SlideShare a Scribd company logo
source:http://antihacking.blogspot.com/2012/09/table-of-contents.html ,
http://antihacking.blogspot.com/2012/09/table-of-contents.html
More: Hola soy James Jara, cualquier pregunta envieme un correo al jamesjara@gmail.com

Table of Contents




                         muchas gracias por leer este articulo, @jamesjara | September 29, 2012 | 1/3
Table of Contents
Step by Step Guide 3
   Create a network and system administration policy 3
   Create a Map/Vision of the IT architecture of the company 3
   Execute and testing phase for each IT element of the company 3
Creating a Network and System Admin Police 4
   What is a network and system admin police? 4
   Distribution method and public version? 4
Creating a antihacking.blogspot.com Map/Vision of the IT architecture of the company 5
   Describe all IT elements , with all information possible. 5
   Secure each IT element. 5
   Security through obscurity 5
             Hardening SO system 5
             Hardening Services 5
   Securing Linux 6
   Updates, patch and upgrades 6
   Monitoring and logging services 6
   IDS services 6
   Disaster recovery policy 6
   Backup policy 6
source:http://antihacking.blogspot.com/2012/09/table-of-contents.html ,
http://antihacking.blogspot.com/2012/09/table-of-contents.html
More: muchas gracias por leer este articulo, @jamesjara
   source:http://antihacking.blogspot.com/2012/09/security-methodology.html ,
http://antihacking.blogspot.com/2012/09/security-methodology.html
 More: Hola soy James Jara, cualquier pregunta envieme un correo al jamesjara@gmail.com




                         muchas gracias por leer este articulo, @jamesjara | September 29, 2012 | 2/3
Security Methodology

                                Security Methodology
                                           How to Secure an Company
                                                by JamesJara.com
source:http://antihacking.blogspot.com/2012/09/security-methodology.html ,
http://antihacking.blogspot.com/2012/09/security-methodology.html
More: muchas gracias por leer este articulo, @jamesjara




                         muchas gracias por leer este articulo, @jamesjara | September 29, 2012 | 3/3

More Related Content

Viewers also liked

Antihackingblogspotcom
AntihackingblogspotcomAntihackingblogspotcom
Antihackingblogspotcom
James Jara
 
James Jara Portfolio 2014 - Cloud Operating System Voip -Part 2
James Jara Portfolio 2014  - Cloud Operating System Voip -Part 2James Jara Portfolio 2014  - Cloud Operating System Voip -Part 2
James Jara Portfolio 2014 - Cloud Operating System Voip -Part 2
James Jara
 
James Jara Portfolio 2014 - Enterprise datagrid - Part 3
James Jara Portfolio 2014  - Enterprise datagrid - Part 3James Jara Portfolio 2014  - Enterprise datagrid - Part 3
James Jara Portfolio 2014 - Enterprise datagrid - Part 3
James Jara
 
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara
 
Unlimited marine clean energy
Unlimited  marine clean energyUnlimited  marine clean energy
Unlimited marine clean energy
James Jara
 
Examen de matematica costa rica mep
Examen de matematica costa rica mepExamen de matematica costa rica mep
Examen de matematica costa rica mep
James Jara
 
Examen mate 00 2014 diversificada
Examen mate 00 2014 diversificadaExamen mate 00 2014 diversificada
Examen mate 00 2014 diversificada
MCMurray
 
Probabilidad estadistica ii guia
Probabilidad estadistica ii guiaProbabilidad estadistica ii guia
Probabilidad estadistica ii guia
iosef kara
 
Contenidos de Estadística en el Bachillerato
Contenidos de Estadística en el BachilleratoContenidos de Estadística en el Bachillerato
Contenidos de Estadística en el Bachillerato
Joan Fernando Chipia Lobo
 
Examen bachillerato diurno la nación 2015
Examen bachillerato diurno la nación 2015Examen bachillerato diurno la nación 2015
Examen bachillerato diurno la nación 2015
MCMurray
 
Examen mate 01 2013 unificado
Examen mate 01 2013 unificadoExamen mate 01 2013 unificado
Examen mate 01 2013 unificado
MCMurray
 
