Wednesday, 30 September 2015
How 3D printing techniques are helping surgeons carve new ears
from
via CERTIVIEW
What Is National Cyber Security Awareness Month?
Growing up I was obsessed with gadgets and technology. When I was preparing to start my first job after graduating college, my sister gave me an electronic address book. I remember tearing open the packaging and instantly entering every address and phone number I knew. The next week I proudly took my data-engorged electronic address book into work, only to have it stolen a few days later.
I’ll never forget how violated I felt as I realized the repercussions of this heinous crime. All the addresses, phone numbers and birthdays of my closest friends – and most of my family members – were now in the hands of a stranger. I hoped this thief just wanted a free electronic address book and not a pile of personal information. Still, because of my carelessness, the personal information of people I care about had been exposed.
Although it was decades before the huge corporate data breaches that now occur almost weekly, that day taught me an important lesson about cybersecurity and data theft. While not an online cybercrime, my loss of personal data – especially data about those closest to me – taught me that protecting your personal information and being proactive about cybersecurity is not just the responsibility of your IT department. Cybersecurity is the responsibility of each and every one of us.
So what is National Cyber Security Awareness Month?
National Cyber Security Awareness Month, also known as NCSAM, is promoted by IT security professionals and organizations across the country every October. A joint effort between businesses and government, the purpose of NCSAM is to ensure that every American has the resources needed to stay safer and more secure online.
Living in a world that is more connected than ever, the Internet is essential to almost every part of our lives. Data breaches are increasing in occurrence, magnitude and reach, threatening data from your Gmail and Netflix accounts to your banking and medical records. Just ask the 18 million military and federal employees whose personal data records, some including detailed background security clearance information, were stolen when the U.S. Office of Personnel Management was hacked in the spring of 2015.
You can see why NCSAM is important to businesses and government agencies alike. Designed to educate public and private sector organizations through events and initiatives, NCSAM’s goal is to raise cybersecurity awareness and increase the resiliency of the nation in the event of a cyber incident.
To raise awareness of core NCSAM issues, each week during October has a different cybersecurity theme. We encourage you to share and act on these cybersecurity messages throughout the month:
Week 1 – October 1–2 – General Cybersecurity Awareness
This year marks the fifth anniversary of NCSAM’s “Stop. Think. Connect.” campaign. Providing simple, actionable cybersecurity advice that anyone can understand and follow is NCSAM’s goal this week.
Week 2 – October 5–9 – Create a Culture of Cybersecurity at Work
This week NCSAM focuses on the workplace and the common threats that businesses and employees are continually exposed to every day. Businesses and government agencies are encouraged to take a fresh look at their existing security plans and make them more secure and efficient.
Week 3 – October 12–16 – Connected Communities: Staying Protected While Always Connected
It can be a struggle to stay protected in our interconnected world. From social networking and downloading the hot new apps to shopping and banking, we live more of our lives online than ever before. How we access that digital world, especially when on the go, is more important to our cyber safety as well.
Week 4 – October 19–23 – Your Evolving Digital Life
Back in 1995, cybersecurity was more about how we connect as individuals to the Internet. In 2015 and beyond, cybersecurity will also be about how everything is connected to the Internet. From our cars to our refrigerators, the Internet of Things (IoT) is not just in our future. It is our present, and securing all the connected devices in your life will be a challenge.
Week 5 – October 26–30 – Building the Next Generation of Cyber Professionals
With all the headlines about cybersecurity, you would think there would be plenty of cybersecurity professionals around, but nothing could be further from the truth. Nearly one million cybersecurity jobs in the private and public sector are unfilled. The future will surely be bright for anyone entering the workforce who has studied cybersecurity, as in-demand IT security professionals demand the higher pay accompanying any under-filled job role.
As a designated NCSAM champion organization, Global Knowledge, along with our learning partners IBM, Cisco Systems, CompTIA, ISACA, Dell and Juniper Networks, will promote cybersecurity during the month of October with blog posts, white papers and webinars. During October, follow us on Twitter @GKonITSecurity and the #CyberAware hashtag for daily NCSAM updates.
Related Training
Cybersecurity
from
CERTIVIEW
SoftNAS CloudFabric Software Defined NAS Manages Data Everywhere
from Tom's IT Pro
via CERTIVIEW
Vera Secures Enterprise Documents Through Extended Box Relationship
from Tom's IT Pro
via CERTIVIEW
Flash In The Cloud: Is Performance Worth The Extra Cost?
from Tom's IT Pro
via CERTIVIEW
Talon Storage Unveils CloudFAST Global File Sharing For Azure
from Tom's IT Pro
via CERTIVIEW
Security+ Question of the Week: Increase in Email Hoaxes
An increase in email hoaxes to employees is likely to result in which of the following?
A. An increase in tech support calls and overloading of email servers and their related storage devices.
B. An increase in available bandwidth and reduction in lost productivity due to personal communications.
C. A violation of privacy and a need to make bit-stream backups of all storage devices.
D. An increase in tech support calls and users making detrimental modifications to their workstations.
The correct answer is D.
An increase in email hoaxes is likely to result in an increase in tech support calls and users making detrimental modifications to their workstations. An email hoax is usually crafted to trick victims into damaging their computer system.
It is not necessarily flooding if the hoaxes increase from 10 a week to 100 a week, however an increase to millions per day would be a flooding level event. An email hoax will not increase available bandwidth, improve productivity, violate privacy or require bit-stream image backups of media.
