• How do you create a Business Case for Security?

    In a nutshell, which would be a good way of putting together a business case for a solution that mitigates security risks, when the "income" generated by the solution is not easy to define?

    DiegoDH275 pointsBadges:
  • risk management in IT

    what is the role of risk manager in IT industry.mean what responsibilites he have?

    Amolwakode5 pointsBadges:
  • I’ve been hacked — I think….

    I'm an IT administrator with a little over 500 end users, running Windows 2000 and XP. One of our users is experiencing a problem with her Internet connection suddenly dropping for no apparent reason. When she restarts her computer, everything works fine for awhile, but then the connection drops...

    LMullen0 pointsBadges:
  • Dos attack

    I have been receiving security alert messages from our firewall nearly everyday. e.g TCP Packet - Source:144.120.8.89,39341 Destination:192.168.1.1,25 - [DOS] TCP Packet - Source:210.7.0.36,3473 Destination:210.7.12.23,135 - [DOS] Thu, 2006-10-19 16:30:03 - UDP Packet -...

    92220990 pointsBadges:
  • Risk Assessment for Application Systems

    Can please share the risk assessment methods/ questionnaires/approach for application systems.We understand that the assessment may cover technology, people, and process. We need to come-out with the assessment report indicating the risk level & rating of the application systems.

    Umihafiy10 pointsBadges:
  • How to do a security assessment in a hospital environment?

    Possible questions to ask to employee working in a hospital enironment when you are conducting security assessment?

    1977080910 pointsBadges:
  • What to do when files taken by hacker?

    what to do if files were taken by a hacker

    Mzznetta5 pointsBadges:
  • What is the best way to implement a risk assessment in an IT department that will align COBIT controls with risks?

    A compliance officer in Europe could use some advice from fellow IT professionals and executives. His IT budget is being scrutinized, as is the case in every organization in 2009; he needs targets to get things done more efficiently but without taking on more risk. His department is evaluating...

    AlexanderHoward15 pointsBadges:
  • USB port control policy

    My company plan to roll out a policy on USB port control. I need guide to draft the policy.

    Ytlow30 pointsBadges:
  • Checklist for managing risk of Data Center power shutdown

    We are planning to have a shutdown of power at data center to upgrade electrical power feeder. In doing so, we need to know the checklist to ensure risks associated during the initiative are minimized and controlled. We have hundreds of servers located at the data center that store appls and...

    Umihafiy10 pointsBadges:
  • Penetration Testing.

    Hi!! Good Morning. I have a simple question for you today. I intend to have a penetration testing done for all of my 3 sites - My US Office, My India Office & My US Datacenter. Can you suggest any trustworthy site which can offer me a free reliable scan? Also, I would like to have you suggestion on...

    Nileshroy0 pointsBadges:
  • wireless vlan

    hi all, is it possible to have one link from a switch to an access point and split the network into two networks a wireless network from the AP and a wired port for a user connected thru RJ45 and still keep it secured.

    92220990 pointsBadges:
  • Video Conference risk & security policy

    1. What is the risk with allowing the usage of video conference or web conference within an organization? 2. given this context, any sample of security policy?

    SISO15 pointsBadges:
  • Selecting an area within security to start

    Hi, I'm studying for an MSc in Information Security from Royal Holloway University of London, I have a B.Engg. degree in computers and a PG Diploma in Networking and Communication as well as the CCSA and CCNA. I'm also studying for the CISSP. Now, with all these qualifications, could you please...

    Secmax0 pointsBadges:
  • Security!!

    What security measures are considered when designing a web-application (besides the SSL encryption)? And what technologies are used to protect the application from brute-force, phishing, and pharming attacks."

    Dsnprasad5 pointsBadges:
  • Stop Error (C000021a)

    I am receiving this stop error(C000021a) "windows logon process system process terminated unexpectedly" with win 2000 server. Safe mode and Last Known Good Conf. works fine. Is there any solution without reformating the HDD? I have ERD with me. Will that help me? Any advise on this would be highly...

    BinooDas123410 pointsBadges:
  • Procedures for a new area.

    We are a company where we have expirience on network remote administration and now we have open a new area, The area of security. Now I need to start to make new procedures like when a new customer come to us and ask if we can handle the security for his network... I need to know if some one can...

    Millan0 pointsBadges:
  • Installation and updates

    Howdy folks, Tryin to keep things going around here....need some advice. I have Win2003 servers and Active Directory.....single domain....approx. 100 client computers.....one location. Am upgrading all computers from Office XP to Office 2003. My project: Install Office 2003 and all updates remotely...

    TheVyrys0 pointsBadges:
  • Risk Management

    I'm looking for information about the most pressing issues facing risk managers.

    Keceditor5 pointsBadges:
  • security problem

    Hello, I have small workgroup having 10 computers in my office. I do some personal work in office like using yahoo messenger, checking personal e-mails and some online banking site. But how does one of my senior knows it? I do everything lonely and securely so that nobody in the office knows it....

    BinooDas123410 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following