Whitepapers & Guides
Technical Guides
The first two guides are intended for those who wish to get involved in the retrieval of data for evidence or testing purposes. They describe the use of MS Query in retrieving data from database sources. Retrieve them in the order they are presented.
- Understanding ODBC and how to configure ODBC for simple query work using MS Query – Open Database Connectivity
- Understanding how to create more complex queries and import results into Excel. This substantial paper is intended for those that wish to find out more about wireless, bluetooth, PDA and storage card security and control – ODBC and OLAP
- Learn more about the risks associated with these technologies and use our free 24 point checklist to help reduce your exposure to these risks –Mobile Device and Wireless Security (pdf download 866KB)
- By Bruce Schneier – author of “Secrets and Lies” – Articles on Computer Security and Insecurity
- ACPO Good Practice Guidelines for Computer Based Electronic Evidence
- Forensic Examination of Digital Evidence – A Guide for Law Enforcement
- Electronic Crime Scene Investigation – A Guide for First Responders
- Computer Forensics: An Approch to Evidence in Cyberspace
- A Ten Step Process to Forensic Rediness
- Forensics Plan Guide
- Digital Evidence Field Guide
- Mobile Forensics – A Guide
- Linux LEO – The Law Enforcement and Forensic Examiner’s Introduction to Linux
Pocket Checklists
These checklists, covering the critical risks associated with chosen topics, are intended as supplements to the work of audit, risk management and IT security professionals.
- Routers – 10 Important Risks -This paper will extend your knowledge about router risks and controls – it will be most useful to auditors that specialise in technology.
- Top 13 Project Risks – It turns out that thirteen is unlucky for projects too! Consult this list of frequently occurring risk issues to manage them before they manage you.
- 12 Top Contract Risks – This guide contains a lot of information about key contract risks.
- Inventions and Ideas – Many organisations have to protect or patent their intellectual property – this guide helps focus on risks in this area
- eCommerce Project Risk – Of course we are all going electronic, but eCommerce projects open up a new area of risks that need to be controlled in order to have a successful outcome.
- Application Service Providers – We increasingly outsource our non-core business activities – but are we considering all of the risks?
Business Tools & Resources
- IS Modeler – Demonstration version of low cost Process Modelling Tool
- Public Domain Spreadsheet Templates – Including IT Risk, Balanced Scorecard, general Risk Analysis
Office
- IT Security Policy Templates – A wide range of free ITSEC templates from SANS
- Services guide to Windows XP
- VoIP Internet Telephony – Free or low cost encrypted telephone calls, conference calls and real time chat around the world – SKYPE
- Public Domain security software – A range of free security solutions for home users
Project Management
- Project Risk – A (customisable) template for evaluating project risk – created by MindGrove v5.0 2011 requires MS Word 2007 or later.
Managing, Microsoft, Cisco and IBM Environments
- Microsoft Online Microsoft Security Guidance – select link according to product or interest
- Windows 2003 Server Security Guide – quicklink to Server 2003
- Best practice: Windows Encrypting File System – quicklink to EFS
- Cisco Online – Cisco searchable links – choose ‘security’ keyword under Option 1 to find guides and documentation