy can be implemented at a number f pints thrughut the security architecture, such as firewalls, prxy servers, and access cntrls. - The figure shws the use f firewalls and intrusin detectin systems(ids) that use bth packet-level rules and data cntent analysis. Security Perimeter A Security Perimeter is the first level f security that prtects all internal systems frm utside threats. Unfrtunately, the perimeter des nt prtect against internal attacks frm emplyee threats, r n-site physical threats. Security perimeters can effectively be implemented as multiple technlgies that segregate the prtected infrmatin frm thse wh wuld attack it. Within security perimeters the rganizatin can establish security dmains, r areas f trust within which users can freely cmmunicate. The presence and nature f the security perimeter is an essential element f the verall security framewrk, and the details f implementing the perimeter make up a great deal f the particulars f the cmpleted security blueprint.

12 IT 2042 Infrmatin Security 4-12 The key cmpnents used fr planning the perimeter are presented in the fllwing sectins n firewalls, DMZs, prxy servers, and intrusin detectin systems. Key Technlgy Cmpnents Other key technlgy cmpnents A firewall is a device that selectively discriminates against infrmatin flwing int r ut f the rganizatin. Firewalls are usually placed n the security perimeter, just behind r as part f a gateway ruter. Firewalls can be packet filtering, stateful packet filtering, prxy, r applicatin level. A Firewall can be a single device r a firewall subnet, which cnsists f multiple firewalls creating a buffer between the utside and inside netwrks. The DMZ (demilitarized zne) is a n-man s land, between the inside and utside netwrks, where sme rganizatins place Web servers These servers prvide access t rganizatinal web pages, withut allwing Web requests t enter the interir netwrks. Prxy server- An alternative apprach t the strategies f using a firewall subnet r a DMZ is t use a prxy server, r prxy firewall. When an utside client requests a particular Web page, the prxy server receives the request as if it were the subject f the request, then asks fr the same infrmatin frm the true Web server(acting as a prxy fr the requestr), and then respnds t the request as a prxy fr the true Web server.

13 IT 2042 Infrmatin Security 4-13 Fr mre frequently accessed Web pages, prxy servers can cache r temprarily stre the page, and thus are smetimes called cache servers. Intrusin Detectin Systems (IDSs). In an effrt t detect unauthrized activity within the inner netwrk, r n individual machines, an rganizatin may wish t implement Intrusin Detectin Systems r IDS. IDs cme in tw versins. Hst-based & Netwrk-based IDSs. Hst-based IDSs are usually installed n the machines they prtect t mnitr the status f varius files stred n thse machines. Netwrk-based IDSs lk at patterns f netwrk traffic and attempt t detect unusual activity based n previus baselines. This culd include packets cming int the rganizatin s netwrks with addresses frm machines already within the rganizatin (IP spfing). It culd als include high vlumes f traffic ging t utside addresses (as in cases f data theft) r cming int the netwrk (as in a denial f service attack). Bth hst-and netwrk based IDSs require a database f previus activity.

14 IT 2042 Infrmatin Security 4-14 Security Educatin, Training, and Awareness Prgram As sn as general security plicy exists, plicies t implement security educatin, training and awareness (SETA) prgram shuld fllw. SETA is a cntrl measure designed t reduce accidental security breaches by emplyees. Security educatin and training builds n the general knwledge the emplyees must pssess t d their jbs, familiarizing them with the way t d their jbs securely The SETA prgram cnsists f three elements: security educatin; security training; and security awareness The purpse f SETA is t enhance security by: - Imprving awareness f the need t prtect system resurces. - Develping skills and knwledge s cmputer users can perfrm their jbs mre securely. - Building in-depth knwledge, as needed, t design, implement, r perate security prgrams fr rganizatins and systems. Security Educatin Everyne in an rganizatin needs t be trained and aware f infrmatin security, but nt every member f the rganizatin needs a frmal degree r certificate in infrmatin security. A number f universities have frmal cursewrk in infrmatin security. Fr thse interested in researching frmal infrmatin security prgrams, there are resurces available, such as the NSA-identified Centers f Excellence in Infrmatin Assurance Educatin.

15 IT 2042 Infrmatin Security 4-15 Security Training It invlves prviding members f the rganizatin with detailed infrmatin and hands-n instructin t prepare them t perfrm their duties securely. Management f infrmatin security can develp custmized in-huse training r utsurce the training prgram. Security Awareness One f the least frequently implemented, but mst beneficial prgrams is the security awareness prgram Designed t keep infrmatin security at the frefrnt f users minds Need nt be cmplicated r expensive If the prgram is nt actively implemented, emplyees may begin t tune ut and risk f emplyee accidents and failures increases Cntingency Planning (CP) Cntingency Planning (CP) cmprises a set f plans designed t ensure the effective reactin and recvery frm an attack and the subsequent restratin t nrmal mdes f business peratins. Organizatins need t develp disaster recvery plans, incident respnse plans, and business cntinuity plans as subsets f an verall CP. An incident respnse plan (IRP) deals with the identificatin, classificatin, respnse, and recvery frm an incident, but if the attack is disastrus(e.g., fire, fld, earthquake) the prcess mves n t disaster recvery and BCP A disaster recvery plan (DRP) deals with the preparatin fr and recvery frm a disaster, whether natural r man-made and it is clsely assciated with BCP. A Business cntinuity plan (BCP) ensures that critical business functins cntinue, if a catastrphic incident r disaster ccurs. BCP ccurs cncurrently with DRP when the damage is majr r lng term, requiring mre than simple restratin f infrmatin and infrmatin resurces. Cmpnents f Cntingency Planning Cntingency Planning Incident Respnse Plan Disaster recvery Business cntinuity