Examen de matematica costa rica
Examen de matematica costa ricaExamen de matematica costa rica
Examen de matematica costa rica
James Jara
 
Examen de matematica costa rica mep
Examen de matematica costa rica mepExamen de matematica costa rica mep
Examen de matematica costa rica mep
James Jara
 
Problemas resueltos de geometria analitica plana
Problemas resueltos de geometria analitica planaProblemas resueltos de geometria analitica plana
Problemas resueltos de geometria analitica plana
Carlos Chaparro
 
Practicas de geometria analitica
Practicas de geometria analiticaPracticas de geometria analitica
Practicas de geometria analitica
Saul Duque
 

Viewers also liked (15)

Antihackingblogspotcom
AntihackingblogspotcomAntihackingblogspotcom
Antihackingblogspotcom
 
James Jara Portfolio 2014 - Cloud Operating System Voip -Part 2
James Jara Portfolio 2014  - Cloud Operating System Voip -Part 2James Jara Portfolio 2014  - Cloud Operating System Voip -Part 2
James Jara Portfolio 2014 - Cloud Operating System Voip -Part 2
 
James Jara Portfolio 2014 - Enterprise datagrid - Part 3
James Jara Portfolio 2014  - Enterprise datagrid - Part 3James Jara Portfolio 2014  - Enterprise datagrid - Part 3
James Jara Portfolio 2014 - Enterprise datagrid - Part 3
 
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
 
Unlimited marine clean energy
Unlimited  marine clean energyUnlimited  marine clean energy
Unlimited marine clean energy
 
Examen de matematica costa rica mep
Examen de matematica costa rica mepExamen de matematica costa rica mep
Examen de matematica costa rica mep
 
Examen mate 00 2014 diversificada
Examen mate 00 2014 diversificadaExamen mate 00 2014 diversificada
Examen mate 00 2014 diversificada
 
Probabilidad estadistica ii guia
Probabilidad estadistica ii guiaProbabilidad estadistica ii guia
Probabilidad estadistica ii guia
 
Contenidos de Estadística en el Bachillerato
Contenidos de Estadística en el BachilleratoContenidos de Estadística en el Bachillerato
Contenidos de Estadística en el Bachillerato
 
Examen bachillerato diurno la nación 2015
Examen bachillerato diurno la nación 2015Examen bachillerato diurno la nación 2015
Examen bachillerato diurno la nación 2015
 
Examen mate 01 2013 unificado
Examen mate 01 2013 unificadoExamen mate 01 2013 unificado
Examen mate 01 2013 unificado
 
Examen de matematica costa rica
Examen de matematica costa ricaExamen de matematica costa rica
Examen de matematica costa rica
 
Examen de matematica costa rica mep
Examen de matematica costa rica mepExamen de matematica costa rica mep
Examen de matematica costa rica mep
 
Problemas resueltos de geometria analitica plana
Problemas resueltos de geometria analitica planaProblemas resueltos de geometria analitica plana
Problemas resueltos de geometria analitica plana
 
Practicas de geometria analitica
Practicas de geometria analiticaPracticas de geometria analitica
Practicas de geometria analitica
 

Similar to Antihackingblogspotcom

Webquest
Webquest Webquest
Webquest
LS76
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
Kimberley Dray
 
How to setup HDP Sandbox on Windows PC
How to setup HDP Sandbox on Windows PCHow to setup HDP Sandbox on Windows PC
How to setup HDP Sandbox on Windows PC
DataShark Academy
 
BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?
BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?
BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?
ThreatReel Podcast
 
Privacy
PrivacyPrivacy
Lost in o auth? learn velruse and get your life back
Lost in o auth? learn velruse and get your life backLost in o auth? learn velruse and get your life back
Lost in o auth? learn velruse and get your life back
Andrew Mleczko
 
VOCI Final Presentation
VOCI Final PresentationVOCI Final Presentation
VOCI Final Presentation
Elisabeth Brooks
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
PiedadCES
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
JohnSimLabayan2
 
