1. How many user roles are to be tested in Web Application Penetration testing? Provide the approx. no. of input fields in the web application?

Size: px
Start display at page:

Download "1. How many user roles are to be tested in Web Application Penetration testing? 1. 2. Provide the approx. no. of input fields in the web application?"

Transcription

1 Below are all the questions that were submitted. This is the District s first security assessments and the District is looking to qualified firms to assess our systems. As it states in the RFQ, technical qualifications will have a higher weight than price. We are looking to the firms to recommend what testing the District should do for phase I. The final tests and pricing will be negotiated with the selected firm. At this time, do we only need to provide a proposal for Phase 1 Vulnerability Assessments and Penetration Testing Services? OR do we need to provide cost estimates for Phase 2 Additional Work as well or is the scope to be determined after Phase 1? Proposal should include all items from Phase 1. Items for Phase 2 will determine on items found in Phase 1. For the external network vulnerability assessment and penetration testing, how many target systems will be in scope? (e.g., firewall(s), web server(s), remote access gateway(s), etc.) 1 firewall, 1 web server, 1 gateway For the internal network vulnerability and penetration testing, how may target systems will be in scope? (e.g., servers, workstations, devices, etc.) 3 servers Does the District want us to test for susceptibility to denial of service attacks on either the external or internal target systems? No Does the District want a credentialed or non-credentialed vulnerability assessment scan performed? (Credentialed scans can result in a deeper dive into vulnerabilities available to an authorized user.) Non-credentialed For the SCADA network vulnerability assessment and penetration testing, how many target systems will be in scope? 4 sites Tapia - 1 firewall and 2 servers HQ - 1 firewall and 2 servers Westlake - 1 firewall and 2 servers Rancho 1 server Does the District want us to test for susceptibility to denial of service attacks on the SCADA network systems? No What is the server operating system platform used throughout the District? (e.g., Windows Server 2008 R2, Windows Server 2012, HP UX, etc.) We have a mix of 2003, 2008 R2, and 2012 How many web applications are expected to be tested? 1 How many web pages are anticipated? 1 How many wireless networks are expected to be in scope? 7 4 at HQ, 3 at 3 remote sites Are all the wireless networks located in a single facility? If not, how many facilities will be in scope for wireless network assessment and penetration testing? There are 4 facilities Does the District require any manual reviews of systems during Phase 1?

2 Only of the configurations of the 1 external firewall and 3 SCADA firewalls. Does the District have a particular report format in mind or is the vendor free to use their standard format? Vendor is free to use their format During what timeslots does the District want the test work to be performed? (e.g., Only during standard business hours (8:00-5:00), only after 5:00pm, etc.) Standard business hours Mon Thurs, 7:30 5:00 Fri, 8:00 5:00 1. How many user roles are to be tested in Web Application Penetration testing? 1 2. Provide the approx. no. of input fields in the web application? 3. Are the web application(s) using any web services? If yes, how many and what types? 4. Is the Application penetration testing intended to be done on a production environment or a controlled environment? 5. How many dynamic pages are in each application (on an average)? 6. Does LVMWD want this engagement to be performed at Onsite or Offshore? If offshore, will access be provided to the offshore team? 2 login screen no production 1 login screen Either. A VPN connection will be provided for offsite. We are blocking most countries offshore. We will open a connection for offshore. 1. Will the assessment include any other topology than Ethernet? 2. What protocols other than IP will need to be included in the assessment? None 3. Will Pentest activities need Exploit attempts? Recommend tests. But not denial of service. 4. What are the locations of the remote sites for wireless network assessment? 3 remote sites, located 1 mile, 5 miles, and 10 miles from the main office. 5. Will account credentials be provided for internal host scans?

