把奶尖送到王爷嘴巴上齐水儿

把奶尖送到王爷嘴巴上齐水儿ISO 9001:2008 is no more just QMS, it is now a Business Management System that requires you to do RISK Management when designing the QMS. You have to understand the Risks to the business, and determine the Processes to be develoed. This may require you to do HACCP studies, if you are a food processor, and understand Product liability and the implications of Product Recall as in ISO/PC 240. For guidance in designing your QMS, you must refer to ISO 9004:2009.

tracker

把奶尖送到王爷嘴巴上齐水儿

TQMC

TQMC has acquired wide Domain Knowledge and Experience. You can FREELY access it hereandhere

把奶尖送到王爷嘴巴上齐水儿DISCLAIMER: This matter here is a guide only. For authentic and up-to-date information,please contact TQMC.

The DIRECTIVES and STANDARDS listed here may have been subsequently REVISED . You must refer to the CURRENT REVISION and AMENDMENTS if any.

Wednesday, March 16, 2011

Network Intelligence Services

  
 
 News & events
 

 Our Clientele
United Nations WFP
Atos Origin
Abu Dhabi Stock Exchange
Dubai Financial Market
Capgemini
Saudi Telecom
Royal & Sun Alliance

and many more...
 

 Testimonials
"KK and his team did a brilliant job in guiding us towards the 27001 certification. Their approach was very methodical and systematic right from the stage of gathering requirements in the initial stages to the documentation work and then trainings and audit readiness stages. In fact what I liked the most about their approach was that he focussed on transferring his knowledge to us which has enabled us to sustain the improvements even without his involvement. They never restricted themselves to the scope of the contract. They were willing to that extra mile to make sure that it added business value to us."
- Prabhanjan Pandurang,
Director, Quality and Continuous Improvement,
Integreon
"It is my pleasure to share with you our experience with Network Intelligence India (NII) and its director Mr. KK Mookhey. We have been using resources from NII to assist us in conducting audit reviews of the Bank’s Information Technology control environment since 2005. We have used them to assist us in evaluating various control measures deployed in the Development of System & Application, and the Network and Production environment. Also, we have used them for evaluation of controls related to Information Security. ...
- Ibrahim Al-Gomllas
Audit & Risk Review – Lead Reviewer,
Samba Financial Group, Saudi Arabia
 
Quick Links
AuditPro Enterprise
A comprehensive policy-based security assessment software.
Firesec
Firewall configuration analysis for Cisco, Netscreen, Cyberguard firewalls.
Certified Professional Hacker (CPH)
CPH helps you become an expert penetration tester.
Certified Information Security Consultant (CISC)
CISC - Get mentored by the best in the business to become the best in the business
Quick EnquiryPenetration Testing 2.0 (SE)
ISO 27001/PCI DSS/HIPAA/Sarbanes-Oxley ComplianceForensics Investigation and Fraud Risk Assessments
Business Continuity Management (BCM)SCADA Assessment
About Us
Network Intelligence, incorporated in 2001, is a committed and well-recognized provider of servicessolutions andproducts in the IT Governance, Risk Management, and Compliance space. Our professionals have made a mark for themselves with highly satisfied clients all across the globe supported by our offices in India and the Middle East. As an ISO 27001-certified company ourselves, we are strongly positioned to understand your needs and deliver the right answers to your security and compliance requirements. We have won accolades at numerous national and international forums and conferences. Our work truly speaks for itself and our clients are the strongest testimony to the quality of our services!
Recent significant engagements
Q1 2011 - BCM consulting assignment & BS25999 Audit for a large Software Company in the USQ1 2011 - Network Security Audit conducted for a UN body in ItalyQ1 2011 - VPN Testing & Security Assessment for a South African Financial InstitutionQ1 2011 - Comprehensive security audit for North AfricanQ1 2011 - Black box PT for one of world’s the largest online gaming websitesQ1 2011 - Multiple ISO 27001 ImplementationsQ1 2011 - ISMS Implementation in India for one of the fourth-biggest advertising agencies in the worldQ1 2011 - Forensic investigations including for Law Enforcement AgenciesQ1 2011 - Blackberry, WLAN and end-point Penetration TestingQ1 2011 - Gray box Penetration Testing & Security Assessment for a Top 5 Financial InstitutionQ1 2011 - Comprehensive onsite and remote penetration testing for a Top 5 IT companyQ1 2011 - BS 25999 Implementation for a Middle East Central BankQ1 2011 - Comprehensive IT Audit of a Saudi Arabian Bank
 