16 IT 2042 Infrmatin Security 4-16 There are six steps t cntingency planning. They are 1. Identifying the missin-r business-critical functins, 2. Identifying the resurces that supprt the critical functins, 3. Anticipating ptential cntingencies r disasters, 4. Selecting cntingency planning strategies, 5. Implementing the cntingencies strategies, 6. and Testing and revising the strategy. Incident respnse plan (IRP) It is the set f activities taken t plan fr, detect, and crrect the impact f an incident n infrmatin assets. IRP cnsists f the fllwing 4 phases: 1. Incident Planning 2. Incident Detectin 3. Incident Reactin 4. Incident Recvery Incident Planning -Planning fr an incident is the first step in the verall prcess f incident respnse planning. - The planners shuld develp a set f dcuments that guide the actins f each invlved individual wh reacts t and recvers frm the incident. - These plans must be prperly rganized and stred t be available when and where needed, and in a useful frmat. Incident Detectin -Incident Detectin relies n either a human r autmated system, which is ften the help desk staff, t identify an unusual ccurrence and t classify it prperly as an incident. - The mechanisms that culd ptentially detect an incident include intrusin detectin systems (bth hst-based and netwrk based), virus detectin sftware, systems administratrs, and even end users. - Once an attack is prperly identified, the rganizatin can effectively execute the crrespnding prcedures frm the IR plan. Thus, incident classificatin is the prcess f examining a ptential incident, r incident candidate, and determining whether r nt the candidate cnstitutes an actual incident. - Incident Indicatrs- There is a number f ccurrences that culd signal the presence f an incident candidate. - Dnald Pipkin, an IT security expert, identifies three categries f incident indicatrs: Pssible, Prbable, and Definite Indicatrs. -Pssible Indicatrs- There are 4 types f pssible indicatrs f events,they are, 1. Presence f unfamiliar files. 2. Presence r executin f unknwn prgrams r prcesses. 3. Unusual cnsumptin f cmputing resurces 4. Unusual system crashes

17 IT 2042 Infrmatin Security Prbable Indicatrs- The fur types f prbable indicatrs f incidents are 1. Activities at unexpected times. 2. Presence f new accunts 3. Reprted attacks 4. Ntificatin frm IDS Definite Indicatrs- The five types f definite indicatrs f incidents are 1. Use f Drmant accunts 2. Changes t lgs 3. Presence f hacker tls 4. Ntificatins by partner r peer 5. Ntificatin by hacker Incident Reactin It cnsists f actins utlined in the IRP that guide the rganizatin in attempting t stp the incident, mitigate the impact f the incident, and prvide infrmatin fr recvery frm the incident. These actins take place as sn as the incident itself is ver. In reacting t the incident there are a number f actins that must ccur quickly, including ntificatin f key persnnel and dcumentatin f the incident. These must have been priritized and dcumented in the IRP fr quick use in the heat f the mment. Incident Recvery The recvery prcess invlves much mre than the simple restratin f stlen, damaged, r destryed data files. It invlves the fllwing steps. 1. Identify the Vulnerabilities 2. Address the safeguards. 3. Evaluate mnitring capabilities 4. Restre the data frm backups. 5. Restre the services and prcesses in use. 6. Cntinuusly mnitr the system 7. Restre the cnfidence f the members f the rganizatin s cmmunities f interest. Disaster Recvery Plan (DRP) DRP prvides detailed guidance in the event f a disaster and als prvides details n the rles and respnsibilities f the varius individuals invlved in the disaster recvery effrt, and identifies the persnnel and agencies that must be ntified. At a minimum, the DRP must be reviewed during a walk-thrugh r talkthrugh n a peridic basis. Many f the same precepts f incident respnse apply t disaster recvery: 1. There must be a clear establishment f pririties 2. There must be a clear delegatin f rles and respnsibilities 3. Smene must initiate the alert rster and ntify key persnnel. 4. Smene must be tasked with the dcumentatin f the disaster. 5. If and nly if it is pssible, attempts must be made t mitigate the impact f the disaster n the peratins f the rganizatin.

18 IT 2042 Infrmatin Security 4-18 Business Cntinuity Plan (BCP) It prepares an rganizatin t reestablish critical business peratins during a disaster that affects peratins at the primary site. If a disaster has rendered the current lcatin unusable fr cntinued peratins, there must be a plan t allw the business t cntinue t functin. Develping Cntinuity Prgrams Once the incident respnse plans and disaster recvery plans are in place, the rganizatin needs t cnsider finding temprary facilities t supprt the cntinued viability f the business in the event f a disaster. The develpment f the BCP is simpler than that f the IRP and DRP,in that it cnsists f selecting a cntinuity strategy and integrating the ff-site data strage and recvery functins int this strategy. Cntinuity Strategies There are a number f strategies frm which an rganizatin can chse when planning fr business cntinuity. The determining factr in selectin between these ptins is usually cst. In general there are three exclusive ptins: Ht sites, Warm Sites, and Cld sites; and three shared functins: Time-share, Service bureaus, and Mutual Agreements. Ht sites: A ht site is a fully cnfigured facility, with all services, cmmunicatins links, and physical plant peratins including heating and air cnditining. It is the pinnacle f cntingency planning, a duplicate facility that needs nly the latest data backups and the persnnel t functin as a fully peratinal twin f the riginal. Disadvantages include the need t prvide maintenance fr all the systems and equipment in the ht site, as well as physical and infrmatin security. Warm sites: A warm site includes cmputing equipment and peripherals with servers but nt client wrk statins. It has many f the advantages f a ht site, but at a lwer cst. Cld Sites: A cld site prvides nly rudimentary services and facilities, N cmputer hardware r peripherals are prvided. Basically a cld site is an empty rm with heating, air cnditining, and electricity. The main advantage f cld site is in the area f cst. Time-shares: It allws the rganizatin t maintain a disaster recvery and business cntinuity ptin, but at a reduced verall cst. The advantages are identical t the type f site selected(ht, warm, r cld). The disadvantages are the pssibility that mre than ne rganizatin invlved in the time share may need the facility simultaneusly and the need t stck the facility with the equipment and data frm all rganizatins invlved, the negtiatins fr arranging the timeshare, and assciated arrangements, shuld ne r mre parties decide t cancel the agreement r t sublease its ptins.