3 6. As a level of effort exercise, does LVW have a past estimated windows or duration for testing exercises (I.e. 2 days of on-site penetration testing and 1 day of off-site penetration testing? No, this is our first test. 7. Will LVW provide access to past penetration test or security assessments to create efficiencies in testing efforts? No, this is our first test. 8. Does LVW require code review as part of the testing process? Not application code. Review of firewall configurations 1 external and 3 SCADA. 9. Does a development or QA environment exist for testing purposes? 10. Does LVW require testing to be performed after hours or during specified maintenance/testing windows? Standard business hours Mon Thurs, 7:30 5:00 Fri, 8:00 5: Will standard account credentials be provided in order to test possible escalation/discovery activities? What is the goal of the Wireless Network Assessment? How does the District s desired scope differ from the Wireless Penetration Test? Only logged in users have access to the network. Other testing will be part of Phase II. How many applications are in scope for the Web Application Penetration Testing? One. We do not host our web site here. The web page that will be tested is a login screen. How many web pages are in scope for each application? One What types of applications are in scope? Application testing will be part of Phase II. What is the estimated number of pages with functionality, form submission, database query to be tested? Are the web applications to be tested in production or QA? Production. Is security currently embedded within The Districts SDLC process?

4 Can the District share its expected budget for this engagement? Does the District actually want Penetration Testing conducted on its SCADA network? Is it aware of the risks typically associated with this? The testing of SCADA for Phase I is to test the isolation of the SCADA network from the office network. The 2 networks share some data paths. Any additional testing would be part of Phase II. Does the District want offeror s to propose pricing and technical approaches for Phase 2 with this proposal? How many IP addresses are in scope for the external network? 8 How many IP addresses are in scope for the internal network? For Phase I, 3 servers How many IP addresses are in scope for the SCADA network? For Phase I, 1 server How many IP Addresses for the network have web services running on them? For the servers in scope none. When was the last time your organization conducted vulnerability assessments? This is our first test. How many sites are in scope for the wireless assessments? What is the estimated number of access points in scope? 7 4 at HQ, 3 at 3 remote sites What compliance drivers does The District have? None. 1. Approximately how many active IP s are on the network to be tested? For Phase I, 3 servers 2. How many subnets are on the network to be tested? 3 3. How many remote sites total are in scope for this effort? 3 4. For the vulnerability assessment and internal penetration efforts, will devices be allowed to be placed on the network (pwnplugs, jumpboxes etc.) to allow for remote testing?

5 a. If devices are not allowed to be placed on the network, will VPN access be allowed and if so what is the bandwidth capabilities of the VPN connection(s) to allow for remote testing? Or a VPN connection will be provided for offsite testing. 5. Is there a management network that can reach all other subnets? 6. How many Wireless Access Points are in scope? 7 4 at HQ, 3 at 3 remote sites 7. Will you provide the make and model of the wireless access points? 8. Are there any wireless access points at the remote sites? See For the Web Applications, how many dynamic pages and users roles exist? One. We do not host our web site here. The web page that will be tested is a login screen. 10. How many public facing devices are on the network? Will Social Engineering be in scope for the penetration testing? 12. Will a physical security assessment be in scope for this effort? 13. Will disruptive attacks (Denial of Service, etc.) be in scope for testing? Recommend tests. But not denial of service. 14. Will techniques such as password cracking be in scope for the penetration testing efforts? 15. Are the SCADA devices used for control or simply to provide readings? Control. 16. Is there a lab environment where active testing could be performed or will limited testing be performed on production devices? 17. Does the SCADA testing include HMI s and other associated IT elements? PI Historian? etc. 18. Will you provide the manufacturer and device model numbers for SCADA devices? Not for Phase I.

6 19. Will Travel expenses be reimbursable within the proposed budget if presented in an offer? And if so are there any limits and/or restrictions on itemized travel expenses, e.g., per diem, hotel, etc.? Yes, include an estimate of travel expenses. Limits and restrictions will be discussed with the selected vendor. 1. Please correct our understanding it s Windows SCADA SQL servers running Wonderware InSQL 10.5, (RFQ mentioned as Windows SCADA SQL servers running Wonderware InSQL 10.5) Yes it is Windows Can you provide more details regarding the Advanced Utilities System Customer Information Systems(CIS)? Are you using the CIS Infinity application? How many users? Is there any integration with other systems (i.e. SCADA, Historians, Data feeds). Yes we are using CIS Infinity with 10 users. No integration. 3. Can you be more specific on desktop computers and printers count? What OS(s) are installed on PCs and laptops? Approximately 100 PCs running Windows 7. There are 3 running XP. 15 laptops running Windows 7 and 10.

