TechTutorials - Free Computer Tutorials  







Policy, Compliance, and Auditing Tutorials






Tutorials (35)

Total Tutorials: 6572  |  Added today: 0 Tutorials updated: 09/15/2018



Sort Tutorials By:


Auditing for Increased Security (Part 1)
 
You will need to Audit your systems for enhanced and increased security. When Microsoft laid out this objective, they were most likely thinking about building your security strategy up with Defense in Depth. This strategy is outlined as a way to avoid depending on one single protective measure deployed on your network. In other words, to eliminate the feeling of being secured because you implemented a firewall on your Internet connection you should implement other security measures like an IDS (Intrusion Detection) system, Auditing and Biometrics for Access Control.
Added: 06/09/2004, Hits: 1,188, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Auditing user accounts
 
Considering that many attacks are accessed through a user account that has one or more incorrect and insecure settings, it makes sense to focus on user account properties during an audit. Within a Windows Active Directory environment there are the standard user properties that must be audited, plus a few that may not fall into too many other network environments. This article will discuss the key user account properties that need to be audited, as well as the tools that can help complete the task.
Added: 08/05/2005, Hits: 1,474, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Auditing your Computer Network
 
Monitoring for security involves several types of inspection and oversight capabilities. The first of this is auditing.
Added: 12/31/2014, Hits: 446, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Auditing your Network
 
In this article we will cover just what it means to have a computer security network audited.
Added: 05/18/2006, Hits: 1,109, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Baselining with Security Templates
 
When it comes to network and computer security, it is always best to have your decisions made before you install a computer or network device. In conjunction with this philosophy, it is also ideal to have a benchmark or baseline of what the security initially was on computers and network devices in case you need to troubleshoot an issue or audit the security settings. In this article we will review how to use security templates to establish security baselines on every computer in the organization. Not only will we establish the security baseline, we will keep it persistently affecting the computers.
Added: 09/30/2004, Hits: 931, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Being Big Brother: Monitoring employees’ network activity
 
Big brother is watching. In today’s security-conscious world, it has become a fact of life. George Orwell coined the term to refer to government intrusion into the private lives of citizens, but the meaning has expanded to include any authority figure. The law recognizes that there are circumstances in which monitoring of others’ activities is permissible or even desirable. In general, employers have a lot of leeway in monitoring what their employees do while on company premises and using company equipment.
Added: 09/16/2005, Hits: 830, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Building and Implementing a Successful Information Security Policy
 
Most recognize the necessity of having a security policy, but designing and successfully implementing one throughout your organization can be quite an intimidating task. To take the pain out of this process we are providing you with one of the most comprehensive guides on the design and implementation of an effective security policy for your company.
Added: 06/09/2004, Hits: 749, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Compliance and You
 
This article is squarely aimed at those of you who are at best confused about the whole compliance quagmire.
Added: 05/11/2006, Hits: 794, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Compliance, data protection and keeping safe online in 2012
 
In Europe revised data protection laws are being presented, as a way to keep companies and customer data more secure. In this article we cover the highlights, controls that can be used to ensure data protection and the elevated level of security now required as a standard.
Added: 03/02/2012, Hits: 591, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Creating a Cloud Data Location and Jurisdiction Policy (Part 1)
 
In this series of articles, part one and two, we will look at the process that enterprises could follow to develop a Cloud Data Location and Jurisdiction Policy.
Added: 06/12/2015, Hits: 282, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Creating a Cloud Data Location and Jurisdiction Policy (Part 2)
 
In the previous article we covered data classification, data accessibility, the design and development of the Data Location and Jurisdiction Policy and understanding the planning process. In this article we will continue with the next steps in structuring the policy.
Added: 07/27/2015, Hits: 727, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Defining a Security Policy
 
Security Polices are a necessary evil in today's enterprise networks. Without a Security Policy, you leave yourself open and vulnerable to a lot of political attacks. In this article, we will begin to look at all the measures you will need to deploy to successfully define a security policy.
Added: 06/09/2004, Hits: 939, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Documenting Authenticity of Evidence for the E-Discovery Process
 
E-discovery is an important part of civil and criminal court processes. Inability to produce material can hinder the legal process and damage your case. Be prepared with a plan by which you can find evidentiary material and prove its authenticity.
Added: 07/25/2008, Hits: 2,127, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Evaluating a New Security Policy
 
There was a time when it wasn’t all that risky to try out new security settings on production servers, but operating systems have become much more complex since then. Today, even changing something as simple as the required password length can have unanticipated side effects elsewhere in the system. In this article, I will explain how to evaluate a new security policy in a safe and responsible manner.
Added: 06/24/2005, Hits: 715, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

How Do Compliance Issues Affect your Network?
 
Government regulations such as HIPAA, SOX and the GLB Act require changes to many network security infrastructures and IT procedures. As if wading through this alphabet soup of statutes and regulations weren’t enough, it's not enough to be compliant; you must also be able to prove your compliance if the feds come knocking. This article looks at how regulations affecting specific industries impact the computer networks of companies in those industries, as well as some of the common myths and misconceptions about various compliance requirements.
Added: 07/15/2005, Hits: 827, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

How to Audit your Network via Packet Analysis
 
Auditing your network at the packet level is a practice that is not done very often, if at all. The truth of it is that there are untold riches in all those packets flying about on your LAN. All one has to do is log them, and dig into them. One never knows what they will find.
Added: 04/29/2005, Hits: 783, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Implementing Principle of Least Privilege
 
The Principle of Least Privilege is not a new concept, but the push to implement it on production networks has never been so important. This article will go over some of the most common configurations that you can make to implement these principles and reduce the possibility of an attack from a typical end user.
Added: 08/29/2005, Hits: 841, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Patch Management: More Important than Ever (Part 1)
 
In this, Part 1 of a two-part series, we'll discuss the ever-growing importance of security patching and some basic tenets of best management best practices.
Added: 06/05/2015, Hits: 389, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Patch Management: More Important than Ever (Part 2)
 
In this, Part 2, we’ll go a little more deeply into patch testing and the many patch deployment options that are currently available, including both on-premises and cloud-based solutions for automating the patch management process
Added: 06/22/2015, Hits: 411, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Patch or Not? Weighing the Risks of Immediate Updating
 
This article looks at whether you should apply patches immediately or not.
Added: 01/18/2015, Hits: 790, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating
Page:  1 2   Items Per Page:







7 Seconds Resources, Inc.




IT Showcase