5 BS Facts About Data Privacy Everyone Thinks Are True
5 BS Facts About Data Privacy Everyone Thinks Are True5 BS Facts About Data Privacy Everyone Thinks Are True
5 BS Facts About Data Privacy Everyone Thinks Are True
Social Media Today
 
I can be apple and so can you
I can be apple and so can youI can be apple and so can you
I can be apple and so can you
Shakacon
 
Migrations are Messy | Digital Summit Washington, DC
Migrations are Messy | Digital Summit Washington, DCMigrations are Messy | Digital Summit Washington, DC
Migrations are Messy | Digital Summit Washington, DC
Atigro
 
Configurable Password Management: Balancing Usability and Compliance
Configurable Password Management: Balancing Usability and ComplianceConfigurable Password Management: Balancing Usability and Compliance
Configurable Password Management: Balancing Usability and Compliance
PortalGuard
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
IIIT Hyderabad
 
Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...
Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...
Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...
Jason Hong
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents
Rajesh Soundararajan
 
Responsive Images and Video
Responsive Images and VideoResponsive Images and Video
Responsive Images and Video
Jason Grigsby
 
Webcast july6ipccp6informationtechnology
Webcast july6ipccp6informationtechnologyWebcast july6ipccp6informationtechnology
Webcast july6ipccp6informationtechnology
PSPCL
 
Social Media Converse Connect Collaborate Learn
Social Media Converse Connect Collaborate LearnSocial Media Converse Connect Collaborate Learn
Social Media Converse Connect Collaborate Learn
Anne Adrian
 
7Th Grade Essay Guidelines. Online assignment writing service.
7Th Grade Essay Guidelines. Online assignment writing service.7Th Grade Essay Guidelines. Online assignment writing service.
7Th Grade Essay Guidelines. Online assignment writing service.
Joanna Gardner
 

Similar to Antihackingblogspotcom (20)

Webquest
Webquest Webquest
Webquest
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
 
How to setup HDP Sandbox on Windows PC
How to setup HDP Sandbox on Windows PCHow to setup HDP Sandbox on Windows PC
How to setup HDP Sandbox on Windows PC
 
BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?
BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?
BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?
 
Privacy
PrivacyPrivacy
Privacy
 
Lost in o auth? learn velruse and get your life back
Lost in o auth? learn velruse and get your life backLost in o auth? learn velruse and get your life back
Lost in o auth? learn velruse and get your life back
 
VOCI Final Presentation
VOCI Final PresentationVOCI Final Presentation
VOCI Final Presentation
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
 
5 BS Facts About Data Privacy Everyone Thinks Are True
5 BS Facts About Data Privacy Everyone Thinks Are True5 BS Facts About Data Privacy Everyone Thinks Are True
5 BS Facts About Data Privacy Everyone Thinks Are True
 
I can be apple and so can you
I can be apple and so can youI can be apple and so can you
I can be apple and so can you
 
Migrations are Messy | Digital Summit Washington, DC
Migrations are Messy | Digital Summit Washington, DCMigrations are Messy | Digital Summit Washington, DC
Migrations are Messy | Digital Summit Washington, DC
 
Configurable Password Management: Balancing Usability and Compliance
Configurable Password Management: Balancing Usability and ComplianceConfigurable Password Management: Balancing Usability and Compliance
Configurable Password Management: Balancing Usability and Compliance
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
 
Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...
Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...
Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents
 
Responsive Images and Video
Responsive Images and VideoResponsive Images and Video
Responsive Images and Video
 
Webcast july6ipccp6informationtechnology
Webcast july6ipccp6informationtechnologyWebcast july6ipccp6informationtechnology
Webcast july6ipccp6informationtechnology
 
Social Media Converse Connect Collaborate Learn
Social Media Converse Connect Collaborate LearnSocial Media Converse Connect Collaborate Learn
Social Media Converse Connect Collaborate Learn
 
7Th Grade Essay Guidelines. Online assignment writing service.
7Th Grade Essay Guidelines. Online assignment writing service.7Th Grade Essay Guidelines. Online assignment writing service.
7Th Grade Essay Guidelines. Online assignment writing service.
 