Request for Proposal INFORMATION SECURITY ASSESSMENT SERVICES RFP #12-680-004. Addendum 1.0

Request for Proposal INFORMATION SECURITY ASSESSMENT SERVICES RFP #12-680-004. Addendum 1.0 Request for Proposal INFORMATION SECURITY ASSESSMENT SERVICES RFP #12-680-004 Addendum 1.0 ISSUE DATE: February 23, 2012 Receipt of this addendum should be acknowledged on the Proposal Form. Inquiries

More information

PHILADELPHIA GAS WORKS Information Security Assessment and Testing Services RFP#30198 Questions & Answers December 4, 2015

PHILADELPHIA GAS WORKS Information Security Assessment and Testing Services RFP#30198 Questions & Answers December 4, 2015 QUESTIONS ANSWERS Q1 What is the goal of testing? A1 We engage in this type of testing to promote our own best practices and ensure our security posture is as it should be. Q2 No of active IP s (internal):

More information

RFP No. 1-15-C017 OFFICE OF TECHNOLOGY INFORMATION SYSTEMS AND INFRASTRUCTURE PENETRATION TEST

RFP No. 1-15-C017 OFFICE OF TECHNOLOGY INFORMATION SYSTEMS AND INFRASTRUCTURE PENETRATION TEST RFP No. 1-15-C017 OFFICE OF TECHNOLOGY INFORMATION SYSTEMS AND INFRASTRUCTURE PENETRATION TEST Questions and Answers Notice: Questions may have been edited for clarity and relevance. 1. How many desktops,

More information

Addendum #2 Date: March 10, 2014. City of Memphis Network Penetration Services. RFQ # SAIC CoM 2014 RG R85393. Issue Date: January 31, 2014

Addendum #2 Date: March 10, 2014. City of Memphis Network Penetration Services. RFQ # SAIC CoM 2014 RG R85393. Issue Date: January 31, 2014 Addendum #2 Date: March 10, 2014 City of Memphis Network Penetration Services Issue Date: January 31, 2014 Original Response Date: February 21, 2014 New Response Date: March 21, 2014 This addendum has

More information

Q&A ADDENDUM FOR INFORMATION SECURITY VULNERABILITY ASSESSMENT PUBLISHED 10/20/2015

Q&A ADDENDUM FOR INFORMATION SECURITY VULNERABILITY ASSESSMENT PUBLISHED 10/20/2015 Q&A ADDENDUM FOR INFORMATION SECURITY VULNERABILITY ASSESSMENT PUBLISHED 10/20/2015 UPDATE HISTORY: 10/21/2015 10/30/2015 11/5/2015 Questions submitted by Proposers All proposers should reference the following

More information

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2 Report No. 13-35 September 27, 2013 Appalachian Regional Commission Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning

More information

SAO Remote Access POLICY

SAO Remote Access POLICY SAO Remote Access POLICY Contents PURPOSE... 4 SCOPE... 4 POLICY... 4 AUTHORIZATION... 4 PERMITTED FORMS OF REMOTE ACCESS... 5 REMOTE ACCESS USER DEVICES... 5 OPTION ONE: SAO-OWNED PC... 5 OPTION TWO:

More information

Information Security Assessment and Testing Services RFQ # 28873 Questions and Answers September 8, 2014

Information Security Assessment and Testing Services RFQ # 28873 Questions and Answers September 8, 2014 QUESTIONS ANSWERS Q1 How many locations and can all locations be tested from a A1 5 locations and not all tests can be performed from a central location? central location. Q2 Connection type between location

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

Goals. Understanding security testing

Goals. Understanding security testing Getting The Most Value From Your Next Network Penetration Test Jerald Dawkins, Ph.D. True Digital Security p. o. b o x 3 5 6 2 3 t u l s a, O K 7 4 1 5 3 p. 8 6 6. 4 3 0. 2 5 9 5 f. 8 7 7. 7 2 0. 4 0 3

More information

The RT module VT6000 (VT6050 / VT6010) can be used to enhance the RT. performance of CANoe by distributing the real-time part of CANoe to a

The RT module VT6000 (VT6050 / VT6010) can be used to enhance the RT. performance of CANoe by distributing the real-time part of CANoe to a Getting started with VT6000 and VT6104 The RT module VT6000 (VT6050 / VT6010) can be used to enhance the RT performance of CANoe by distributing the real-time part of CANoe to a dedicated RT execution

More information

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323

More information

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur Demystifying Penetration Testing for the Enterprise Presented by Pravesh Gaonjur Pravesh Gaonjur Founder and Executive Director of TYLERS Information Security Consultant Certified Ethical Hacker (CEHv8Beta)

More information

Medical Device Security Health Group Digital Output

Medical Device Security Health Group Digital Output Medical Device Security Health Group Digital Output Security Assessment Report for the Kodak Color Medical Imager 1000 (CMI-1000) Software Version 1.1 Part Number 1G0434 Revision 2.0 June 21, 2005 CMI-1000

More information

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2. Exit Conference...