Related Courses
Security+ Prep Course (SY0-401)
Security+ Certification Boot Camp (SY0-401)
Security+ Question of the Week (SY0-401) Series
- Security+ Question of the Week: Deploying a Firewall
- Security+ Question of the Week: Flood Guard
- Security+ Question of the Week: iSCSI
- Security+ Question of the Week: Wireless MAC Filtering
- Security+ Question of the Week: Quantitative Analysis
- Security+ Question of the Week: Contracts
- Security+ Question of the Week: System Clock
- Security+ Question of the Week: Security Breach Incident Response
- Security+ Question of the Week: Reduce Electrostatic Discharge
- Security+ Question of the Week: Planting Malware
- Security+ Question of the Week: Network Hardening
- Security+ Question of the Week: Fuzzing
- Security+ Question of the Week: Single Sign‐On
- Security+ Question of the Week: Digital Envelope
- Security+ Question of the Week: Confining Communications to a Subnet
- Security+ Question of the Week: DoS Tool
- Security+ Question of the Week: Intranet Defense
- Security+ Question of the Week: War Driving
- Security+ Question of the Week: User Rights and Permissions Checks
- Security+ Question of the Week: Third Party Partnerships
- Security+ Question of the Week: Indicator of Integrity
- Security+ Question of the Week: Incident Response Procedure
- Security+ Question of the Week: Good Password Behavior
- Security+ Question of the Week: Tailgating
- Security+ Question of the Week: Differential Backup
- Security+ Question of the Week: Government and Military
- Security+ Question of the Week: Backdoor
- Security+ Question of the Week: Wrong Name or Address
- Security+ Question of the Week: Increase in Email Hoaxes
from
CERTIVIEW
HP simplifies end user experience with new IT service broker products
from
via CERTIVIEW
MapR introduces industry’s first In-Hadoop Document Database
from
via CERTIVIEW
Cisco India: Attempting to double revenues
from
via CERTIVIEW
Tuesday, 29 September 2015
Cisco India: Attempting to double revenues
from
via CERTIVIEW
IT Security: ‘Are we leaving the main door open?’
from
via CERTIVIEW
Is Twitter Planning to Kill its 140 Character Limit?
AMD Reveals New AMD Pro Lineup: Carrizo, ARM TrustZone Onboard
from Tom's IT Pro
via CERTIVIEW
Microsoft Azure To Be Accelerated By Nvidia GRID 2.0
from Tom's IT Pro
via CERTIVIEW
Best IT Governance Certifications For 2016
from Tom's IT Pro
via CERTIVIEW
AMD Connects: New APUs, Partners, Opportunity
from Tom's IT Pro
via CERTIVIEW
Lenovo brings its ‘Start up with Lenovo’ to Karnataka
from
via CERTIVIEW
Oracle Academy advances Computer Science education with new global offerings
from
via CERTIVIEW
Lenovo brings its ‘Start up with Lenovo’ to Karnataka
from
via CERTIVIEW
MapR Announces JSON Support For MapR-DB Hadoop
from Tom's IT Pro
via CERTIVIEW
Where to Begin With ITIL® Implementation (Part II): Conducting a Process Assessment
Your company has made the decision to implement ITIL. Now what? Hopefully, your company has put a good communication plan in place with a well-defined project scope, objectives and training program as discussed in Part I of this series.
The next step in the ITIL Implementation process will be to evaluate existing policies and systems that affect the design, development, transition, operation, and improvement of your IT department. The recommended approach is to perform a formal evaluation called a process assessment. Process assessments can be completed by internal staff or by using a consultant. There are pros and cons to both methods, but the goal is the same: to determine where to focus your efforts.
A process assessment can help you understand both the maturity and capability of your processes, and provides insight into where there are gaps that should be filled. You can choose to look only at a defined set of IT processes or delve further with reviewing your people, process and technology systems or instead select to do a full assessment.
- People, Process, and Technology—In this scenario, the people, or functions required to carry out operations would be assessed for efficiency and effectiveness. The underlying technology would also be reviewed.
- Full Assessment—A full assessment includes all of the activities of a people, process, and technology assessment, but goes further and would also include an assessment of the vision, mission, goals, and objectives of the organization along with its strategy and culture.
The results of the assessment can be used to benchmark your processes against industry standards in order to help you understand how well your organization compares with other organizations of the same size, type, and industry. It also gives insight into where there are gaps.
Rating Your Policies and Systems
Once you select which of your internal processes you wish to review, you must then figure out what system to use to rate their performance. There are several rating models to choose from:
- The Capability Maturity Model Integrated (CMMI)—Uses five defined levels to evaluate how a process is being carried out and how closely is it being followed. It begins at Level 1-Initial which means a process is unpredictable and reactive to Level 3-Defined, which means an organization and proactive, all the way up to Level 5-Optimizing.
- ISO 15504—This is a recognized standard to help you spot areas of capability that need improvement. This ISO standard defines six levels of process maturity from 0-Incomplete to 5-Optimized Processes. Its measures include process deployment, process control, process innovation and work product management. For each of these areas, ISO 15504 also evaluates the level to which each process attribute is achieved from 0 to 100 percent.
There are many frameworks, including COBIT and TIPA, which utilize the ISO 15504 model for capability assessments. As you can see, although very similar, ISO 15504 defines each level very similarly but not quite the same as CMMI.
Control Objects for Information and Related Technology (COBIT): COBIT focuses on the capability of a process, or whether or not it achieves is defined objective. The model used for COBIT is based upon the ISO 15504 Standard and it also has five levels.