More from James Jara

Hack.lu 2016
Hack.lu 2016   Hack.lu 2016
Hack.lu 2016
James Jara
 
Portafolio
PortafolioPortafolio
Portafolio
James Jara
 
Ver rmbv en_linux_centos
Ver rmbv en_linux_centosVer rmbv en_linux_centos
Ver rmbv en_linux_centos
James Jara
 
Ver logs de_apache_en_linux
Ver logs de_apache_en_linuxVer logs de_apache_en_linux
Ver logs de_apache_en_linux
James Jara
 
Unzip un archivo
Unzip un archivoUnzip un archivo
Unzip un archivo
James Jara
 
Ultima linea ejecutada_en_terminal_linux
Ultima linea ejecutada_en_terminal_linuxUltima linea ejecutada_en_terminal_linux
Ultima linea ejecutada_en_terminal_linux
James Jara
 
Tar file linux
Tar file linuxTar file linux
Tar file linux
James Jara
 
Which configuration file_is_used_by_your_php
Which configuration file_is_used_by_your_phpWhich configuration file_is_used_by_your_php
Which configuration file_is_used_by_your_php
James Jara
 
Which configuration file is used by your php
Which configuration file is used by your phpWhich configuration file is used by your php
Which configuration file is used by your php
James Jara
 
Ver rmbv en_linux_centos
Ver rmbv en_linux_centosVer rmbv en_linux_centos
Ver rmbv en_linux_centos
James Jara
 
Ver logs de_apache_en_linux
Ver logs de_apache_en_linuxVer logs de_apache_en_linux
Ver logs de_apache_en_linux
James Jara
 
Ultima linea ejecutada_en_terminal_linux
Ultima linea ejecutada_en_terminal_linuxUltima linea ejecutada_en_terminal_linux
Ultima linea ejecutada_en_terminal_linux
James Jara
 
Permisos archivo chmod linux
Permisos archivo chmod linuxPermisos archivo chmod linux
Permisos archivo chmod linux
James Jara
 
Matar un proceso_linux__kill_linux_process
Matar un proceso_linux__kill_linux_processMatar un proceso_linux__kill_linux_process
Matar un proceso_linux__kill_linux_process
James Jara
 
Listar servicios conectado_a_la_red
Listar servicios conectado_a_la_redListar servicios conectado_a_la_red
Listar servicios conectado_a_la_red
James Jara
 
Listar rpm installados_linux
Listar rpm installados_linuxListar rpm installados_linux
Listar rpm installados_linux
James Jara
 
Listar archivo con_detalle_linux
Listar archivo con_detalle_linuxListar archivo con_detalle_linux
Listar archivo con_detalle_linux
James Jara
 
Installing hadoophivederby on_centos
Installing hadoophivederby on_centosInstalling hadoophivederby on_centos
Installing hadoophivederby on_centos
James Jara
 
Installar un paquete_rpm_linux
Installar un paquete_rpm_linuxInstallar un paquete_rpm_linux
Installar un paquete_rpm_linux
James Jara
 
Installar rpm consola__install_rpm_consola
Installar rpm consola__install_rpm_consolaInstallar rpm consola__install_rpm_consola
Installar rpm consola__install_rpm_consola
James Jara
 

More from James Jara (20)

Hack.lu 2016
Hack.lu 2016   Hack.lu 2016
Hack.lu 2016
 
Portafolio
PortafolioPortafolio
Portafolio
 
Ver rmbv en_linux_centos
Ver rmbv en_linux_centosVer rmbv en_linux_centos
Ver rmbv en_linux_centos
 
Ver logs de_apache_en_linux
Ver logs de_apache_en_linuxVer logs de_apache_en_linux
Ver logs de_apache_en_linux
 
Unzip un archivo
Unzip un archivoUnzip un archivo
Unzip un archivo
 
Ultima linea ejecutada_en_terminal_linux
Ultima linea ejecutada_en_terminal_linuxUltima linea ejecutada_en_terminal_linux
Ultima linea ejecutada_en_terminal_linux
 