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2. Exit Conference... NEA OIG Report No. R-13-03 Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning to detect vulnerabilities... 2 Area

More information

Enterprise Information Technology Security Assessment RFP Answers to Questions

Enterprise Information Technology Security Assessment RFP Answers to Questions Enterprise Information Technology Security Assessment RFP Answers to Questions GENERAL QUESTIONS Q: How do the goals of the security assessment relate to improving the way VEIC does business? A: Security

More information

How To Test A Control System With A Network Security Tool Like Nesus

How To Test A Control System With A Network Security Tool Like Nesus Using the Nessus Vulnerability Scanner on Control Systems By Dale Peterson All too often we hear stories about the IT Department or some consultant running a vulnerability scan that takes down a key control

More information

RFQ 12-21 IT Services. Questions and Answers

RFQ 12-21 IT Services. Questions and Answers RFQ 12-21 IT Services Questions and Answers Question # 1: Just to clarify and I am more than certain that this is just a typo, but the due date for the submission of the IT Services RFP is January 7, 2013,

More information

Connecting to the FILTER Virtual Private Network (VPN)

Connecting to the FILTER Virtual Private Network (VPN) Create FILTER VPN Connection Filter s VPN allows computers at remote locations (e.g. home, hotels, Starbucks?) to connect directly and securely to FILTER s corporate network. Computers connected by VPNs

More information

SGUL VPN Connection Guide for Windows 10

SGUL VPN Connection Guide for Windows 10 SGUL VPN Connection Guide for Windows 10 2016-01-22 First draft 2016-01-29 Second draft 2016-04-01 First release v1.0 Regulations Before connecting to the network, you should familiarize yourself with

More information

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Practice Management Installation Guide. Requirements/Prerequisites: Workstation Requirements. Page 1 of 5

Practice Management Installation Guide. Requirements/Prerequisites: Workstation Requirements. Page 1 of 5 Practice Management Installation Guide Your computers must meet the Workstation, Server and Network Requirements (see below for specifics). These requirements will ensure that Practice Management will

More information

Compulink Advantage Online TM

Compulink Advantage Online TM Compulink Advantage Online TM COMPULINK ADVANTAGE ONLINE TM INSTALLATION, CONFIGURATION AND PERFORMANCE GUIDE FOR WINDOWS (Revised 07/08/2011) 2011 Compulink Business Systems, Inc. All rights reserved

More information

1. Why is the customer having the penetration test performed against their environment?

1. Why is the customer having the penetration test performed against their environment? General Questions 1. Why is the customer having the penetration test performed against their environment? Assess vulnerabilities in order to improve security and protect client information. 2. Is the penetration

More information

REQUEST FOR PROPOSAL (RFP) #021-14 HIPAA SECURITY ASSESSMENT VENDOR QUESTIONS & ANSWERS ~ MAY 29, 2014

REQUEST FOR PROPOSAL (RFP) #021-14 HIPAA SECURITY ASSESSMENT VENDOR QUESTIONS & ANSWERS ~ MAY 29, 2014 REQUEST FOR PROPOSAL (RFP) #021-14 HIPAA SECURITY ASSESSMENT VENDOR QUESTIONS & ANSWERS ~ MAY 29, 2014 Q1) Page 2, Section A and Page 5, Section H --- Does the County desire only an assessment of compliance

More information

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit. SiteAudit Knowledge Base Deployment Check List June 2012 In This Article: Platform Requirements Windows Settings Discovery Configuration Before deploying SiteAudit it is recommended to review the information

More information

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview

More information

Innovative Defense Strategies for Securing SCADA & Control Systems

Innovative Defense Strategies for Securing SCADA & Control Systems 1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: info@plantdata.com Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet

More information

Vendor Questions and Answers

Vendor Questions and Answers OHIO DEFERRED COMPENSATION REQUEST FOR PROPOSALS (RFP) FOR COMPREHENSIVE SECURITY ASSESSMENT CONSULTANT Issue Date: December 7, 2016 Written Question Deadline: January 11, 2016 Proposal Deadline: RFP Contact:

More information

Adagio and Terminal Services

Adagio and Terminal Services This document will describe some best practices to follow when installing Modules in a Terminal Server Environment. First, let s look at a Basic Network configuration as shown in Diagram 1: Basic Network

More information

Quick Instructions Installing on a VPS (Virtual Private Server)

Quick Instructions Installing on a VPS (Virtual Private Server) Introduction A Virtual Private Server is a virtual PC held in a remote data centre, which can be accessed via a username/password from any other computer. There are a number of scenarios where you might

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Section 12 MUST BE COMPLETED BY: 4/22

Section 12 MUST BE COMPLETED BY: 4/22 Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege

More information

MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003:

MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access to shared folders. Managing and Maintaining

More information

Managing Remote Access

Managing Remote Access VMWARE TECHNICAL NOTE VMware ACE Managing Remote Access This technical note explains how to use VMware ACE to manage remote access through VPN to a corporate network. This document contains the following

More information

In this section you will find information on the following services:

In this section you will find information on the following services: Virtual private network OVERVIEW In this section you will find information on the following services: VPN Remote User: Secure VPN Remote User allows your employees to access your business information while

More information

Leader Dogs for the Blind 1039 South Rochester Road Rochester Hills, MI 48307

Leader Dogs for the Blind 1039 South Rochester Road Rochester Hills, MI 48307 Leader Dogs for the Blind 1039 South Rochester Road Rochester Hills, MI 48307 REQUEST FOR PROPOSAL Information Security Assessment/External Penetration Testing PROPOSALS MUST BE RECEIVED VIA EMAIL BEFORE:

More information

IBM Managed Security Services Vulnerability Scanning:

IBM Managed Security Services Vulnerability Scanning: IBM Managed Security Services August 2005 IBM Managed Security Services Vulnerability Scanning: Understanding the methodology and risks Jerry Neely Network Security Analyst, IBM Global Services Page 2

More information

Audit4 Installation Requirements

Audit4 Installation Requirements Audit4 version 8.1+ 2015 Copyright 2012 S4S Pty Ltd Audit4 Support Matrix 2015 The following table provides details on the operating system and database engine support for Audit4 as at March 2015. Operating

More information

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1 Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak CR V4.1 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents Table of Contents

More information

IT 3202 Internet Working (New)

IT 3202 Internet Working (New) [All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any

More information

Course Description. Course Audience. Course Page - Page 1 of 7

Course Description. Course Audience. Course Page - Page 1 of 7 Course Page - Page 1 of 7 Troubleshooting and Supporting Windows 7 in the Enterprise M-6293 Length: 3 days Price: $1,695.00 Course Description This three-day instructor-led course will teach IT Professionals,

More information

Wireless @ Johns Hopkins

Wireless @ Johns Hopkins Wireless Configuration Guide: Windows 7 Additional hopkins wireless network instructions and requirements for Windows XP, Vista, Mac OS X, and Linux can be found at: http://www.it.johnshopkins.edu/services/network/wireless/

More information

The initial set up takes a few steps, but then each time you want to connect it is just a two set process.

The initial set up takes a few steps, but then each time you want to connect it is just a two set process. Remote Access to your Desktop using VPN Overview VPN is a tool that enables you to access one computer from another. Typical uses for Pop Center members would be 1) access their pop center computer from

More information

Analyze. Secure. Defend. Do you hold ECSA credential?

Analyze. Secure. Defend. Do you hold ECSA credential? 1 Analyze. Secure. Defend. Do you hold ECSA credential? TM E C S A EC-Council Certified Security Analyst 1 EC-Council Cyber Security Professional Path Threat Agent Application of Methodology So You Can

More information

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of

More information

Accessing the Media General SSL VPN

Accessing the Media General SSL VPN Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your

More information

GTS Software Pty Ltd. Remote Desktop Services

GTS Software Pty Ltd. Remote Desktop Services GTS Software Pty Ltd Remote Desktop Services Secure web access to GTS Software applications CONTENTS Overview... 2 What GTS can provide with Remote Desktop Services... 2 Main Features... 3 RD Web Access...