aTTACK ON POWERGRID SCAda

The ISA website notes an ongoing project to develop ANSI/ISA security standards for SCADA (Supervisory Control And Data Acquisition) systems used to control industrial machinery including large chunks of the critical infrastructure (e.g. power plants, water treatment works). Many old-fashioned SCADA systems pre -date modern thinking on information security controls other than availability, perhaps: the reason old SCADA systems remain a problem is that many of them have continued running more or less unchanged for decades.  True information security requires a balance between confidentiality, integrity and availability.
What appears at first to be a simple news story about a systems overload caused by people downloading a large video looks somewhat odd on closer inspection.  It is reported that the systems concerned belonged to the British armed forces.  “Computer screens controlling British air defences and warplanes around the world are reported to have gone blank for five hours” says the London Evening Standard.  Um.  Well maybe. 
The BBC reported that two fake banking websites, only one of which was protected by a firewall, were put on the web as a honeypot to attract and monitor hacker attacks.  They were both attacked, of course.  Apparently, “more than a third of the attacks on the protected website were so severe that they crashed the site and could have resulted in the loss of data”.  [Call me a cynic but the fact that the ‘experiment’ was funded by an ISP and a security firm hardly inspire me with confidence in the validity of their scientific methods ...]
The US State Department’s Consular Lookout and Support System (CLASS) for checking visa applications apparently taken out of service “by a virus” (actually the Welchia worm).  Malware could hit any of us but it would appear that contingency arrangements were simply not adequate to keep the service running or get it back in operation before the media picked up the news story.  Any problems caused by the unplanned service outage were compounded by the media interest.


sOURCE

BCM and Risk Managementlinks

把奶尖送到王爷嘴巴上齐水儿


Users: Click on a link category below to see the links contained within
Add a new link or modify your existing link








Popular Links

#1 University of Toronto Disaster Recovery Project Plan Outline  - 
#2 Economic and Other Societal Impacts of U.S. Weather Phenomena  -  Economic and Other Societal Impacts Related to Hurricanes, Floods, Tornadoes, Lightning, and Other U.S. Weather Phenomena
#3 Business continuity metrics: How much can you afford to lose?  -  When developing a disaster recovery plan, companies need to evaluate how fast they can get their businesses running again and how much data they can afford to lose. Bob Cramer, CEO of LiveVault Corp., offers tips on key metrics companies should use to make these decisions.
#4 Strohl Systems  -  Survey Says: Best Practices for Business Continuity and Crisis Communications December, 2005.
#5 Computerworld  -  Survey: U.S. business, IT executives at odds on disaster recovery The differences were much narrower in Europe By Robert McMillan, IDG News Service
#6 UT-HCPC Business Continuity Plan  -  University Texas-Houston Harris County Psychiatric Center (UTHCPC) has created a Business Continuity Plan, in order to maintain the viability and integrity of the business and clinical operation should there be a disaster.


Search our Links


MORE


Disaster Recovery, Business Continuity and Contingency Planning

Recommended reading The Be Ready Campaign advises “Prepare. Plan.  Stay informed.”  Part of the site covers readiness for small businesses with an excellent summary of the things you need to do to plan for continuity of essential business processes, plus a more detailed glossy.  If you have yet to make a start on your contingency planning, or if it’s time for a back-to-basics review of the approach your organization is using, the Be Ready website is recommended reading.
A special-issue boardroom briefing on business continuity and disaster recovery from Directors and Boardsmagazine goes into some depth in issues such as DCP audit, governance and leadership for senior management.
FEMA, the US Federal Emergency Management Agency (part of the DHS, the Department of Homeland Security), offers contingency planning advice including a helpful checklist for items needed in your emergency kit (grab bag)
The US National Oceanic and Atmospheric Administration and National Weather Service provide severe weather warnings and information.  Perhaps you’ll have a few hours to evacuate?  Better still, use their statistics, along with those of the US Geological Survey to pick a safer place to live and work!
The Nuclear Regulatory Commission governs the US nuclear industry, doing all they can to avoid nuclear disasters.
The US Fire Administration has a kids page - a useful way to draw little’uns into the process of fire avoidance/prevention, fire escape and contingency planning.
The US Department of Agriculture Forest Service Southern Research Station is a great place to find out why wild fires are so dangerous in rural areas.
The UK-based Business Continuity Institute is aligned to DRI.  In conjunction with British Standards Institute, it produced PAS56 which became BS 25999-1:2006 Business Continuity Part 1 - Code of Practice.
The Oops List is a collection of images of (mostly) aircraft disasters.  Warning: these are truly graphic images - not much blood and gore as such but undoubtedly passengers or crew were injured or killed in at least some of them.  A few look like fakes or set-ups but, subject to any copyright restrictions, they would make captivating slides for contingency planning/DR presentations.
Click to buy this book through Amazon
Ross Campbell & Associates is a crisis management consultancy providing planning, training, resources, risk and threat analysis to control and manage the worst case scenario.  Ross is the author of Crisis control - preventing and managing corporate crises (available secondhand via Amazon).