19 IT 2042 Infrmatin Security 4-19 Service bureaus: A service bureau is an agency that prvides a service fr a fee. In the case f disaster recvery and cntinuity planning, the service is the agreement t prvide physical facilities in the event f a disaster. These types f agencies als prvide ff-site data strage fr a fee. The disadvantage is that it is a service, and must be renegtiated peridically. Als, using a service bureau can be quite expensive. Mutual Agreements: A mutual agreement is a cntract between tw r mre rganizatins that specifies hw each will assist the ther in the event f a disaster. Review Questins 1. What is a plicy? 2. Explain hw infrmatin security plicy is implemented as prcedure? 3. What are the three types f security plicies? Explain. 4. What are ACL Plicies? 5. What is Infrmatin Security Blueprint? 6. Define ISO 17799/BS 7799 Standards and their drawbacks 7. What are the bjectives f ISO 17799? 8. What is the alternate Security Mdels available ther than ISO 17799/BS 7799? 9. Cmpare the Issues-Specific Security Plicy(ISSP) and System Specific Plicies (SysSP). 10. What is meant by Internatinal Security Mdel? 11. State the prs f VISA internatinal security mdel. 12. Describe NIST security mdels. 13. Explain NIST SP Explain NIST SP What is Sphere f prtectin? 16. What is Defense in Depth? 17. What is Security perimeter? 18. What are the key technlgical cmpnents used fr security implementatin? 19. Hw can a security framewrk assist in the design and implementatin f a security infrastructure? 20. Briefly describe management, peratinal, and technical cntrls, and explain when each wuld be applied as part f a security framewrk? 21. What is cntingency planning? What are the cmpnents f cntingency planning? 22. When is IRP used? 23. When is DRP used? 24. When is BCP used? Hw d yu determine when t use IRP, DRP, r BCP plans? 25. What are Pipkin s three categries f incident indicatrs? 26. List and describe the six cntinuity strategies. 27. Explain clearly abut spheres f security fr a blue print f an Infrmatin Security System. 28. List the styles f architecture security mdels. Discuss them in detail.

E. G. S. Pillay Engineering College, Nagapattinam Computer Science and Engineering

E. G. S. Pillay Engineering College, Nagapattinam Computer Science and Engineering IT2042 - Infrmatin Security 1-1 E. G. S. Pillay Engineering Cllege, Nagapattinam Cmputer Science and Engineering Elective II IT 2042 INFORMATION SECURITY VIII Sem CSE QUESTION BANK - UNIT-IV 1) What is

More information

NCTA-Certified Cloud Technologist (NCT) Exam NCT-110

NCTA-Certified Cloud Technologist (NCT) Exam NCT-110 NCTA-Certified Clud Technlgist (NCT) Exam NCT-110 Exam Infrmatin Candidate Eligibility: The NCTA-Certified Clud Technlgist (NCT) exam requires n applicatin fee, supprting dcumentatin, nr ther eligibility

More information

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

VMware AirWatch Certificate Authentication for Cisco IPSec VPN VMware AirWatch Certificate Authenticatin fr Cisc IPSec VPN Fr VMware AirWatch Have dcumentatin feedback? Submit a Dcumentatin Feedback supprt ticket using the Supprt Wizard n supprt.air-watch.cm. This

More information

UML : MODELS, VIEWS, AND DIAGRAMS

UML : MODELS, VIEWS, AND DIAGRAMS UML : MODELS, VIEWS, AND DIAGRAMS Purpse and Target Grup f a Mdel In real life we ften bserve that the results f cumbersme, tedius, and expensive mdeling simply disappear in a stack f paper n smene's desk.

More information

Software Usage Policy Template

Software Usage Policy Template Sftware Usage Plicy Template This template is t accmpany the article: The Sftware Usage Plicy - An Indispensible Part f Yu SAM Tlbx The full article can be fund here: http://www.itassetmanagement.net/tag/plicy-template/

More information

Town of Warner, New Hampshire Information Security Policy

Town of Warner, New Hampshire Information Security Policy Twn f Warner, New Hampshire Infrmatin Security Plicy Date Adpted: Bard f Selectmen David E. Hartman David Karrick, Jr. Clyde Carsn Table f Cntents Table f Cntents 1 Intrductin 2 Ethics and Acceptable Use

More information

Overview of Data Furnisher Batch Processing

Overview of Data Furnisher Batch Processing Overview f Data Furnisher Batch Prcessing Nvember 2018 Page 1 f 9 Table f Cntents 1. Purpse... 3 2. Overview... 3 3. Batch Interface Implementatin Variatins... 4 4. Batch Interface Implementatin Stages...

More information

HP Server Virtualization Solution Planning & Design

HP Server Virtualization Solution Planning & Design Cnsulting & Integratin Infrastructure Services HP Server Virtualizatin Slutin Planning & Design Service descriptin Hewlett-Packard Cnsulting & Integratin Infrastructure Cnsulting Packaged Services (HP

More information

John R. Robles CISA, CISM, CRISC

John R. Robles CISA, CISM, CRISC Jhn R. Rbles CISA, CISM, CRISC www.jhnrrbles.cm jrbles@cqui.net 787-647-3961 What is Security as a Service (SecaaS)? Security as a Service is a clud cmputing mdel that Delivers Managed Security Services

More information

CAMPBELL COUNTY GILLETTE, WYOMING

CAMPBELL COUNTY GILLETTE, WYOMING CAMPBELL COUNTY GILLETTE, WYOMING System Supprt Analyst I System Supprt Analyst II Senir System Supprt Analyst Class specificatins are intended t present a descriptive list f the range f duties perfrmed

More information

CCNA 1 Chapter v5.1 Answers 100%

CCNA 1 Chapter v5.1 Answers 100% CCNA 1 Chapter 11 2016 v5.1 Answers 100% 1. A newly hired netwrk technician is given the task f rdering new hardware fr a small business with a large grwth frecast. Which primary factr shuld the technician

More information

INFORMATION TECHNOLOGY SERVICES NIST COMPLIANCE AT FSU - CONTROLLED UNCLASSIFIED INFORMATION

INFORMATION TECHNOLOGY SERVICES NIST COMPLIANCE AT FSU - CONTROLLED UNCLASSIFIED INFORMATION NIST 800-171 COMPLIANCE AT FSU - CONTROLLED UNCLASSIFIED INFORMATION WHAT IS NIST 800-171 COMPLIANCE AND WHY DO WE HAVE TO DO IT? Any Cntrlled Unclassified Infrmatin (CUI) residing in nnfederal infrmatin

More information

Log shipping is a HA option. Log shipping ensures that log backups from Primary are

Log shipping is a HA option. Log shipping ensures that log backups from Primary are LOG SHIPPING Lg shipping is a HA ptin. Lg shipping ensures that lg backups frm Primary are cntinuusly applied n standby. Lg shipping fllws a warm standby methd because manual prcess is invlved t ensure

More information

Admin Report Kit for Exchange Server

Admin Report Kit for Exchange Server Admin Reprt Kit fr Exchange Server Reprting tl fr Micrsft Exchange Server Prduct Overview Admin Reprt Kit fr Exchange Server (ARKES) is an Exchange Server Management and Reprting slutin that addresses

More information

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite Vlume Licensing brief Licensing the Cre Client Access License (CAL) Suite and Enterprise CAL Suite Table f Cntents This brief applies t all Micrsft Vlume Licensing prgrams. Summary... 1 What s New in this

More information

High Security SaaS Concept Software as a Service (SaaS) for Life Science

High Security SaaS Concept Software as a Service (SaaS) for Life Science Sftware as a Service (SaaS) fr Life Science Cpyright Cunesft GmbH Cntents Intrductin... 3 Data Security and Islatin in the Clud... 3 Strage System Security and Islatin... 3 Database Security and Islatin...