More information

SCADAvantage Network Topology System software products

SCADAvantage Network Topology System software products Data sheet DS/2101193-EN Rev. AD SCADAvantage Network Topology System software products Basic elements of a SCADAvantage system SCADAvantage has three distinct parts: the, the RTRDB, and the Client. Diagram

More information

U06 IT Infrastructure Policy

U06 IT Infrastructure Policy Dartmoor National Park Authority U06 IT Infrastructure Policy June 2010 This document is copyright to Dartmoor National Park Authority and should not be used or adapted for any purpose without the agreement

More information

Information to configure your Windows 7 office computer is described below.

Information to configure your Windows 7 office computer is described below. The Remote Desktop feature in Windows allows you to control your computer from another office or from home. Remote Desktop allows you to use the applications on your office computer, and access your data

More information

How To Set Up Hopkins Wireless On Windows 7 On A Pc Or Mac Or Ipad (For A Laptop) On A Network Card (For Windows 7) On Your Computer Or Ipa (For Mac Or Mac) On An Ipa Or

How To Set Up Hopkins Wireless On Windows 7 On A Pc Or Mac Or Ipad (For A Laptop) On A Network Card (For Windows 7) On Your Computer Or Ipa (For Mac Or Mac) On An Ipa Or Wireless Configuration Guide: Windows 7 Additional hopkins wireless network instructions and requirements for Windows XP, Vista, 8, Mac OS X, Linux, and other Mobile versions can be found at: http://www.it.johnshopkins.edu/services/network/wireless/

More information

Global Knowledge MEA Remote Labs. Remote Lab Access Procedure

Global Knowledge MEA Remote Labs. Remote Lab Access Procedure Global Knowledge MEA Remote Labs Remote Lab Access Procedure Contents 1. Overview... 3 2. Student Workstation Requirements... 3 2.1. Windows Platforms... 3 2.2. Apple Platforms... 3 2.3. Linux Platforms...

More information

Penetration Testing //Vulnerability Assessment //Remedy

Penetration Testing //Vulnerability Assessment //Remedy A Division Penetration Testing //Vulnerability Assessment //Remedy In Penetration Testing, part of a security assessment practice attempts to simulate the techniques adopted by an attacker in compromising

More information

Network Documentation Checklist

Network Documentation Checklist Network Documentation Checklist Don Krause, Creator of NetworkDNA This list has been created to provide the most elaborate overview of elements in a network that should be documented. Network Documentation

More information

8 Steps for Network Security Protection

8 Steps for Network Security Protection 8 Steps for Network Security Protection cognoscape.com 8 Steps for Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because

More information

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DR V2.0

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DR V2.0 Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak DR V2.0 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents Table of Contents

More information

SCADA Security Example

SCADA Security Example SCADA Security Example Christian Paulino and Janusz Zalewski Florida Gulf Coast University December 2012 1. Introduction SCADA systems are always connected to a network, so they are vulnerable to attack.

More information

VPN Overview. The path for wireless VPN users

VPN Overview. The path for wireless VPN users VPN Overview The path for wireless VPN users First, the user's computer (the blue computer) connects to an access point in the uiuc-wireless-net network and is assigned an IP address in that range (172.21.0.0

More information

8 Steps For Network Security Protection

8 Steps For Network Security Protection 8 Steps For Network Security Protection 8 Steps For Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because of their

More information

MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track

MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track In recent years Microsoft s MCSE programs has established itself as the premier computer and networking industry certification. For the Windows 2003

More information

Penetration Testing. I.T. Security Specialists. Penetration Testing 1

Penetration Testing. I.T. Security Specialists. Penetration Testing 1 Penetration I.T. Security Specialists ing 1 about us At Caretower, we help businesses to identify vulnerabilities within their security systems and provide an action plan to help prevent security breaches

More information

State of Texas. TEX-AN Next Generation. NNI Plan

State of Texas. TEX-AN Next Generation. NNI Plan State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...