Contingency testing was the subject of an ISACA briefing.
Read the UK Department of Trade and Industry’s guide to Business continuity management - preventing chaos in a crisis.  UK resilience advises on disaster preparedness. 
The Definitive Guide to Exchange Disaster Recovery and Availability explains resilience and DR techniques for Microsoft Exchange servers [you are supposed to register to download it].
Business Continuity Guideline: A Practical Approach for Emergency Preparedness, Crisis Management, and Disaster Recovery has been published by ASIS.  ASIS focuses primarily on physical security, complementing many of the other resources listed here covering the information security aspects (such as ISSA) and governance (such as ISACA).
The Rothstein catalog on disaster recovery lists over 1,000 books, software tool, videos and reports on the topic.

Resilience engineering

Recommended reading Keeping the computer room working is the core role for IT Operations, requiring a level of resilience and contingency planning.  If you’ve ever had to plan a computer room DR test, or if you are preparing to do so, take a look at the article.
Disk drive manufacturers quote MTBF (Mean Time Between Failures) of around a million hours under ideal conditions, suggesting a failure rate of less than 1% per year, but some studies show significantly worse performance (2-10% p.a. failure rate) in the real world.  It seems the “bathtub” reliability curve has a sharply upward sloping or even stepped bottom, not the long flat period of stability often assumed.  If your data are vital and their availability is critical, monitor drive age, error rates and temperatures carefully.
FMEA (Failure Modes and Effects Analysis) is an engineering discipline with potential applications in systems engineering and information security.

Surviving natural & unnatural disasters

Among other things, US CDC (Centers for Disease Control [and Prevention]) advises on preparing for “climate change” - not “global warming” as such, oh no. It wouldn’t do to confuse those two, would it?  Anyway, whatever the (alleged) cause, extreme weather events are (allegedly) more (or less) likely so storm and tornado preparations are (potentially, if you believe the “hype”) A Jolly Good Idea.
The offices of Aenias Internet and Telephone, a Tennessee-based ISP, were totally destroyed by a hurricane.  The company had made contingency plans ... but unfortunately had neglected to take copies of critical backup media off-site.  The on-site tapes proved unusable, although fortunately a specialist data recovery firm was able to retrieve the customer database from hard drives rescued from the rubble ... several days later (hard lesson learned).
space shuttle crew completed the ‘delicate task’ of removing ceramic fabric spacer strips protruding between the shuttle’s tiles by pulling them away rather than using a makeshift tool. The tool, the cutting/pulling instructions and indeed the whole Boy Scout response to this incident were themselves the product of a well-rehearsed contingency process that prepared those involved to deal positively with whatever comes up (the Apollo 13 film with Tom Hanks is a popular case study on contingency and teamworking).
It is sometimes suggested that you should imagine all the possible disasters in order to prepare comprehensive contingency plans ... but although this might be a fascinating exercise, it’s not actually very helpful in practice.  The word “contingency” implies “regardless of the situations we’ve planned for and the controls we have implemented, something else will happen and/or something unexpected will go wrong”.  Similarly, some people advise very detailed contingency plans: “Have a DR plan that is so detailed an average person could recover your systems without the IT staff” says Julian Morris, IT Director at DraftWorldwide.  Julian’s other tips include having pre-prepared templates and checklists, reliable communications mechanisms and structured plans (it may be useful to tell users “We are step X, your system will be ready at step Z”).
checklist from HHS and CDC covers just 35 items relating to pandemic planning and risk management. Such a high level assessment makes a good starting point for management to review an organization’s state of preparedness.
The World Health Organization published reliable advice on the anticipated course and effects of a bird flu pandemic, including a page with news on the latest outbreaks.  Another definitive source of scientific, medical and epidemiological information is the US Center for Disease Control.
Contingency plans for terrorism should prepare the organization to deal with conventional attacks such as bombings and probably others such as chemical, biological or radioactive attacks.
The repercussions of 9/11 on contingency planning are explored in this article.  A consultant specializing in high-availability database systems recounts in Security Administrator eZine how he was called upon to help 5 of 12 clients in the World Trade Center recover after September 11th 2001.  The other 7 clients no longer existed as viable businesses.  In the special circumstances of 9/11, stakeholders were impressed that any recovery was possible.  Would you be able to access suitable contractors to help rebuild your organization if you had to?  Would you have access to contingency funds to start from scratch?
It appears that the increased terrorist threat, post 9/11, has prompted more organizations to make contingency plans.  Just over a third of firms surveyed said that the threat of terrorism was the biggest reason for boards to assume responsibility for business continuity, whereas a quarter cited growing reliance on IT systems and 23 percent cited forthcoming industry regulations such as the Combined Code of Corporate Governance.  “The responses fly in the face of SunGuard’s own research, which suggests that hardware failure is the main cause of business interruption, at 17 percent, followed by power outages at 13 percent.”  [Regardless of the reasons cited, we would argue that contingency planning is a legitimate investment in risk reduction.]
In Disaster Recovery and Business Continuity Planning, the SEC specifies that financial institutions should resume vital clearing and settlement operations on the same day as a major incident such as 9/11, ideally within 2 hours.  This implies highly resilient systems with dual-live/multiply-redundant or hot standby arrangements and significant investment in IT by the entire [US] financial services industry.