More information

E-Lock Policy Manager White Paper

E-Lock Policy Manager White Paper White Paper Table f Cntents 1 INTRODUCTION... 3 2 ABOUT THE POLICY MANAGER... 3 3 HOW E-LOCK POLICY MANAGER WORKS... 3 4 WHAT CAN I DO WITH THE POLICY MANAGER?... 4 4.1 THINGS YOU CONTROL IN SIGNING...

More information

Privacy Policy. Information We Collect. Information You Choose to Give Us. Information We Get When You Use Our Services

Privacy Policy. Information We Collect. Information You Choose to Give Us. Information We Get When You Use Our Services Privacy Plicy Last Mdified: September 26, 2016 Pictry is a fast and fun way t share memes with yur friends and the wrld arund yu. Yu can send a Pictry game t friends and view the pictures they submit in

More information

EView/400i Management Pack for Systems Center Operations Manager (SCOM)

EView/400i Management Pack for Systems Center Operations Manager (SCOM) EView/400i Management Pack fr Systems Center Operatins Manager (SCOM) Cncepts Guide Versin 7.0 July 2015 1 Legal Ntices Warranty EView Technlgy makes n warranty f any kind with regard t this manual, including,

More information

ClassFlow Administrator User Guide

ClassFlow Administrator User Guide ClassFlw Administratr User Guide ClassFlw User Engagement Team April 2017 www.classflw.cm 1 Cntents Overview... 3 User Management... 3 Manual Entry via the User Management Page... 4 Creating Individual

More information

Contents: Module. Objectives. Lesson 1: Lesson 2: appropriately. As benefit of good. with almost any planning. it places on the.

Contents: Module. Objectives. Lesson 1: Lesson 2: appropriately. As benefit of good. with almost any planning. it places on the. 1 f 22 26/09/2016 15:58 Mdule Cnsideratins Cntents: Lessn 1: Lessn 2: Mdule Befre yu start with almst any planning. apprpriately. As benefit f gd T appreciate architecture. it places n the understanding

More information

IS315T IS Risk Management and Intrusion Detection [Onsite]

IS315T IS Risk Management and Intrusion Detection [Onsite] IS315T IS Risk Management and Intrusin Detectin [Onsite] Curse Descriptin: This curse addresses cncepts f risk management and intrusin detectin. Areas f instructin include hw t assess and manage risks

More information

UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL

UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL TITLE: Electrnic Data Prtectin and Encryptin REFERENCE: Refrmat CATEGORY: Infrmatin Technlgy PAGE: 1 SUPERSEDES: POL-UMIT- A175-014-01 APPROVER: David Ertel

More information

INSTALLING CCRQINVOICE

INSTALLING CCRQINVOICE INSTALLING CCRQINVOICE Thank yu fr selecting CCRQInvice. This dcument prvides a quick review f hw t install CCRQInvice. Detailed instructins can be fund in the prgram manual. While this may seem like a

More information

Final Report. Graphical User Interface for the European Transport Model TREMOVE. June 15 th 2010

Final Report. Graphical User Interface for the European Transport Model TREMOVE. June 15 th 2010 Date June 15 th 2010 Authrs Charitn Kuridis Dr Mia Fu Dr Andrew Kelly Thmas Papagergiu Client Eurpean Cmmissin DG Climate Actin Directrate A: Internatinal & Climate Strategy Unit A4: Strategy & Ecnmic

More information

PRIVACY AND E-COMMERCE POLICY STATEMENT

PRIVACY AND E-COMMERCE POLICY STATEMENT PRIVACY AND E-COMMERCE POLICY STATEMENT Tel-Tru Manufacturing Cmpany ( Tel-Tru ) is dedicated t develping lng-lasting relatinships that are built n trust. Tel-Tru is cmmitted t respecting the wishes f

More information

CLOUD & DATACENTER MONITORING WITH SYSTEM CENTER OPERATIONS MANAGER. Course 10964B; Duration: 5 Days; Instructor-led

CLOUD & DATACENTER MONITORING WITH SYSTEM CENTER OPERATIONS MANAGER. Course 10964B; Duration: 5 Days; Instructor-led CENTER OF KNOWLEDGE, PATH TO SUCCESS Website: www.inf-trek.cm CLOUD & DATACENTER MONITORING WITH SYSTEM CENTER OPERATIONS MANAGER Curse 10964B; Duratin: 5 Days; Instructr-led WHAT YOU WILL LEARN This curse

More information

Contingency Planning Template

Contingency Planning Template Cntingency Planning Template Prject Name: U.S. Department f Husing and Urban Develpment Octber, 2010 Cntigency Planning Template (V1.0) Ntes t the Authr [This dcument is a template f a Security Apprach

More information

Customer Information. Agilent 2100 Bioanalyzer System Startup Service G2949CA - Checklist

Customer Information. Agilent 2100 Bioanalyzer System Startup Service G2949CA - Checklist This checklist is used t prvide guidance and clarificatin n aspects f the auxillary Startup Service (G2949CA) including Security Pack Installatin and Familiarizatin f yur Agilent 2100 Bianalyzer System

More information

Please contact technical support if you have questions about the directory that your organization uses for user management.