More information

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP Today s Topics SCADA Overview SCADA System vs. IT Systems Risk Factors Threats Potential Vulnerabilities Specific Considerations

More information

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,

More information

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Payment Card Industry (PCI) Data Security Standard Security Scanning Procedures Version 1.1 Release: September 2006 Table of Contents Purpose...1 Introduction...1 Scope of PCI Security Scanning...1 Scanning

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

Windows Remote Access

Windows Remote Access Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by

More information

How to build a security assessment program. Dan Boucaut

How to build a security assessment program. Dan Boucaut How to build a security assessment program Dan Boucaut Agenda 1 Problem statement 2 Business case 3 How to avoid creating more problems Problem statement Security assessments are hard, costly and may take

More information

School of Information Science (IS 2935 Introduction to Computer Security, 2003)

School of Information Science (IS 2935 Introduction to Computer Security, 2003) Student Name : School of Information Science (IS 2935 Introduction to Computer Security, 2003) Firewall Configuration Part I: Objective The goal of this lab is to allow students to exploit an active attack

More information

Quarantine Network for Specialised Equipment.

Quarantine Network for Specialised Equipment. Quarantine Network for Specialised Equipment. Using Remote Desktop to get data in and out of the quarantine network V1.2 It is now possible to connect through a gateway or terminal server to PCs connected

More information

ASDI Full Audit Guideline Federal Aviation Administration

ASDI Full Audit Guideline Federal Aviation Administration ASDI Full Audit Guideline Federal Aviation Administration Purpose of this Document This document is intended to provide guidance on the contents of the Aircraft Situation Display to Industry (ASDI) full

More information

Vendor System Vulnerability Testing Test Plan

Vendor System Vulnerability Testing Test Plan INEEL/EXT-05-02613 Vendor System Vulnerability Testing Test Plan James R. Davidson January 2005 Idaho National Engineering and Environmental Laboratory Bechtel BWXT Idaho, LLC INEEL/EXT-05-02613 Vendor

More information

Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows

Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows Compulink Business Systems, Inc. 2645 Townsgate Road, Suite 200 Westlake Village, CA 91361 2013 Compulink

More information

Case Study: Security Implementation for a Non-Profit Hospital

Case Study: Security Implementation for a Non-Profit Hospital Case Study: Security Implementation for a Non-Profit Hospital The Story Security Challenges and Analysis The Case The Clone Solution The Results The Story About the hospital A private, not-for-profit hospital

More information

1.0 Purpose of Solicitation

1.0 Purpose of Solicitation Information Technology Consulting Services Notice of Request for Proposal Information Technology Managed Services and Support South Adams County Water and Sanitation District 1.0 Purpose of Solicitation

More information

SMALL BUSINESS OUTSOURCING

SMALL BUSINESS OUTSOURCING SMALL BUSINESS OUTSOURCING PCs on Lease 24X7 Remote Supports Professional Fees Service Level Agreement SMALL BUSINESS OUTSOURCING (SMO) CONNECTING YOUR BUSINESS TO THE TECHNOLOGY RESOURCES YOU NEED Implement

More information

WIRELESS TRAINING SOLUTIONS. by vlogic, Inc. L a b 0.3 Remote Access Labs

WIRELESS TRAINING SOLUTIONS. by vlogic, Inc. L a b 0.3 Remote Access Labs WIRELESS TRAINING SOLUTIONS by vlogic, Inc L a b 0.3 Remote Access Labs WIRELESS TRAINING SOLUTIONS Hands-on Workshop and Lab Guide Table of Contents Connecting to the Wireless Training Solutions Network

More information

Step 1 : Remove Old Versions of Java

Step 1 : Remove Old Versions of Java VPN (Banner Home Access) Pellissippi State Community College Home Installation Instructions Please Read Entire Instructions Before Installation!! Step 1 : Remove Old Versions of Java Warning!!: The Performance

More information

QHR Accuro EMR IT Hardware Requirements

QHR Accuro EMR IT Hardware Requirements QHR Accuro EMR IT Hardware Requirements Hardware Requirements for Accuro EMR Table of Contents Local Install Platform:... 3 Server Requirements:... 3 Workstation Requirements:... 4 Peripheral Requirements:...