Tudor IT Process Assessment (TIPA): This model was developed by the Public Research Centre Henri Tudor in Luxembourg and combines the ISO 15504 process assessment model with the ITIL best practices, so it is specifically designed with ITIL in mind. It is quickly becoming the de facto standard for performing an ITIL Process Assessment.
Carrying Out the Assessment
There some common activities that should be undertaken when performing an assessment, including a document review and employee interviews to gain an overall understanding the various aspects of your internal systems. Some documents you should review are:
- Process roles (owner, manager and practitioners)
- Process stakeholders
- What triggers the process
- Process inputs
- Activities and their flow
- Tools and automation
- Common procedures and models
- Process outputs
- Information gathering requirements
- Process feedback mechanisms including customer survey results
- Measurements, including critical success factors (CSFs) and key performance indicators (KPIs)
Your assessment team should perform interviews of the key players who are accountable and responsible for your processes. These interviews can be one-on-one, or in a group setting. The goal is to understand each stakeholder’s perspective and gain insight into their views about how the process or processes work, where they see issues, how they view process compliance, and the benefits they think are being realized from the processes.
Now, that you’ve figured out what internal practices to review, selected your performance rating model, reviewed documentation and interviewed stakeholders, you are ready for the next step: acting on your assessment. To find out more check out Part III of the “ITIL® Implementation Where to Begin” white paper.
Related Courses
ITIL® Foundation
ITIL® Awareness
ITIL® for Executives
from
CERTIVIEW
Gartner Says Worldwide shipments of 3D Printers to reach more than 490,000 in 2016
from
via CERTIVIEW
Microsoft Launches Commercial Cloud Services from Local Datacenters in India
from
via CERTIVIEW
Videocon Mobiles launches rich-featured smartphones; Z51 Punch and Z51Q Star, priced at Rs 5,999 and Rs 5, 490 respectively
from
via CERTIVIEW
Dell introduces new campus and datacenter networking solutions for the future-ready enterprise
from
via CERTIVIEW
Quikr empowers common man across India with QuikrJobs
from
via CERTIVIEW
Synechron acquires Crossbridge – strengthens consulting expertise
from
via CERTIVIEW
Monday, 28 September 2015
State of logistics outsourcing study shows major changes ahead for Supply Chain
from
via CERTIVIEW
Windows 8.1 Exams Retiring, Windows 10 Exams Coming Soon
from Tom's IT Pro
via CERTIVIEW
Vapor IO To Use AppliedMicro HeliX 2 Processor To Power Vapor Edge Controller
from Tom's IT Pro
via CERTIVIEW
HashiCorp Releases Otto And Nomad, Two New Open Source DevOps Tools
from Tom's IT Pro
via CERTIVIEW
Startups are key to India’s transformation: Prime Minister Narendra Modi
from
via CERTIVIEW
Acer India opens new exclusive brand stores at Delhi and Karnataka
from
via CERTIVIEW
Oracle Academy advances Computer Science education with new global offerings
from
via CERTIVIEW
IBM expands portfolio of cloud business solutions with the launch of industry platforms
from
via CERTIVIEW
Vivo Unveils Y Series Models in India
from
via CERTIVIEW
PMP Formula of the Week: Fixed-Price Incentive Fee Contract
As the seller, you are completing a project under a fixed-price incentive fee contract, with a fixed price of $130,000. The incentive (or penalty) is set at $2,000 per week for each week that the project is under (or over) schedule. When you deliver the project two weeks late, how much money will you receive?
A. $130,000
B. $134,000
C. $126,000
D. $138,000
The correct answer is C.
Answer C, $126,000, is correct because in a fixed-price incentive fee contract, the agreed contract price will be increased or decreased based on the terms of the incentive or penalty and the seller’s performance.
The formula is fixed price +/– seller’s incentive or penalty
$130,000 – ($2,000 x 2 weeks)
$130,000 — $4,000
$126,000
Related Resources
PMP Exam Prep Mobile App
Project Management White Papers
Related Courses
IT Project Management
Project Management Fundamentals
Project Management, Leadership, and Communication
PMP Exam Prep Boot Camp
PMP Formula of the Week Series
- PMP Formula of the Week: Forecasting a Necessary CPI
- PMP Formula of the Week: Forecasting a Necessary CPI Based on an ETC
- PMP Formula of the Week: Ahead or Behind Schedule
- PMP Formula of the Week: Point of Total Assumption
- PMP Formula of the Week: Rent, Lease or Buy?
- PMP Formula of the Week: Risky Task
- PMP Formula of the Week: Earned Value Management Methodology
- PMP Formula of the Week: Schedule Performance Index of 1
- PMP Formula of the Week: TCPI
- PMP Formula of the Week: Fixed-Price Incentive Fee Contract
from
CERTIVIEW
Sunday, 27 September 2015
Indian hackers take down more than 100 Pakistan based websites in revenge attack
from
via CERTIVIEW
Crowdsourced mobile solution enables real time tracking of movement of trains on Google Maps
RailYatri.in, a technology start-up focused on train travellers, has launched a GPS train tracking platform, ‘RailRadar GPS’ to track..
from
via CERTIVIEW
Saturday, 26 September 2015
Narendra Modi at Silicon Valley: Full text of the Prime Minister’s speech
from
via CERTIVIEW
Shoto, a private photo sharing mobile app acts like a location tracker for photos
from
via CERTIVIEW
Micromax launches new 4G smartphones: Canvas Blaze 4G, Canvas Fire 4G and Canvas Play 4G
from
via CERTIVIEW
Internet.org renamed to Free Basics by Facebook; more than 60 new services available
from
via CERTIVIEW
After Ola Cabs, Uber too introduces number masking to protect identity of Indian passengers
from
via CERTIVIEW
Friday, 25 September 2015
Find out 6 amazing reasons to like WhatsApp even more
from
via CERTIVIEW
8 innovative ways WhatsApp is being used in India
from
via CERTIVIEW
How To Build An Interactive Menu Inside Of A PowerShell Script
from Tom's IT Pro
via CERTIVIEW
Helpchat agrees to acquire hyperlocal discovery platform, Niffler to improve chat based personal assistant’s capabilities
from
via CERTIVIEW
Giada Introduces Fanless Intel Braswell-Based F103D Thin Client
from Tom's IT Pro
via CERTIVIEW
CCNP Security Question of the Week: Bogus IPv6 Addresses
What two features block traffic that are sourced from bogus IPv6 addresses? (Choose two.)