Please contact technical support if you have questions about the directory that your organization uses for user management. Overview ACTIVE DATA CALENDAR LDAP/AD IMPLEMENTATION GUIDE Active Data Calendar allws fr the use f single authenticatin fr users lgging int the administrative area f the applicatin thrugh LDAP/AD. LDAP

More information

ITD Information Security October 19, 2015

ITD Information Security October 19, 2015 ITD Infrmatin Security Octber 19, 2015 Cntents Intrductin... 3 Synpsis... 3 ITD Security Team... 3 Cunty Emplyees... 3 Malware Prtectin... 4 Physical Security... 4 Data... 4 Internet... 4 Micrsft Office

More information

UNSW Technology Policy:

UNSW Technology Policy: UNSW Technlgy Plicy: UNSW Plicy Respnsible Officer Cntact Officer Apprving Authrity UNSW Data Netwrk Cnnectin Plicy Chief Infrmatin Officer Manager Infrastructure Services Supprt UNSW IT Services Ph: x

More information

MySabre API RELEASE NOTES MYSABRE API VERSION 2.0 (PART OF MYSABRE RELEASE 7.0) OCTOBER 28, 2006 PRODUCTION

MySabre API RELEASE NOTES MYSABRE API VERSION 2.0 (PART OF MYSABRE RELEASE 7.0) OCTOBER 28, 2006 PRODUCTION MySabre API RELEASE NOTES MYSABRE API VERSION 2.0 (PART OF MYSABRE RELEASE 7.0) OCTOBER 28, 2006 PRODUCTION These release ntes pertain t the Prductin release fr MySabre Release 7.0 cntaining MySabre API

More information

Position Description

Position Description Psitin Descriptin Cmment [LC1]: A. Infrmatin: Psitin Title: Psitin #: Categry: Cmputer Supprt Analyst (a) ICSO69 Cmputer Supprt Analyst (a) Supersedes: Instructin/Supprt Area: Divisin/Department: Reprts

More information

Adverse Action Letters

Adverse Action Letters Adverse Actin Letters Setup and Usage Instructins The FRS Adverse Actin Letter mdule was designed t prvide yu with a very elabrate and sphisticated slutin t help autmate and handle all f yur Adverse Actin

More information

App Center User Experience Guidelines for Apps for Me

App Center User Experience Guidelines for Apps for Me App Center User Experience Guidelines fr Apps fr Me TABLE OF CONTENTS A WORD ON ACCESSIBILITY...3 DESIGN GUIDELINES...3 Accunt Linking Prcess... 3 Cnnect... 5 Accept Terms... 6 Landing Page... 6 Verificatin...

More information

OmniPCX Record PCI Compliance 2.3

OmniPCX Record PCI Compliance 2.3 S T R A T E G I C W H I T E P A P E R OmniPCX Recrd PCI Cmpliance 2.3 Alcatel-Lucent Enterprise Services Page 1/11 OmniPCX-Recrd R2.3 PCI Cmpliance White Paper Legal ntice Alcatel, Lucent, Alcatel-Lucent

More information

Date: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems

Date: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems Date: Octber 2018 User guide Integratin thrugh ONVIF driver. Prepared By: Devices & Integratins Team, Milestne Systems 2 Welcme t the User Guide fr Online Test Tl The aim f this dcument is t prvide guidance

More information

Software Engineering

Software Engineering Sftware Engineering Chapter #1 Intrductin Sftware systems are abstract and intangible. Sftware engineering is an engineering discipline that is cncerned with all aspects f sftware prductin. Sftware Prducts

More information

ITIL 2011 Service Offerings and Agreements (SOA)

ITIL 2011 Service Offerings and Agreements (SOA) IT SERVICE MANAGEMENT ITIL 2011 Service Offerings and Agreements (SOA) CERTIFICATE: DURATION: COURSE DELIVERY: LANGUAGE: ITIL 2011 Service Offerings and Agreements (SOA) 5 Days Classrm, Live Virtual Classrm

More information

Aloha Offshore SDLC Process

Aloha Offshore SDLC Process Alha Sftware Develpment Life Cycle Alha Offshre SDLC Prcess Alha Technlgy fllws a sftware develpment methdlgy that is derived frm Micrsft Slutins Framewrk and Ratinal Unified Prcess (RUP). Our prcess methdlgy

More information

Introduction to Mindjet on-premise

Introduction to Mindjet on-premise Intrductin t Mindjet n-premise Mindjet Crpratin Tll Free: 877-Mindjet 1160 Battery Street East San Francisc CA 94111 USA Phne: 415-229-4200 Fax: 415-229-4201 www.mindjet.cm 2012 Mindjet. All Rights Reserved

More information

NiceLabel LMS. Installation Guide for Single Server Deployment. Rev-1702 NiceLabel

NiceLabel LMS. Installation Guide for Single Server Deployment. Rev-1702 NiceLabel NiceLabel LMS Installatin Guide fr Single Server Deplyment Rev-1702 NiceLabel 2017. www.nicelabel.cm 1 Cntents 1 Cntents 2 2 Architecture 3 2.1 Server Cmpnents and Rles 3 2.2 Client Cmpnents 3 3 Prerequisites

More information

Reporting Requirements Specification

Reporting Requirements Specification Cmmunity Mental Health Cmmn Assessment Prject OCAN 2.0 - ing Requirements Specificatin May 4, 2010 Versin 2.0.2 SECURITY NOTICE This material and the infrmatin cntained herein are prprietary t Cmmunity

More information

IT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016

IT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016 IT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016 1. What are tw functins f an perating system? (Chse tw.) cntrlling hardware access managing applicatins text prcessing flw chart editing prgram

More information

DELL EMC PERSONALIZED SUPPORT SERVICES

DELL EMC PERSONALIZED SUPPORT SERVICES DELL EMC PERSONALIZED SUPPORT SERVICES Optimize yur Dell EMC investment based n yur unique requirements ESSENTIALS Dell EMC Persnalized Supprt Services: Custmize and enhance yur Dell EMC Custmer Service

More information

OATS Registration and User Entitlement Guide

OATS Registration and User Entitlement Guide OATS Registratin and User Entitlement Guide The OATS Registratin and Entitlement Guide prvides the fllwing infrmatin: OATS Registratin The prcess and dcumentatin required fr a firm r Service Prvider t

More information

Infrastructure Series

Infrastructure Series Infrastructure Series TechDc WebSphere Message Brker / IBM Integratin Bus Parallel Prcessing (Aggregatin) (Message Flw Develpment) February 2015 Authr(s): - IBM Message Brker - Develpment Parallel Prcessing

More information

Forcepoint UEBA Management of Personal Data

Forcepoint UEBA Management of Personal Data Frcepint UEBA Management f Persnal Data 2018 Frcepint LLC. All Rights Reserved Dcument Classificatin: Public FPWSCMPD-2018MAY24 Frcepint UEBA Management f Persnal Data CONTENTS Disclaimer... 2 General...