More information

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

ITEC441- IS Security. Chapter 15 Performing a Penetration Test 1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and

More information

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00 Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak Capture Link Server V1.00 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents

More information

QUESTIONS & RESPONSES #2

QUESTIONS & RESPONSES #2 QUESTIONS & RESPONSES #2 RFP / TITLE 070076 IT Cybersecurity Assessment and Plan CONTACT Michael Keim, CPPB, Sr. Contract Adminstrator EMAIL procurement@portoftacoma.com PHONE NUMBER 253-428-8608 SUBMITTAL

More information

Project to set up Wireless Network for Midwest Home Health Agency

Project to set up Wireless Network for Midwest Home Health Agency Project to set up Wireless Network for Midwest Home Health Agency Site Survey Report and Recommendations Submitted by: Asha B. Maghirang 12/8/2011 Midwest Home Health Agency is a home care provider, servicing

More information

Course Outline: 6435- Designing a Windows Server 2008 Network Infrastructure

Course Outline: 6435- Designing a Windows Server 2008 Network Infrastructure Course Outline: 6435- Designing a Network Infrastructure Learning Method: Instructor-led Classroom Learning Duration: 5.00 Day(s)/ 40 hrs Overview: This five-day course will provide students with an understanding

More information

IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing

IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing IBM Global Technology Services Statement of Work for IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing The information in this Statement of Work may not be disclosed

More information

PCI Security Scan Procedures. Version 1.0 December 2004

PCI Security Scan Procedures. Version 1.0 December 2004 PCI Security Scan Procedures Version 1.0 December 2004 Disclaimer The Payment Card Industry (PCI) is to be used as a guideline for all entities that store, process, or transmit Visa cardholder data conducting

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

RFQ No. 1-13-B134 Payment Card Industry (PCI) Scanning Services for the Metropolitan Washington Airports Authority

RFQ No. 1-13-B134 Payment Card Industry (PCI) Scanning Services for the Metropolitan Washington Airports Authority Questions and Answers RFQ No. 1-13-B134 Payment Card Industry (PCI) Scanning Services for the Metropolitan Washington Airports Authority Notice: Questions may have been edited for clarity and relevance.

More information

Penetration Testing Report Client: Business Solutions June 15 th 2015

Penetration Testing Report Client: Business Solutions June 15 th 2015 Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: info@acumen-innovations.com

More information

White Paper ClearSCADA Architecture

White Paper ClearSCADA Architecture White Paper ClearSCADA Architecture ClearSCADA has 3 major components or software applications; the ClearSCADA server, a windows client known as, and a web client known as Webx. The software is designed

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

Connecting an Android to a FortiGate with SSL VPN

Connecting an Android to a FortiGate with SSL VPN Connecting an Android to a FortiGate with SSL VPN This recipe describes how to provide a group of remote Android users with secure, encrypted access to the network using FortiClient and SSL VPN. You must

More information

Setting up your laptop to print to the student lounge printer

Setting up your laptop to print to the student lounge printer Setting up your laptop to print to the student lounge printer Click on the system you are using: 1) MacOS X 10.2 2) MacOS X 10.3/10.4 3) Windows 2000/XP 4) Windows 7/Vista 1) MacOS X 10.2 In order to print

More information

On the Deficiencies of Active Network Discovery Systems

On the Deficiencies of Active Network Discovery Systems On the Deficiencies of Active Network Discovery Systems Ofir Arkin Chief Technology Officer Insightix Copyright 2012 - All Rights Reserved. This material is proprietary of Insightix. Any unauthorized

More information

EHLANZENI DISTRICT MUNICIPALITY NETWORK SCANNING POLICY FOR 2012

EHLANZENI DISTRICT MUNICIPALITY NETWORK SCANNING POLICY FOR 2012 EHLANZENI DISTRICT MUNICIPALITY NETWORK SCANNING POLICY FOR 2012 1. OBJECT OF THE POLICY During the 2010/11 financial year, the Auditor General report highlighted findings that IT has to action to comply

More information

Request for Resume (RFR) CATS II Master Contract. Section 1 General Information R00B4400024

Request for Resume (RFR) CATS II Master Contract. Section 1 General Information R00B4400024 RFR Number: (Reference BPO Number) Functional Area (Enter One Only) Section 1 General Information R00B4400024 Functional Area 10 - IT Management Consulting Services Position Title/s or Service Type/s (Short

More information