Domain

IT Operations Knowledge – Page 55

Virtualization and Security

This presentation provides an introduction to virtualization, virtualization architecture, key risks with virtualization, specific audit concerns and recommendations for evaluation of a virtualized environment.

Introduction to Common Criteria Scheme (CCS)

This presentation introduces the Common Criteria Evaluation and Certification Scheme, or CCS – an independent evaluation and certification service for measuring the security assurance and functionality claims of Information and Communications Technology (ICT) products and systems. What is it? Why is it important to you?

Introduction to Cyber Forensics

This presentation provides an overview of cyber forensics – what is forensics? what is cyber forensics? who uses cyber forensics? what are the skills needed for cyber forensics?

Cloud Computing for Healthcare Organizations

This paper explores the silver lining in the cloud revolution – it explains some of the key considerations for using cloud computing services in healthcare organizations (HCOs), hospitals, and integrated delivery networks.

Security Risk Assessment

This paper discusses security risk analysis – what is security risk analysis? why perform a security risk assessment? how to conduct a security risk assessment? when to perform a security risk analysis?

How Does Visa Secure its Payment System?

This presentation paints a picture of the emerging threats to the worldwide payment processing systems and discusses how a major payment processor – Visa – works to keep its payment network secure from increasingly sophisticated attacks.

CIO Portal