A. DHCPv6 Guard
B. IPv6 Prefix Guard
C. IPv6 RA Guard
D. IPv6 Source Guard
Answer: B and D.
IPv6 Source Guard and IPv6 Prefix Guard are Layer 2 snooping features that validate the source of IPv6 traffic. IPv6 Source Guard blocks any data traffic from an unknown source. For example, one that is not already populated in the binding table or previously learned through Neighbor Discovery (ND) or Dynamic Host Configuration Protocol (DHCP) gleaning. The IPv6 Prefix Guard feature works within the IPv6 Source Guard feature, enabling the device to deny traffic originated from nontopologically correct addresses. IPv6 prefix guard is often used when IPv6 prefixes are delegated to devices (for example, home gateways) using DHCP prefix delegation. The feature discovers ranges of addresses assigned to the link and blocks any traffic sourced with an address outside this range.
Related Resources
Cisco White Papers
Related Course
CCNP Security e-Camp
CCNA Security Question of the week Series
- CCNA Security Question of the Week: Application Layer Firewall
- CCNA Security Question of the Week: Enable Secret
- CCNA Security Question of the Week: Cisco Configuration Professional
- CCNA Security Question of the Week: Secure Network Management
- CCNA Security Question of the Week: Enterprise Installation
- CCNA Security Question of the Week: Access Control List
- CCNA Security Question of the Week: ASA Access List
- CCNA Security Question of the Week: AAA Login Authentication
- CCNA Security Question of the Week: Traffic Class
- CCNA Security Question of the Week: IPS Alerts
- CCNP Security Question of the Week: IPS Anomaly Detection Features
- CCNP Security Question of the Week: Bogus IPv6 Addresses
from
CERTIVIEW
VoxWeb’s ‘Speaking Picture’ app all set to reinvent Photograph
from
via CERTIVIEW
Thursday, 24 September 2015
IBM Is Morphing Into A Software Company
from
via CERTIVIEW
IBM Extends Watson Cognitive Computing Platform, Introduces New APIs
from Tom's IT Pro
via CERTIVIEW
Best Enterprise Architect Certifications For 2016
from Tom's IT Pro
via CERTIVIEW
HCL launches a Digital Service Exchange Platform
from
via CERTIVIEW
5 mobile wallets in India that do more than just bill payments
Despite being at a nascent stage, Mobile wallets have managed to maintain a large user base in India because..
from
via CERTIVIEW
SAP Labs collaborates with Srishti to absorb early talent through scholarships
from
via CERTIVIEW
Preparing for an Unknown Cyber Threat
It seems that the cyber security conversation is never-ending. Topics, ideas, insights or just about any other constructive thinking inside your organization, has cyber security sprinkled into it. As they should, security teams are watching the warning networks, requesting tools to better secure data, patching and praying, as well as trying to imagine what’s next.
Unfortunately all of the confidence scores around stopping the next cyber attack or closing the next security breech assume the next one will be of the same type or kind as prior attacks. But what if it is not? What if the next security attack is of a totally different kind? What if the prior 37 attacks and cleanups have all left little pieces of code in places you may not think of, such as router cache, and the next attack will assemble those 37 bits of code into a completely new thing? Is your organization ready for that? How do you know? If not, how do you prepare?
The Unacceptable Answer
A multitude of questions, including those above, cannot all have fully formed answers. Some are unanswerable until an attack has been mitigated, studied and understood, and new defenses created. Perhaps an acceptable answer for many of the questions is, “I do not know.” But, in the world of IT and security professionals, these words are unacceptable. The reality is that no one knows for sure what the next cyber attack will be, when it will happen or how much damage will occur. However, we can learn to prepare for and limit the scope of the next attack.
Occasionally cyber security is referred to as a marathon rather than a race, and the analogy is directionally correct in that cyber security is not a one-time thing you decide to do today. Rather, your effective cyber security practices are long-term policy and habit-driven actions that deliver expected outcomes against historical needs. But what if your cyber security marathon were followed by an attack pentathlon leading to a breech triathlon? Would you manage security differently?
The Best Cyber Defense
Preparing for and managing this combination of connected but different security needs requires the levels of training and practice one might find in Olympic athletes. Ongoing preparation, knowledge gathering and skills development, are among the best cyber defenses available today. Training your teams to respond to the unexpected in ways that confuse or distract cyber attackers is one clear advantage you have today. Doing this requires ongoing investments in learning and understanding how the cyber threat landscape changes from day to day. This is how you prepare for the unknown.
“I do not know” can be an unpopular phrase in IT and cyber security. However, it can also be the starting point for improving your cyber self through new knowledge, new habits, and a new view of the cyber security threats yet to come. One thing you do know is that the cyber threat tomorrow will be different from the cyber threat today, and that means you must be doing something different today if you are to be ready for tomorrow.