Other availability resources

The ISA website notes an ongoing project to develop ANSI/ISA security standards for SCADA (Supervisory Control And Data Acquisition) systems used to control industrial machinery including large chunks of the critical infrastructure (e.g. power plants, water treatment works). Many old-fashioned SCADA systems pre -date modern thinking on information security controls other than availability, perhaps: the reason old SCADA systems remain a problem is that many of them have continued running more or less unchanged for decades.  True information security requires a balance between confidentiality, integrity and availability.
What appears at first to be a simple news story about a systems overload caused by people downloading a large video looks somewhat odd on closer inspection.  It is reported that the systems concerned belonged to the British armed forces.  “Computer screens controlling British air defences and warplanes around the world are reported to have gone blank for five hours” says the London Evening Standard.  Um.  Well maybe. 
The BBC reported that two fake banking websites, only one of which was protected by a firewall, were put on the web as a honeypot to attract and monitor hacker attacks.  They were both attacked, of course.  Apparently, “more than a third of the attacks on the protected website were so severe that they crashed the site and could have resulted in the loss of data”.  [Call me a cynic but the fact that the ‘experiment’ was funded by an ISP and a security firm hardly inspire me with confidence in the validity of their scientific methods ...]
The US State Department’s Consular Lookout and Support System (CLASS) for checking visa applications apparently taken out of service “by a virus” (actually the Welchia worm).  Malware could hit any of us but it would appear that contingency arrangements were simply not adequate to keep the service running or get it back in operation before the media picked up the news story.  Any problems caused by the unplanned service outage were compounded by the media interest.
For practical advice about performance monitoring on Windows systems, the Computer Performance website includes a range of useful advice for managing Windows, including some interesting “Litmus test” best practice suggestions relating to information security.
Here is some simple advice on backing-up software and data.  Backups are the primary corrective control against system or data corruption and loss.  Don’t forget to verify that you can restore successfully from your backups, especially if you change equipment, software or configuration settings.  [That little gem of advice comes courtesy of the School Of Hard Knocks, faculty of Once Bitten, Twice Shy].
Safety-critical systems are specifically designed for high-availability, but the risk of unplanned downtime cannot be entirely eliminated, even at a nuclear plant.  The Register reported that the US Nuclear Regulatory Commission issued a formal information notice to the nuclear industry in relation to the Slammer worm incident.
Organizations in the throes of merging usually look to consolidate redundant or duplicate systems to cut costs - but of course availability could be seen as a driver to retain the parallel systems, albeit with data interfaces and some means to reconcile differences.


Related NoticeBored links collections


NB: we do not necessarily endorse or agree with the third party websites accessible through the links. Use at your own risk.  Please let us know about new or broken links.


sOURCE