• Information security questions

    Hi everyone, I am new to this field as a 2nd career, previously was in mfg. engineering for a lot of years. Need some help with the following questions for a class I am taking. Need to get feedback with professionals in the field to determine what issues they think are important for information...

    FrankAZ0 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • ChoicePoint CISO says breach not an information security issue

    The CISO of ChoicePoint says the theft of private information on 145,000 from its databases isn't an information security issue because conmen used fraud, not hacking tools or techniques, to get the information. Anyone agree with that? Check it out:...

    Athletica0 pointsBadges:
  • Security Audit

    what form or procedeure would you use for a final security Audit after the Avaya system is installed?

    HubeHube20 pointsBadges:
  • Front-End Reporting Tools for Secure Web Service Application with MS-SQL server-2

    Hi... We are a Cdn Govt agency involved in Satellite Operations with a commercial partner based across the country. We will need to build/buy a small secure web service application for reporting purposes that will require minimal IT expertise to build or maintain, and will deliver maximum...

    Mmosystem0 pointsBadges:
  • Controls

    Is trust a Sarbanes Oxley control?  If not, can you point me to the section of SOX that defines this?

    RDA5 pointsBadges:
  • Information on IT Auditing

    Where can I get the information on IT auditing from this site? Thank You.

    ss38135 pointsBadges:
  • Block IE or Internet access with group policy

    Is there any way to block Internet access with group policy? I am setting permissions for some of the machines locally to only allow certain users access to the IE executable, but that is a pain in the butt. I have: Win2k3 single domain with 2 DC's approx 50 XP Pro workstations. I'm guessing this...

    TheVyrys0 pointsBadges:
  • What Next?

    We received a notice from NSA saying the specifics on how to handle our encryption program.   The public version has been limited to use of a public key and the software has a built in data integrity algorithm such that any modification of the key disables the use of the software for encryption....

    gailayres15 pointsBadges:
  • PDCA with conflicting laws

    Hello, I'm a student at the University of Advancing Technology (UAT) and this week we've been learning about the Plan, Do, Check, Act methodology for implementing an information management security system. Our reading explains about PDCA and how an organization should use it to obtain an ISO 27001...

    Griff137130 pointsBadges:
  • Governance of IT Assets

    I'm looking for example templates that could be used to provide an IT Governance Board with the assurance that it's IT assets are being managed appropriately and not exposed to any unnecessary risks.

    MarkCarlyle5 pointsBadges:
  • EU security directive

    Where can I find implementation details for complying with EU directive 95/46/ec?

    InfPB5 pointsBadges:
  • Compliance

    Within the GRC cycle, how can IT security compliance be best described?

    gbwilson10 pointsBadges:
  • EXCED 13

    Which brand is EXCEED 13 , Hummingbird or Open Text

    OTAZKY15 pointsBadges:
  • Windows Foundation Server 2008 R2 License and Domain issues

    We have joined 2 Foundation servers to an existing domain as members in a Forest to a Server 2008 R2 Standard DC as the parent.Regularly on startup we get a message "Check for Licensing Compliance is Incomplete".I need to know how serious this error is? and are we going to experience problems if...

    GazzaBot10 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general detection & removal of virus).(Also...

    4238830 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++-2

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general dection & removal of virus).(Also...

    4238830 pointsBadges:
  • Which encryption algorithm is the most recommended by the PCI standard?

    Does anyone know if AKA ver 2 protocol is PCI compliance?

    Keren5 pointsBadges:
  • Agile SDLC SOX Controls

    We are implementing Agile SDLC in our company. Has anybody identified Agile SDLC controls that are tested as part of their SOX complinance program? Would appreciate any examples of controls that you can offer

    Rcneville5 pointsBadges:
  • PCI Compliance for hosted merchant systems

    We contract with an outside merchant who hosts a software system that is accessable through a secure login on select, internal personal computers. We contract as agents of that merchant to operate their system as a point of sale for services. Payment for those services can be by credit card and CC...

    CPO5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following