Related Training
Cybersecurity
from
CERTIVIEW
Wednesday, 23 September 2015
Government IT spending in India to reach $6.88 billion in 2015, says Gartner
from
via CERTIVIEW
Global IT spending across vertical industries to decline 3.5 percent in 2015, says Gartner
from
via CERTIVIEW
BlueData Announces EPIC 2.0
from Tom's IT Pro
via CERTIVIEW
Intel Launches DC P3608 Series SSDs
from Tom's IT Pro
via CERTIVIEW
Border Router Security 101
from Tom's IT Pro
via CERTIVIEW
QNAP Scales Up With Qtier, Scales Out With Databolt 12 Gb/s
from Tom's IT Pro
via CERTIVIEW
Now, you can use your FreeCharge mobile wallet to shop at Shoppers Stop retail outlets
from
via CERTIVIEW
Dr Agarwal’s Eye Hospital adopts cloud-based healthcare solution from Dell
from
via CERTIVIEW
Dell Services selected as strategic technology partner for Dr. Agarwal’s Eye Hospital
from
via CERTIVIEW
Oracle sees traction for Cloud customer experience (CX) solutions in India
from
via CERTIVIEW
Security+ Question of the Week: Wrong Name or Address
What type of questionable or potentially unethical activity captures traffic when the users enter the wrong name or address for an Internet site or service?
A. Pharming
B. Watering hole attack
C. Rainbow tables
D. Typosquatting
The correct answer is D.
Pharming steala Internet traffic typically through some form of DNS poisoning. A watering hole attack is a means to infect a group with malware by planting it at a commonly visited location. Rainbow tables is a pre-crafted database of passwords and their hashes used to quickly crack a password from an obtained password hash. However, rainbow tables are limited by the hash algorithm used and the length and complexity of the passwords. Most rainbow tables have a relatively limited use due the fact that the database grows exponentially as the length of the password increases.
The correct answer, typosquatting, captures traffic when users enter the wrong name or address for an Internet site or service.
Related Courses
Security+ Prep Course (SY0-401)
Security+ Certification Boot Camp (SY0-401)
Security+ Question of the Week (SY0-401) Series
- Security+ Question of the Week: Deploying a Firewall
- Security+ Question of the Week: Flood Guard
- Security+ Question of the Week: iSCSI
- Security+ Question of the Week: Wireless MAC Filtering
- Security+ Question of the Week: Quantitative Analysis
- Security+ Question of the Week: Contracts
- Security+ Question of the Week: System Clock
- Security+ Question of the Week: Security Breach Incident Response
- Security+ Question of the Week: Reduce Electrostatic Discharge
- Security+ Question of the Week: Planting Malware
- Security+ Question of the Week: Network Hardening
- Security+ Question of the Week: Fuzzing
- Security+ Question of the Week: Single Sign‐On
- Security+ Question of the Week: Digital Envelope
- Security+ Question of the Week: Confining Communications to a Subnet
- Security+ Question of the Week: DoS Tool
- Security+ Question of the Week: Intranet Defense
- Security+ Question of the Week: War Driving
- Security+ Question of the Week: User Rights and Permissions Checks
- Security+ Question of the Week: Third Party Partnerships
- Security+ Question of the Week: Indicator of Integrity
- Security+ Question of the Week: Incident Response Procedure
- Security+ Question of the Week: Good Password Behavior
- Security+ Question of the Week: Tailgating
- Security+ Question of the Week: Differential Backup
- Security+ Question of the Week: Government and Military
- Security+ Question of the Week: Backdoor
- Security+ Question of the Week: Wrong Name or Address
from
CERTIVIEW
Government withdraws controversial national encryption policy; blames junior officer for confusing wording of document
from
via CERTIVIEW
Tuesday, 22 September 2015
IBM Cloud Security Enforcer Protects Companies From Cloud-Based Threats
from Tom's IT Pro
via CERTIVIEW
Dell Venue 8 Pro, Venue 10 Pro About Services More Than Hardware
from Tom's IT Pro
via CERTIVIEW
Best System Administrator Certifications for 2016
from Tom's IT Pro
via CERTIVIEW
Microsoft Office 2016 Focused On Collaboration And Cloud
from Tom's IT Pro
via CERTIVIEW
AirWatch Continues Evolution In Mobile Device Management Leadership
from Tom's IT Pro
via CERTIVIEW
Where to Begin With ITIL® Implementation (Part I): Pre-Initiative Preparation and Assessment
Generally, organizations look at implementing ITIL because they want to improve IT service levels, save money, find efficiencies or enhance customer service. But, ITIL has dozens of best practices and finding a place to start can be overwhelming.
ITIL is a methodology that takes a Service Lifecycle approach to the design, development, transition, operation, and improvement of an IT organization’s services and processes. In order to implement ITIL you have to assess your existing IT systems and processes, and you may need to make adjustments to your corporate culture in order for the initiative to work.
Each company has its own culture and dynamics that also play a part in how that particular company operates, so there is no single best way to institute ITIL best practices. Organizations have a great deal of flexibility to utilize the best practices that make the most sense for their particular situation.
Over the course of this three-part series we will help you figure out which assessment process you should use, along with how to gain employee buy-in, and quickly show the value of ITIL in your organization. We will also look at how to determine measures of success.
First, let’s look at the preparation you need to do for a successful ITIL initiative.
Internal Communication is Key
The best place to begin is with internal communication and training. Start by communicating the intention to embark on an ITIL journey via your company newsletter. Outline the reasons why ITIL implementation is underway and the expectations for the initiative. The newsletter should also outline the plan for training throughout the organization.