More information

Summary. Server environment: Subversion 1.4.6

Summary. Server environment: Subversion 1.4.6 Surce Management Tl Server Envirnment Operatin Summary In the e- gvernment standard framewrk, Subversin, an pen surce, is used as the surce management tl fr develpment envirnment. Subversin (SVN, versin

More information

Security of Information Technology Resources

Security of Information Technology Resources CORNELL UNIVERSITY POLICY LIBRARY Security f Infrmatin Technlgy Resurces Technlgies Chapter: 4, Security and Vice President fr Infrmatin Technlgies Originally Issued: June 1, 2004 Last Full Review: December

More information

DocAve 6 Granular Backup and Restore

DocAve 6 Granular Backup and Restore DcAve 6 Granular Backup and Restre User Guide Service Pack 3 Revisin H Issued August 2013 1 Table f Cntents Abut DcAve Granular Backup and Restre... 5 Cmplementary Prducts... 5 Submitting Dcumentatin Feedback

More information

SOLA and Lifecycle Manager Integration Guide

SOLA and Lifecycle Manager Integration Guide SOLA and Lifecycle Manager Integratin Guide SOLA and Lifecycle Manager Integratin Guide Versin: 7.0 July, 2015 Cpyright Cpyright 2015 Akana, Inc. All rights reserved. Trademarks All prduct and cmpany names

More information

SchoolMessenger School Notification is a product of Henrico County Public Schools (HCPS)

SchoolMessenger School Notification is a product of Henrico County Public Schools (HCPS) 1 SchlMessenger: Staff and Parent Cmmunicatin Henric Cunty, Virginia Shrt Overview SchlMessenger Schl Ntificatin is a prduct f Henric Cunty Public Schls (HCPS) that assists the schl divisin with simplifying

More information

RISKMAN REFERENCE GUIDE TO USER MANAGEMENT (Non-Network Logins)

RISKMAN REFERENCE GUIDE TO USER MANAGEMENT (Non-Network Logins) Intrductin This reference guide is aimed at managers wh will be respnsible fr managing users within RiskMan where RiskMan is nt cnfigured t use netwrk lgins. This guide is used in cnjunctin with the respective

More information

MySabre API RELEASE NOTES MYSABRE API VERSION 2.1 (PART OF MYSABRE RELEASE 7.1) DECEMBER 02, 2006 PRODUCTION

MySabre API RELEASE NOTES MYSABRE API VERSION 2.1 (PART OF MYSABRE RELEASE 7.1) DECEMBER 02, 2006 PRODUCTION MySabre API RELEASE NOTES MYSABRE API VERSION 2.1 (PART OF MYSABRE RELEASE 7.1) DECEMBER 02, 2006 PRODUCTION These release ntes pertain t the Prductin release fr MySabre Release 7.1 cntaining MySabre API

More information

Milestone XProtect. NVR Installer s Guide

Milestone XProtect. NVR Installer s Guide Milestne XPrtect NVR Installer s Guide Target Audience fr this Dcument This guide is relevant fr peple respnsible fr delivering and installing Milestne XPrtect NVR surveillance systems. If yu are a Milestne

More information

Integrating QuickBooks with TimePro

Integrating QuickBooks with TimePro Integrating QuickBks with TimePr With TimePr s QuickBks Integratin Mdule, yu can imprt and exprt data between TimePr and QuickBks. Imprting Data frm QuickBks The TimePr QuickBks Imprt Facility allws data

More information

Rapid Implementation Package

Rapid Implementation Package Implementatin Package Implementatin 1 Purpse The purpse f this dcument is t detail thse services BuildingPint NrthEast ( BPNE ) will prvide as part f the Prlg Rapid Implementatin Package. This package

More information

These tasks can now be performed by a special program called FTP clients.

These tasks can now be performed by a special program called FTP clients. FTP Cmmander FAQ: Intrductin FTP (File Transfer Prtcl) was first used in Unix systems a lng time ag t cpy and mve shared files. With the develpment f the Internet, FTP became widely used t uplad and dwnlad

More information

Procurement Contract Portal. User Guide

Procurement Contract Portal. User Guide Prcurement Cntract Prtal User Guide Cntents Intrductin...2 Access the Prtal...2 Hme Page...2 End User My Cntracts...2 Buttns, Icns, and the Actin Bar...3 Create a New Cntract Request...5 Requester Infrmatin...5

More information

USD 373 s General Guidelines for Web Page Publishing. The USD 373 Internet community domain address will be located at

USD 373 s General Guidelines for Web Page Publishing. The USD 373 Internet community domain address will be located at 8-14-08 District Web Pages USD 373 s General Guidelines fr Web Page Publishing General Guidelines The purpse f any USD 373 publicatin is t share infrmatin regarding issues, events, persnnel, students and

More information

1. Which organization certifies vendors for adherence to the standards to improve interoperability of products?

1. Which organization certifies vendors for adherence to the standards to improve interoperability of products? CCNA 3 Chapter 4 v5.0 Exam Answers 2015 (100%) 1. Which rganizatin certifies vendrs fr adherence t the 802.11 standards t imprve interperability f 802.11 prducts? FCC IEEE ITU-R Wi-Fi Alliance 2. Which

More information

Vulnerability Protection A Buffer for Patching

Vulnerability Protection A Buffer for Patching Vulnerability Prtectin A Buffer fr Patching A Lucid Security Technical White Paper February 2004 By Vikram Phatak, Chief Technlgy Officer Santsh Pawar, Vulnerability Analyst Lucid Security Crpratin 124

More information

Your New Service Request Process: Technical Support Reference Guide for Cisco Customer Journey Platform

Your New Service Request Process: Technical Support Reference Guide for Cisco Customer Journey Platform Supprt Guide Yur New Service Request Prcess: Technical Supprt Reference Guide fr Cisc Custmer Jurney Platfrm September 2018 2018 Cisc and/r its affiliates. All rights reserved. This dcument is Cisc Public

More information

Chapter 10: Information System Controls for System Reliability Part 3: Processing Integrity and Availability

Chapter 10: Information System Controls for System Reliability Part 3: Processing Integrity and Availability Chapter 10: Infrmatin System Cntrls fr System Reliability Part 3: Prcessing Integrity and Availability Cntrls Ensuring Prcessing Integrity Input Prcess Output Input Cntrls Garbage-in Garbage-ut Frm Design

More information

AvePoint Pipeline Pro 2.0 for Microsoft Dynamics CRM

AvePoint Pipeline Pro 2.0 for Microsoft Dynamics CRM AvePint Pipeline Pr 2.0 fr Micrsft Dynamics CRM Installatin and Cnfiguratin Guide Revisin E Issued April 2014 1 Table f Cntents Abut AvePint Pipeline Pr... 3 Required Permissins... 4 Overview f Installatin