Tar file linux
Tar file linuxTar file linux
Tar file linux
 
Which configuration file_is_used_by_your_php
Which configuration file_is_used_by_your_phpWhich configuration file_is_used_by_your_php
Which configuration file_is_used_by_your_php
 
Which configuration file is used by your php
Which configuration file is used by your phpWhich configuration file is used by your php
Which configuration file is used by your php
 
Ver rmbv en_linux_centos
Ver rmbv en_linux_centosVer rmbv en_linux_centos
Ver rmbv en_linux_centos
 
Ver logs de_apache_en_linux
Ver logs de_apache_en_linuxVer logs de_apache_en_linux
Ver logs de_apache_en_linux
 
Ultima linea ejecutada_en_terminal_linux
Ultima linea ejecutada_en_terminal_linuxUltima linea ejecutada_en_terminal_linux
Ultima linea ejecutada_en_terminal_linux
 
Permisos archivo chmod linux
Permisos archivo chmod linuxPermisos archivo chmod linux
Permisos archivo chmod linux
 
Matar un proceso_linux__kill_linux_process
Matar un proceso_linux__kill_linux_processMatar un proceso_linux__kill_linux_process
Matar un proceso_linux__kill_linux_process
 
Listar servicios conectado_a_la_red
Listar servicios conectado_a_la_redListar servicios conectado_a_la_red
Listar servicios conectado_a_la_red
 
Listar rpm installados_linux
Listar rpm installados_linuxListar rpm installados_linux
Listar rpm installados_linux
 
Listar archivo con_detalle_linux
Listar archivo con_detalle_linuxListar archivo con_detalle_linux
Listar archivo con_detalle_linux
 
Installing hadoophivederby on_centos
Installing hadoophivederby on_centosInstalling hadoophivederby on_centos
Installing hadoophivederby on_centos
 
Installar un paquete_rpm_linux
Installar un paquete_rpm_linuxInstallar un paquete_rpm_linux
Installar un paquete_rpm_linux
 
Installar rpm consola__install_rpm_consola
Installar rpm consola__install_rpm_consolaInstallar rpm consola__install_rpm_consola
Installar rpm consola__install_rpm_consola
 

Antihackingblogspotcom

  • 1. source:http://antihacking.blogspot.com/2012/09/table-of-contents.html , http://antihacking.blogspot.com/2012/09/table-of-contents.html More: Hola soy James Jara, cualquier pregunta envieme un correo al jamesjara@gmail.com Table of Contents muchas gracias por leer este articulo, @jamesjara | September 29, 2012 | 1/3
  • 2. Table of Contents Step by Step Guide 3 Create a network and system administration policy 3 Create a Map/Vision of the IT architecture of the company 3 Execute and testing phase for each IT element of the company 3 Creating a Network and System Admin Police 4 What is a network and system admin police? 4 Distribution method and public version? 4 Creating a antihacking.blogspot.com Map/Vision of the IT architecture of the company 5 Describe all IT elements , with all information possible. 5 Secure each IT element. 5 Security through obscurity 5 Hardening SO system 5 Hardening Services 5 Securing Linux 6 Updates, patch and upgrades 6 Monitoring and logging services 6 IDS services 6 Disaster recovery policy 6 Backup policy 6 source:http://antihacking.blogspot.com/2012/09/table-of-contents.html , http://antihacking.blogspot.com/2012/09/table-of-contents.html More: muchas gracias por leer este articulo, @jamesjara source:http://antihacking.blogspot.com/2012/09/security-methodology.html , http://antihacking.blogspot.com/2012/09/security-methodology.html More: Hola soy James Jara, cualquier pregunta envieme un correo al jamesjara@gmail.com muchas gracias por leer este articulo, @jamesjara | September 29, 2012 | 2/3
  • 3. Security Methodology Security Methodology How to Secure an Company by JamesJara.com source:http://antihacking.blogspot.com/2012/09/security-methodology.html , http://antihacking.blogspot.com/2012/09/security-methodology.html More: muchas gracias por leer este articulo, @jamesjara muchas gracias por leer este articulo, @jamesjara | September 29, 2012 | 3/3