Use the newsletter as a regular communication vehicle throughout the initiative to communicate upcoming tasks and implementations, accomplishments, and benefits being realized from the effort. It should also be used to recognize staff members and teams who have provided significant contributions. Make sure to use the company bulletin boards and online resources to post updates, successes, and recognition.
It extremely important that the IT staff, IT management (including executives), and select business representatives attend ITIL training. It’s best if all employees attend ITIL Foundation training. This ensures that everyone understands the basic concepts, learns the common terminology, and that no one feels left out. It’s a great way to make your staff feel included in the initiative in order to gain buy-in and support.
The core team should be the first to attend the foundational training. Next, the staff targeted to become process owners and managers should take the intermediate level courses that teach the concepts around their area(s) of responsibility. For the core team that will be responsible for the processes, advanced knowledge is critical. Two to three people should become ITIL Experts. They will be the go-to people in the organization, so make sure these people are on the core implementation team.
Find Your Areas of Weakness
Attempting to implement or improve too much at one time will ultimately result in a failed initiative. Begin by defining a reasonable scope for the project. To do this, you need to assess your existing operations and capabilities.
Most companies have a process to handle Incidents that occur in the environment and to respond to requests for assistance from users. However, these processes are not always as efficient or effective as they should be, and they aren’t providing the value that is possible if best practices were used.
One way many companies find their areas of weakness is to evaluate and examine the three major internal processes that have the biggest impact on customer satisfaction and service reliability:
- Incident Management: a process that is used to resolve issues that occur in the IT environment as quickly as possible to minimize the impact on the business. This process is owned and managed by the service desk, which is the single point of contact for users from an operational perspective.
- Request Fulfillment: also owned by the service desk, is meant to deal with requests from users. Requests can range from a question, to a password reset, to installation of standard software, or even for access to a service or set of services.
- Change Management: modifications to the IT environment can include new services, changes to existing services, the removal or retirement of a service, or the transfer of a service to/from an external service provider.
Another way to assess your internal process is to look at your current pain points, or areas where you are having the most issues. Take the time to understand the root cause of your challenges. Are the incidents a sign of a larger issue, a staffing shortage, communication gaps, or missing processes? Make sure to take everything into consideration before jumping in and fixing something that may not be an issue.
A third method organizations can use to review their current policies and procedures is to conduct a process assessment. This approach is the most recommended because it can help you to understand both the maturity and capability of your processes, and provide insight into where there are gaps that should be filled. Maturity refers to how a process is being carried out and how closely is it being followed. Capability refers to how well the process is accomplishing its defined outcome. In other words, is it accomplishing its desired goals or objectives?
To find out more about how to do a process assessment check out Part II of this series or the “ITIL® Implementation Where to Begin” white paper.
Related Courses
ITIL® Foundation
ITIL® Awareness
ITIL® for Executives
Where To Begin ITIL Implementation Series
- Where to Begin With ITIL® Implementation (Part I): Pre-Initiative Preparation and Assessment
from
CERTIVIEW
YatraGenie launches services in 8 cities in Karnataka
from
via CERTIVIEW
Monday, 21 September 2015
Aircel, BSNL and Many Indian Firms Provide Mediocre Customer Experiences: Forrester
In a damning revelation by Forrester, majority of Indian firms deliver mediocre customer experiences;and if that is not enough..
from
via CERTIVIEW
After furore over national encryption policy, Government exempts WhatsApp and social media messages from purview
from
via CERTIVIEW
Dell Intros Support Services For VDI Focused On Productivity
from Tom's IT Pro
via CERTIVIEW
5 Free IT Training Courses Available On edX
from Tom's IT Pro
via CERTIVIEW
India-based IT companies support more than 411,000 jobs in the US, says Nasscom
from
via CERTIVIEW
Preserve your WhatsApp messages for 90 days, says India’s new Draft National Encryption Policy
from
via CERTIVIEW
Indian IT companies among the 10 worst paymasters in the world; Switzerland pays the best IT salaries
from
via CERTIVIEW
Aircel announces network expansion intent; plans to add 13,000 sites by December 2015
from
via CERTIVIEW
PMP Formula of the Week: TCPI
What formula is used to determine To-Complete Performance Index (TCPI)?
A. (BAC – EV) / (BAC – AC)
B. EV / AC
C. EV / PV
D. CPI / SPI
The correct answer is A.
Answer A, TCPI = (BAC – EV) / (BAC – AC), is the correct formula.
- BAC = budget at completion
- EV = Earned value
- AC = Actual Cost
Answer B, EV / AC, is the formula for Cost Performance Index (CPI) and answer C, EV / PV, is the formula for Schedule Performance Index (SPI). Answer D, CPI / SPI, is not a recognized formula.
Related Resources
PMP Exam Prep Mobile App
Project Management White Papers
Related Courses
IT Project Management
Project Management Fundamentals
Project Management, Leadership, and Communication
PMP Exam Prep Boot Camp
PMP Formula of the Week Series
- PMP Formula of the Week: Forecasting a Necessary CPI
- PMP Formula of the Week: Forecasting a Necessary CPI Based on an ETC
- PMP Formula of the Week: Ahead or Behind Schedule
- PMP Formula of the Week: Point of Total Assumption
- PMP Formula of the Week: Rent, Lease or Buy?