More information

BANNER BASICS. What is Banner? Banner Environment. My Banner. Pages. What is it? What form do you use? Steps to create a personal menu

BANNER BASICS. What is Banner? Banner Environment. My Banner. Pages. What is it? What form do you use? Steps to create a personal menu BANNER BASICS What is Banner? Definitin Prduct Mdules Self-Service-Fish R Net Lg int Banner Banner Envirnment The Main Windw My Banner Pages What is it? What frm d yu use? Steps t create a persnal menu

More information

RxAXIS Security Module 09/25/2013

RxAXIS Security Module 09/25/2013 RxAXIS Security Mdule 09/25/2013 Lessn Title Intrductin: Security Mdule In this tutrial we are ging t lk at the Security Maintenance Mdule f the RxAXIS system. When used, this system gives emplyees access

More information

DocAve 6 Granular Backup and Restore

DocAve 6 Granular Backup and Restore DcAve 6 Granular Backup and Restre User Guide Service Pack 4, Cumulative Update 3 Revisin P Issued September 2014 Table f Cntents Abut DcAve Granular Backup and Restre... 5 Cmplementary Prducts... 5 Submitting

More information

Software Toolbox Extender.NET Component. Development Best Practices

Software Toolbox Extender.NET Component. Development Best Practices Page 1 f 16 Sftware Tlbx Extender.NET Cmpnent Develpment Best Practices Table f Cntents Purpse... 3 Intended Audience and Assumptins Made... 4 Seeking Help... 5 Using the ErrrPrvider Cmpnent... 6 What

More information

Patch Management Policy

Patch Management Policy Patch Management Plicy (Versin 1) Dcument Cntrl Infrmatin: Date: 21/5/18 Master Tracking Name Patch Management Plicy Master Tracking Reference Owning Service / Department Exeter IT Issue: 1 Apprvals: Authrs:

More information

2. When logging is used, which severity level indicates that a device is unusable?

2. When logging is used, which severity level indicates that a device is unusable? CCNA 4 Chapter 8 v5.0 Exam Answers 2015 (100%) 1. What are the mst cmmn syslg messages? thse that ccur when a packet matches a parameter cnditin in an access cntrl list link up and link dwn messages utput

More information

CCNA 1 Chapter 1 v5.03 Exam Answers 2016

CCNA 1 Chapter 1 v5.03 Exam Answers 2016 CCNA 1 Chapter 1 v5.03 Exam Answers 2016 1. A cmpany is cntemplating whether t use a client/server r a peer-t-peer netwrk. What are three characteristics f a peer-t-peer netwrk? (Chse three.) better security

More information

MICRONET INTERNATIONAL COLLEGE BDTVEC ND in Computer Studies MULTIMEDIA AND WEB DESIGN (MWD) ASSIGNMENT 3 (20%) Due Date: 31st January 2013

MICRONET INTERNATIONAL COLLEGE BDTVEC ND in Computer Studies MULTIMEDIA AND WEB DESIGN (MWD) ASSIGNMENT 3 (20%) Due Date: 31st January 2013 MICRONET INTERNATIONAL COLLEGE BDTVEC ND in Cmputer Studies MULTIMEDIA AND WEB DESIGN (MWD) ASSIGNMENT 3 (20%) Due Date: 31st January 2013 Prduce dcumentatin fr the prgram Submit the SOFTCOPY and als HARDCOPY

More information

USER MANUAL. RoomWizard Administrative Console

USER MANUAL. RoomWizard Administrative Console USER MANUAL RmWizard Administrative Cnsle Cntents Welcme... 3 Administer yur RmWizards frm ne lcatin... 3 Abut This Manual... 4 Setup f the Administrative Cnsle... 4 Installatin... 4 The Cnsle Windw...

More information

HP ExpertOne. HP2-T21: Administering HP Server Solutions. Table of Contents

HP ExpertOne. HP2-T21: Administering HP Server Solutions. Table of Contents HP ExpertOne HP2-T21: Administering HP Server Slutins Industry Standard Servers Exam preparatin guide Table f Cntents In this sectin, include a table f cntents (TOC) f all headings. After yu have finished

More information

Cisco Tetration Analytics, Release , Release Notes

Cisco Tetration Analytics, Release , Release Notes Cisc Tetratin Analytics, Release 1.102.21, Release Ntes This dcument describes the features, caveats, and limitatins fr the Cisc Tetratin Analytics sftware. Additinal prduct Release ntes are smetimes updated

More information

Access the site directly by navigating to in your web browser.

Access the site directly by navigating to   in your web browser. GENERAL QUESTIONS Hw d I access the nline reprting system? Yu can access the nline system in ne f tw ways. G t the IHCDA website at https://www.in.gv/myihcda/rhtc.htm and scrll dwn the page t Cmpliance

More information

TPP: Date: October, 2012 Product: ShoreTel PathSolutions System version: ShoreTel 13.x

TPP: Date: October, 2012 Product: ShoreTel PathSolutions System version: ShoreTel 13.x I n n v a t i n N e t w r k A p p N t e TPP: 10320 Date: Octber, 2012 Prduct: ShreTel PathSlutins System versin: ShreTel 13.x Abstract PathSlutins sftware can find the rt-cause f vice quality prblems in

More information

Point-to-Point Encryption (P2PE)

Point-to-Point Encryption (P2PE) Payment Card Industry (PCI) Pint-t-Pint Encryptin (P2PE) Template fr P2PE Applicatin Reprt n Validatin (Applicatin P-ROV) Applicatin P-ROV Template Fr Applicatins used with PCI P2PE Hardware/Hardware Standard

More information

Setting up the ncipher nshield HSM for use with Kerberized Certificate Authority

Setting up the ncipher nshield HSM for use with Kerberized Certificate Authority Setting up the ncipher nshield HSM fr use with Kerberized Certificate Authrity Intrductin This dcument cntains instructins fr setting up ncipher nshield hardware security mdules (HSM) fr use with the Kerberized

More information

Iowa State University

Iowa State University Iwa State University Cyber Security Smart Grid Testbed Senir Design, Design Dcument Dec 13-11 Derek Reiser Cle Hven Jared Pixley Rick Suttn Faculty Advisr: Prfessr Manimaran Gvindarasu Table f Cntents

More information

Student participation Students can register online, track progress, express interest and demonstrate proficiency.

