• R/O
  • HTTP
  • SSH
  • HTTPS

e-dokyumento: Commit

e-Dokyumento is an opensource Document Management System that stores, organizes, indexes, routes, and tracks electronic documents. It automates the basic office document workflow such as receiving, filing, routing, and approving of hard-printed documents through capturing (scanning), digitizing (OCR Reading), storing, tagging, and electronically routing and approving (e-signature) of documents.


Commit MetaInfo

Revisionb7cd0b3b6a98f1080c63e034b9caed1d89f1c2fc (tree)
Time2020-09-22 09:35:00
AuthorNelson Maligro <nelsonmaligro@gmai...>
CommiterNelson Maligro

Log Message

22 Sep 2020

Change Summary

Incremental Difference

--- a/controllers/index.js
+++ b/controllers/index.js
@@ -48,10 +48,12 @@ const watcher = chokidar.watch('file, dir, glob, or array', {
4848 });
4949
5050 var d = domain.create();
51-d.on('error', function(err) {
52- fs.appendFileSync('dirwatch.log',err.message + '\n' + err.stack + '\n');
53- throw err;
54-});
51+setTimeout (()=>{
52+
53+ d.on('error', function(err) {
54+ fs.appendFileSync('direrr.log',err.message + '\n' + err.stack + '\n');
55+ throw err;
56+ });
5557
5658 d.run(function() {
5759
@@ -292,3 +294,4 @@ d.run(function() {
292294
293295
294296 });
297+},1000);
Binary files /dev/null and b/docs/Install e-Dokyumento on Ubuntu Linux.docx differ
--- a/err.log
+++ b/err.log
@@ -1,665 +1,101 @@
1-monitoring is not defined
2-ReferenceError: monitoring is not defined
3- at D:\Projects\PN DocMS\controllers\login.js:97:15
4- at Array.forEach (<anonymous>)
5- at D:\Projects\PN DocMS\controllers\login.js:92:17
6- at FSReqCallback.oncomplete (fs.js:146:23)
7-ENOENT: no such file or directory, stat 'public/drive/n6b/CRA Checklist_Answers.docx'
8-Error: ENOENT: no such file or directory, stat 'public/drive/n6b/CRA Checklist_Answers.docx'
9- at Object.statSync (fs.js:915:3)
10- at D:\Projects\PN DocMS\controllers\dasmonitor.js:120:79
11- at Array.sort (<anonymous>)
12- at D:\Projects\PN DocMS\controllers\dasmonitor.js:119:17
13- at FSReqCallback.oncomplete (fs.js:146:23)
14-req.body.branch.toUpperCase is not a function
15-TypeError: req.body.branch.toUpperCase is not a function
16- at D:\Projects\PN DocMS\controllers\routeduty.js:171:29
17- at FSReqCallback.oncomplete (fs.js:146:23)
18-req.body.branch.tostring is not a function
19-TypeError: req.body.branch.tostring is not a function
20- at D:\Projects\PN DocMS\controllers\routeduty.js:171:29
21- at FSReqCallback.oncomplete (fs.js:146:23)
22-EISDIR: illegal operation on a directory, read
23-Error: EISDIR: illegal operation on a directory, read
24- at Object.readSync (fs.js:506:3)
25- at tryReadSync (fs.js:331:20)
26- at Object.readFileSync (fs.js:368:19)
27- at Object.exports.convDoctoPDF (D:\Projects\PN DocMS\controllers\dochandle.js:11:25)
28- at D:\Projects\PN DocMS\controllers\dasfileoperation.js:316:27
29- at D:\Projects\PN DocMS\controllers\dbhandle.js:198:5
30- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
31- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
32- at model.Query.Query._completeOne (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2074:12)
33- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2136:10)
34- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mquery\lib\utils.js:116:16)
35- at processImmediate (internal/timers.js:439:21)
36- at process.topLevelDomainCallback (domain.js:130:23)
37-EISDIR: illegal operation on a directory, read
38-Error: EISDIR: illegal operation on a directory, read
39- at Object.readSync (fs.js:506:3)
40- at tryReadSync (fs.js:331:20)
41- at Object.readFileSync (fs.js:368:19)
42- at Object.exports.convDoctoPDF (D:\Projects\PN DocMS\controllers\dochandle.js:11:25)
43- at D:\Projects\PN DocMS\controllers\dasfileoperation.js:298:27
44- at D:\Projects\PN DocMS\controllers\dbhandle.js:220:5
45- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
46- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
47- at model.Query.Query._completeOne (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2074:12)
48- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2136:10)
49- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mquery\lib\utils.js:116:16)
50- at processImmediate (internal/timers.js:439:21)
51- at process.topLevelDomainCallback (domain.js:130:23)
52-Cannot read property 'enclosure' of null
53-TypeError: Cannot read property 'enclosure' of null
54- at D:\Projects\PN DocMS\controllers\dastransact.js:85:21
55- at D:\Projects\PN DocMS\controllers\dbhandle.js:359:15
56- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
57- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
58- at model.Query.Query._completeOne (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2074:12)
59- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2136:10)
60- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mquery\lib\utils.js:116:16)