- PMP Formula of the Week: Risky Task
- PMP Formula of the Week: Earned Value Management Methodology
- PMP Formula of the Week: Schedule Performance Index of 1
- PMP Formula of the Week: TCPI
from
CERTIVIEW
Google joins hands with Tata Trusts to announce Android Nanodegree scholarships in India in partnership with Udacity
from
via CERTIVIEW
Qlik launches online self-service analytics learning classroom
from
via CERTIVIEW
IoT trends and job opportunities
from
via CERTIVIEW
Sunday, 20 September 2015
Can artificial intelligence be used to improve breast cancer treatment?
from
via CERTIVIEW
Ola Cabs introduces number masking to protect privacy of customers
from
via CERTIVIEW
5 mobile wallets in India that do more than just bill payments
Despite being at a nascent stage, Mobile wallets have managed to maintain a large user base in India because..
from
via CERTIVIEW
Saturday, 19 September 2015
Is Bangalore a riskier place to work than Dhanbad?
from
via CERTIVIEW
Is Bangalore a riskier place to work than Dhanbad?
from
via CERTIVIEW
Friday, 18 September 2015
How 3D printing can help in regrowing complex nerves after injury
from
via CERTIVIEW
Top 3 PowerShell Best Practices
from Tom's IT Pro
via CERTIVIEW
CCNP Security Question of the Week: VLAN Hopping
According to Cisco best practices, which two commands help prevent VLAN hopping? (Choose two.)
A. switchport mode access
B. switchport access vlan 2
C. switchport mode trunk
D. switchport access vlan 1
E. switchport trunk native vlan 1
F. switchport protected
Answer: A and B.
Change the default behavior of dynamic desirable or dynamic auto to assigning the port an access port. No matter what device is attached to the port, it cannot use 802.1Q tagging to hop from one VLAN to another. Also, as an access port, the default VLAN is VLAN 1 so move it to another, unused VLAN number to black hole any traffic from any unauthorized devices that might connect to the switch.
Related Resources
Cisco White Papers
Related Course
CCNP Security e-Camp
-
CCNP Security Question of the Week Series
- CCNP Security Question of the Week: Cisco ASA Security Context
- CCNP Security Question of the Week: Authenticating ASDM Users
- CCNP Security Question of the Week: Layer 5–7 Policy Maps
- CCNP Security Question of the Week: 802.1X
- CCNP Security Question of the Week: IPS Updates
- CCNP Security Question of the Week: IPsec VPN Tunnels
- CCNP Security Question of the Week: AnyConnect VPN Client
- CCNP Security Question of the Week: ASA AIP-SSM and ASA AIP-SSC
- CCNP Security Question of the Week: Disable DHCP Server Service
- CCNP Security Question of the Week: Cisco ASA Security Appliance Access List
- CCNP Security Question of the Week: Network Address Translation
- CCNP Security Question of the Week: Harden a Switch
- CCNP Security Question of the Week: SSH Login
- CCNP Security Question of the Week: Packet-Tracer Command
- CCNP Security Question of the Week: SSL Ciphers
- CCNP Security Question of the Week: VLAN Hopping
from
CERTIVIEW
Brocade extends leadership in open source software-defined networking
from
via CERTIVIEW
Oracle launches new cloud-based services for targeting higher education space in India
from
via CERTIVIEW
Ricoh India doubles revenue in Q1 2015
from
via CERTIVIEW
8K Miles acquires US-based NexAge Technologies for 3 million USD
from
via CERTIVIEW
Thursday, 17 September 2015
Xerox plans to use printed electronics to fight counterfeiting in the pharmaceutical industry
from
via CERTIVIEW
Amazon takes aim at low cost tablet market; launches new tablet priced at Rs 3300
from
via CERTIVIEW
Arcadia Data Offers Enterprise Alternative To Traditional BI Tools
from Tom's IT Pro
via CERTIVIEW
Best Computer Networking Certifications for 2016
from Tom's IT Pro
via CERTIVIEW
Meizu’s flagship phone MX5 gets a great response on Snapdeal; Sales begin tomorrow
from
via CERTIVIEW
Teamchat aims to become the WhatsApp of the IoT and enterprise space
from
via CERTIVIEW
Teamchat aims to become the WhatsApp of the IoT and enterprise space
from
via CERTIVIEW
Preparing Your Universe Design Staff for SAP’s Information Design Tool
With product support for earlier versions of SAP BusinessObjects ending on December 31, 2015, many organizations are upgrading to the latest version, SAP BusinessObjects Business Intelligence (BO BI) platform 4.1. As part of any BI upgrade plan, project managers should budget and schedule training for both end users and the IT personnel who support the BI system. With the Bi 4.1 upgrade in particular, it’s important that key personnel receive classroom training for the Information Design Tool.
What makes SAP BI tools particularly powerful is their use of a “semantic layer,” or intelligent layer, that provides an easy-to-use “plain-English” drag-and-drop user interface suitable for users comfortable with Microsoft Office. SAP Business Warehouse (BW) and SAP HANA each have their own semantic layers. But for non-SAP relational database sources, SAP provides a semantic layer known as the “universe.” The universe should be a key weapon in the self-service BI arsenal for any organization that uses SAP BI platform.
Historically, universes were created with a tool called the Universe Design Tool, known as Designer in earlier editions. But beginning with its BO BI Suite 4.0, SAP introduced a new tool called the Information Design Tool. While it also creates universes, this tool introduces a new user interface and a new file format that can prove challenging to even highly experienced designers.