Student participation Students can register online, track progress, express interest and demonstrate proficiency. Page 1 f 31 Intrductin Our MAG 10 Learning Management System (LMS) is a Web based technlgy used t plan, implement, and assess a specific learning prcess. LMS is a training prgram which prvides cmplete

More information

REQUIREMENT ENGINEERING: AN OVERVIEW

REQUIREMENT ENGINEERING: AN OVERVIEW Internatinal Jurnal f Research in Engineering & Technlgy (IJRET) ISSN 2321-8843 Vl. 1, Issue 2, July 2013, 155-160 Impact Jurnals REQUIREMENT ENGINEERING: AN OVERVIEW SHIPRA GUPTA 1 & MANOJ WADHWA 2 1

More information

Disaster Recovery. Practical Applications. Eric LaFollette. Director of Information Resources Lake County Clerk of Courts

Disaster Recovery. Practical Applications. Eric LaFollette. Director of Information Resources Lake County Clerk of Courts Disaster Recvery Practical Applicatins Eric LaFllette Directr f Infrmatin Resurces Lake Cunty Clerk f Curts Presentatin Outline Imprtance f a plan Disaster Recvery Scenaris Disaster Recvery Basics Lake

More information

Level 2 Development Training

Level 2 Development Training Level 2 Develpment Training Level 2 Develpment Training Level 2 Develpment Training Vide Capture RSS 4000 Level 2 Develpment Training Vide Capture Cntents 1 Intrductin... 3 Intrductin... 3 Available Resurces...

More information

ITE310 Computer Networks

ITE310 Computer Networks Cmputer Science Department cs.salemstate.edu ITE310 Cmputer Netwrks 4 cr. Catalg descriptin: This curse begins with an intrductin t cmputer netwrks, including hardware, sftware, trubleshting, and maintenance.

More information

BlackBerry Server Installation and Upgrade Service

BlackBerry Server Installation and Upgrade Service Server and Upgrade Service Prgram Descriptin ( Install and Upgrade Service Prgram Descriptin ) NOTE: This dcument includes all attached Annexes, is prvided fr infrmatinal purpses nly, and des nt cnstitute

More information

AT&T Corporate Voice Mail Unified Messaging (CVM-UM) Quick Start

AT&T Corporate Voice Mail Unified Messaging (CVM-UM) Quick Start AT&T Crprate Vice Mail Unified Messaging (CVM-UM) Quick Start 2011 AT&T Intellectual Prperty. All rights reserved. AT&T the lg and all ther AT&T marks cntained herein are trademarks f AT&T Intellectual

More information

CounterSnipe Software Installation Guide Software Version 10.x.x. Initial Set-up- Note: An internet connection is required for installation.

CounterSnipe Software Installation Guide Software Version 10.x.x. Initial Set-up- Note: An internet connection is required for installation. CunterSnipe Sftware Installatin Guide Sftware Versin 10.x.x CunterSnipe sftware installs n any system cmpatible with Ubuntu 14.04 LTS server which is supprted until 2019 Initial Set-up- Nte: An internet

More information

Genesys Certification Study Guide

Genesys Certification Study Guide Genesys Certificatin Study Guide Genesys Certified Presales 8, Genesys WFO Slutins (GCPS8 - WFO) Exam Cde 817e Prduct Supprted: Wrkfrce Manager, Skills Assessr/Training Manager, Quality Manager Type f

More information

App Orchestration 2.6

App Orchestration 2.6 App Orchestratin 2.6 Terminlgy in App Orchestratin 2.6 Last Updated: July 8, 2015 Page 1 Terminlgy Cntents Elements f App Orchestratin... 3 Dmains... 3 Multi-Datacenter Deplyments... 4 Delivery Sites...

More information

UFuRT: A Work-Centered Framework and Process for Design and Evaluation of Information Systems

UFuRT: A Work-Centered Framework and Process for Design and Evaluation of Information Systems In: Prceedings f HCI Internatinal 2007 UFuRT: A Wrk-Centered Framewrk and Prcess fr Design and Evaluatin f Infrmatin Systems Jiajie Zhang 1, Keith A. Butler 2 1 University f Texas at Hustn, 7000 Fannin,

More information

RELEASE NOTES. HYCU Data Protection for Nutanix

RELEASE NOTES. HYCU Data Protection for Nutanix RELEASE NOTES HYCU Data Prtectin fr Nutanix Versin: 3.0.0 Prduct release date: April 2018 Dcument release date: April 2018 Legal ntices Cpyright ntice 2017 2018 HYCU. All rights reserved. This dcument

More information

CSPN Security Target. PLC Simatic S range

CSPN Security Target. PLC Simatic S range CSPN Security Target PLC Simatic S7 1500 range Categry Industrial systems: prgrammable lgic cntrller Reference: CSPN-ST-Simatic-S7-1500-Range-1.01 Date: 2017/10/03 Internal cde: SIE009 Cpyright AMOSSYS

More information

CNS-220-1I: Citrix NetScaler Essentials and Traffic Management

CNS-220-1I: Citrix NetScaler Essentials and Traffic Management CNS-220-1I: Citrix NetScaler Essentials and Traffic Management Overview Designed fr students with little r n previus NetScaler experience, this curse is best suited fr individuals wh will be deplying r

More information

Top 10 Questions About the Next-Generation Registration Directory Service (RDS)

Top 10 Questions About the Next-Generation Registration Directory Service (RDS) Tp 10 Questins Abut the Next-Generatin Registratin Directry Service (RDS) Expert Wrking Grup n gtld Directry Services (EWG) 16-17 September, 2014 Webinar Agenda Intrductin Tp 10 Questins abut the RDS prpsed

More information

HP MPS Service. HP MPS Printer Identification Stickers

HP MPS Service. HP MPS Printer Identification Stickers HP MPS Service We welcme yu t HP Managed Print Services (MPS). Fllwing yu will find infrmatin regarding: HP MPS printer identificatin stickers Requesting service and supplies fr devices n cntract Tner

More information

Update: Users are updated when their information changes (examples: Job Title or Department). o

Update: Users are updated when their information changes (examples: Job Title or Department). o Learn Basic User Integratin Batch File Prcessing The Learn Basic User Integratin is designed t manage the rganizatinal changes cmpanies are challenged with n a daily basis. Withut a basic type f integratin,

More information