Tools and aids
If you find a broken link, please help us and others by sending us an email to let us know which link is broken. We check links regularly, but many of the links on this page are to external web sites and we have no control over changes made to them.
TECHNICAL GUIDES and REFERENCES
Wonder what that technical acronym means? You'll find it here!
Understanding how to create more
complex queries and import the results into Excel.
This substantial paper is intended for those that wish to find out more about wireless, bluetooth, PDA and storage card security and control.Learn more about the risks associated with these technologies and use our free 24 point checklist to help reduce your exposure to these risks.
FOOD for THOUGHT
A TED lecture by Bruce Schneier - author of "Secrets and Lies". Why the feeling of security and reality do not always match.
A TED lecture by James Lyne who reminds us that it's not only the NSA that's watching us, but ever-more-sophisticated cybercriminals, who exploit both weak code and trusting human nature.
Raffaello D'Andrea demos his flying quadcopters: robots that think like athletes, solving physical problems with algorithms that help them learn.
William Black is a former bank regulator who’s seen firsthand how banking systems can be used to commit fraud — and how tricky tactics led to the 2008 US banking crisis that threatened the international economy. In this engaging talk, Black, now an academic, reveals the best way to rob a bank — from the inside.
This paper will extend your knowledge about router risks and controls – it will be most useful to auditors that specialise in technology.
It turns out that thirteen is unlucky for projects too! Consult this list of frequently occurring risk issues to manage them before they manage you.
This guide contains a lot of information about key contract risks.
Many organisations have to protect or patent their intellectual property – this guide helps focus on risks in this area
Of course we are all going electronic, but eCommerce projects open up a new area of risks that need to be controlled in order to have a successful outcome.
We increasingly outsource our non-core business activities – but are we considering all of the risks?
AUDIT & SECURITY TOOLS & FORENSIC UTILITIES
Good and comprehensive inventory tool
Download (free) best practice benchmarks for operating systems, networks, applications and more.
A free and useful network lookup tool
that includes finding an IP address from a hostname, or
vice-versa, traceroute, dig, email header analysis and more
From Microsoft Security
Site that enables you to determine which hosting software is being run on that website
Site that rates and describes the best network security tools - many are freeware
Tools to Recover Passwords
Look-up processes that you see displayed in task manager and find out more about them
The Elder Geek - a huge searchable inventory of Windows knowledge
A useful repository of knowledge about common UNIX processes and programs
One of the best low cost forensic utilities for disk analysis
Free reporting tool DumpSec (formerly known as DumpAcl) to create customisable audit reports from Windows systems
PENETRATION TEST RESOURCES
BUSINESS TOOLS AND RESOURCES
A wide range of free ITSEC templates from SANS
Free or low cost encrypted telephone calls, conference calls and real time chat around the world – SKYPE
A range of free security solutions for home users
A (customisable) template for evaluating project risk – created by MindGrove v5.0 2011 requires MS Word 2007 or later.
CONTROLLING MICROSOFT, CISCO and IBM ENVIRONMENTS
Windows 2003 Server Security Guide - quicklink to Server 2003
|Call us on +44 (0) 1925 730 200||Site map Contact us|
|© 2015 Mindgrove Ltd. All rights reserved|