Although nearly anyone can use a universe, it takes some special skills to create a universe. The typical profile of a universe designer is somebody with an IT background that is experienced with Structured Query Language (SQL). But a great universe relies on more than just technical knowledge. The best universes are built by people who also understand the business domain of the data source and can create a query experience easily grasped by the intended user population. In contrast, poorly designed universes can suffer from faulty query performance, inaccurate results or a painfully complex universe that’s difficult to use. Any of these issues can turn a universe into shelfware, putting an organization’s self-service BI goals even further out of reach. It’s expensive and unnecessary, but also not uncommon to hire additional IT staff or look for alternate BI tools from other vendors.
You should profile your universe design staff for their experience and training. Unless they have prior experience with SAP’s BO BI platform 4.1 from outside the organization, nearly all of your existing staff will fit into one of these three categories:
- Novice IT staff who have little or no practical experience designing universes
- Experienced IT staff who have never received formal training for universe design
- Experienced IT staff who are comfortable with the older Designer tool but who have never used the Information Design Tool
Classroom Training
Global Knowledge provides five-day intensive training for the Information Design Tool, SAP BusinessObjects Information Design Tool. Previously, the course was broken into a three-day introductory and two-day advanced course. Unlike most technical training that teaches what to do, this course also teaches what not to do, which will help you avoid common pitfalls that usually require expensive rework or outside consultants to remedy.
Training can be perceived as expensive. However, the price of not training, and potentially wasting your organization’s existing investment in SAP BI can be even more expensive, not just in dollars expended but in time wasted and business opportunities missed because BI didn’t exist to support new business initiatives.
Online Documentation
The “Information Design Tool Users Guide” is freely available on the SAP Help Portal. While it’s comprehensive, the material can be a bit overwhelming to new universe designers. The format is more of a reference guide and less of a step-by-step tutorial.
Related Training
SAP Training
from
CERTIVIEW
Avaya empowers India’s public sector with state-of-the-art video engagement solutions
from
via CERTIVIEW
HCL unveils strategic initiative to accelerate IoT adoption
from
via CERTIVIEW
Wednesday, 16 September 2015
Hybrid Caching Gets Read Performance Boost, Dot Hill Awarded Patent
from Tom's IT Pro
via CERTIVIEW
QNAP Announces SMB-Class Network Attached Storage
from Tom's IT Pro
via CERTIVIEW
PMC-Sierra Flashtec NVRAM Drive Review
from Tom's IT Pro
via CERTIVIEW
Connected Data Partners, ImmixGroup To Bring File Sync And Share (FSS) To Government Agencies
from Tom's IT Pro
via CERTIVIEW
LogicMonitor's New Amazon Web Services Plug-In Simplifies AWS Performance Monitoring
from Tom's IT Pro
via CERTIVIEW
TCS Digital Software & Solutions Group introduces ‘customer intelligence & insights’ for retail banks
from
via CERTIVIEW
Sanovi Technologies announces entry into European markets
Gartner “Cool Vendor” and pioneer of Application Defined Continuity technology, Sanovi TechnologiesCERTIVIEW
Security+ Question of the Week: Backdoor
If not by a hacker, how is a backdoor planted?
A. Disabled by a replay attack.
B. Connected to via a man‐in‐the‐middle attack.
C. Left in the code by a programmer.
D. Activated when providing legitimate credentials.
The correct answer is C.
A backdoor is an alternate means to gain access or control over a system rather than using valid authentication credentials. Planted by a hacker or left in the code by a programmer, a backdoor is not disabled by a replay attack, connected to via a man‐in‐the‐middle attack or activated when providing legitimate credentials.
Related Courses
Security+ Prep Course (SY0-401)
Security+ Certification Boot Camp (SY0-401)
Security+ Question of the Week (SY0-401) Series
- Security+ Question of the Week: Deploying a Firewall
- Security+ Question of the Week: Flood Guard
- Security+ Question of the Week: iSCSI
- Security+ Question of the Week: Wireless MAC Filtering
- Security+ Question of the Week: Quantitative Analysis
- Security+ Question of the Week: Contracts
- Security+ Question of the Week: System Clock
- Security+ Question of the Week: Security Breach Incident Response
- Security+ Question of the Week: Reduce Electrostatic Discharge
- Security+ Question of the Week: Planting Malware
- Security+ Question of the Week: Network Hardening
- Security+ Question of the Week: Fuzzing
- Security+ Question of the Week: Single Sign‐On
- Security+ Question of the Week: Digital Envelope
- Security+ Question of the Week: Confining Communications to a Subnet
- Security+ Question of the Week: DoS Tool
- Security+ Question of the Week: Intranet Defense
- Security+ Question of the Week: War Driving
- Security+ Question of the Week: User Rights and Permissions Checks
- Security+ Question of the Week: Third Party Partnerships
- Security+ Question of the Week: Indicator of Integrity
- Security+ Question of the Week: Incident Response Procedure
- Security+ Question of the Week: Good Password Behavior
- Security+ Question of the Week: Tailgating
- Security+ Question of the Week: Differential Backup
- Security+ Question of the Week: Government and Military
- Security+ Question of the Week: Backdoor
from
CERTIVIEW
Blackstone Group to acquire majority of Serco’s private sector BPO operations for Rs 2558 crores
from
via CERTIVIEW
Tuesday, 15 September 2015
Oracle India: Cloud Business Begins to Pay Dividends
from
via CERTIVIEW
8 applications enabling a flawless Nashik Kumbh Mela
from
via CERTIVIEW
Disney Research demonstrates how light can be used to create a network for the Internet of Things
from
via CERTIVIEW
Containers Continue Invasion Of Software-Defined Storage, Nexenta Joins Fray
from Tom's IT Pro
via CERTIVIEW