61- at processImmediate (internal/timers.js:439:21)
62- at process.topLevelDomainCallback (domain.js:130:23)
63-Cannot read property 'enclosure' of null
64-TypeError: Cannot read property 'enclosure' of null
65- at D:\Projects\PN DocMS\controllers\dastransact.js:84:21
66- at D:\Projects\PN DocMS\controllers\dbhandle.js:359:15
67- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
68- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
69- at model.Query.Query._completeOne (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2074:12)
70- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2136:10)
71- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mquery\lib\utils.js:116:16)
72- at processImmediate (internal/timers.js:439:21)
73- at process.topLevelDomainCallback (domain.js:130:23)
74-Cannot read property 'enclusure' of null
75-TypeError: Cannot read property 'enclusure' of null
76- at D:\Projects\PN DocMS\controllers\dastransact.js:84:25
77- at D:\Projects\PN DocMS\controllers\dbhandle.js:359:15
78- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
79- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
80- at model.Query.Query._completeOne (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2074:12)
81- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2136:10)
82- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mquery\lib\utils.js:116:16)
83- at processImmediate (internal/timers.js:439:21)
84- at process.topLevelDomainCallback (domain.js:130:23)
85-Cannot read property 'enclosure' of null
86-TypeError: Cannot read property 'enclosure' of null
87- at D:\Projects\PN DocMS\controllers\dastransact.js:84:25
88- at D:\Projects\PN DocMS\controllers\dbhandle.js:359:15
89- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
90- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
91- at model.Query.Query._completeOne (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2074:12)
92- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2136:10)
93- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mquery\lib\utils.js:116:16)
94- at processImmediate (internal/timers.js:439:21)
95- at process.topLevelDomainCallback (domain.js:130:23)
96-Cannot read property 'enclosure' of null
97-TypeError: Cannot read property 'enclosure' of null
98- at D:\Projects\PN DocMS\controllers\dastransact.js:84:25
99- at D:\Projects\PN DocMS\controllers\dbhandle.js:359:15
100- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
101- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
102- at model.Query.Query._completeOne (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2074:12)
103- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2136:10)
104- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mquery\lib\utils.js:116:16)
105- at processImmediate (internal/timers.js:439:21)
106- at process.topLevelDomainCallback (domain.js:130:23)
107-Cannot read property 'enclosure' of null
108-TypeError: Cannot read property 'enclosure' of null
109- at D:\Projects\PN DocMS\controllers\dastransact.js:84:25
110- at D:\Projects\PN DocMS\controllers\dbhandle.js:359:15
111- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
112- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
113- at model.Query.Query._completeOne (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2074:12)
114- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2136:10)
115- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mquery\lib\utils.js:116:16)
116- at processImmediate (internal/timers.js:439:21)
117- at process.topLevelDomainCallback (domain.js:130:23)
118-EISDIR: illegal operation on a directory, read
119-Error: EISDIR: illegal operation on a directory, read
120- at Object.readSync (fs.js:506:3)
121- at tryReadSync (fs.js:331:20)
122- at Object.readFileSync (fs.js:368:19)
123- at Object.exports.convDoctoPDF (D:\Projects\PN DocMS\controllers\dochandle.js:11:25)
124- at D:\Projects\PN DocMS\controllers\dasfileoperation.js:298:27
125- at D:\Projects\PN DocMS\controllers\dbhandle.js:220:5
126- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
127- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
128- at model.Query.Query._completeOne (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2074:12)
129- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2136:10)
130- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mquery\lib\utils.js:116:16)
131- at processImmediate (internal/timers.js:439:21)
132- at process.topLevelDomainCallback (domain.js:130:23)
133-consol is not defined
134-ReferenceError: consol is not defined
135- at D:\Projects\PN DocMS\controllers\dastransact.js:84:28
136- at D:\Projects\PN DocMS\controllers\dbhandle.js:359:15
137- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
138- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
139- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2869:28
140- at processTicksAndRejections (internal/process/task_queues.js:75:11)
141-branches is not defined
142-ReferenceError: branches is not defined
143- at Object.exports.routNoRefEncIncoming (D:\Projects\PN DocMS\controllers\routeduty.js:153:7)
144- at D:\Projects\PN DocMS\controllers\dasincoming.js:236:33
145- at D:\Projects\PN DocMS\controllers\monitoring.js:169:85
146- at D:\Projects\PN DocMS\controllers\dbhandle.js:220:5
147- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
148- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
149- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2869:28
150- at processTicksAndRejections (internal/process/task_queues.js:75:11)
151-Unexpected token 'catch'
152-D:\Projects\PN DocMS\controllers\routeduty.js:257
153- })catch((err)=>{});
154- ^^^^^
155-
156-SyntaxError: Unexpected token 'catch'
157- at Module._compile (internal/modules/cjs/loader.js:895:18)
158- at Object.Module._extensions..js (internal/modules/cjs/loader.js:995:10)
159- at Module.load (internal/modules/cjs/loader.js:815:32)
160- at Function.Module._load (internal/modules/cjs/loader.js:727:14)
161- at Module.require (internal/modules/cjs/loader.js:852:19)
162- at require (internal/modules/cjs/helpers.js:74:18)
163- at module.exports (D:\Projects\PN DocMS\controllers\dasroyalty.js:6:19)
164- at Domain.<anonymous> (D:\Projects\PN DocMS\index.js:44:8)
165- at Domain.run (domain.js:363:14)
166- at Timeout._onTimeout (D:\Projects\PN DocMS\index.js:24:5)
167- at listOnTimeout (internal/timers.js:531:17)
168- at processTimers (internal/timers.js:475:7)
169-Unexpected token 'catch'
170-D:\Projects\PN DocMS\controllers\routeduty.js:290
171- })catch((err)=>{});
172- ^^^^^
173-
174-SyntaxError: Unexpected token 'catch'
175- at Module._compile (internal/modules/cjs/loader.js:895:18)
176- at Object.Module._extensions..js (internal/modules/cjs/loader.js:995:10)
177- at Module.load (internal/modules/cjs/loader.js:815:32)
178- at Function.Module._load (internal/modules/cjs/loader.js:727:14)
179- at Module.require (internal/modules/cjs/loader.js:852:19)
180- at require (internal/modules/cjs/helpers.js:74:18)
181- at module.exports (D:\Projects\PN DocMS\controllers\dasroyalty.js:6:19)
182- at Domain.<anonymous> (D:\Projects\PN DocMS\index.js:44:8)
183- at Domain.run (domain.js:363:14)
184- at Timeout._onTimeout (D:\Projects\PN DocMS\index.js:24:5)
185- at listOnTimeout (internal/timers.js:531:17)
186- at processTimers (internal/timers.js:475:7)
187-Unexpected token ','
188-D:\Projects\PN DocMS\controllers\routeduty.js:57
189- else dbhandle.docEdit (res.id,req.body.newfile, dst + req.body.fileroute, , res.category, res.author, res.projects, res.deyt, res.size, res.content, routslipTemp, res.reference, res.enclosure, newComm);
190- ^
191-
192-SyntaxError: Unexpected token ','
193- at Module._compile (internal/modules/cjs/loader.js:895:18)
194- at Object.Module._extensions..js (internal/modules/cjs/loader.js:995:10)
195- at Module.load (internal/modules/cjs/loader.js:815:32)
196- at Function.Module._load (internal/modules/cjs/loader.js:727:14)
197- at Module.require (internal/modules/cjs/loader.js:852:19)
198- at require (internal/modules/cjs/helpers.js:74:18)
199- at module.exports (D:\Projects\PN DocMS\controllers\dasroyalty.js:6:19)
200- at Domain.<anonymous> (D:\Projects\PN DocMS\index.js:44:8)
201- at Domain.run (domain.js:363:14)
202- at Timeout._onTimeout (D:\Projects\PN DocMS\index.js:24:5)
203- at listOnTimeout (internal/timers.js:531:17)
204- at processTimers (internal/timers.js:475:7)
205-The "dest" argument must be one of type string, Buffer, or URL. Received type number
206-TypeError [ERR_INVALID_ARG_TYPE]: The "dest" argument must be one of type string, Buffer, or URL. Received type number
207- at Object.copyFile (fs.js:1769:10)
208- at D:\Projects\PN DocMS\controllers\routeduty.js:183:16
209- at Array.forEach (<anonymous>)
210- at Object.exports.routNoRefEncIncoming (D:\Projects\PN DocMS\controllers\routeduty.js:178:16)
211- at D:\Projects\PN DocMS\controllers\dasincoming.js:220:33
212- at D:\Projects\PN DocMS\controllers\monitoring.js:170:85
213- at D:\Projects\PN DocMS\controllers\dbhandle.js:220:5
214- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
215- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
216- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2869:28
217- at processTicksAndRejections (internal/process/task_queues.js:75:11)
218-dataString.match is not a function
219-TypeError: dataString.match is not a function
220- at decodeBase64Image (D:\Projects\PN DocMS\controllers\dasroyalty.js:62:30)
221- at D:\Projects\PN DocMS\controllers\dasroyalty.js:133:36
222- at FSReqCallback.readFileAfterClose [as oncomplete] (internal/fs/read_file_context.js:61:3)
223-data.split is not a function
224-TypeError: data.split is not a function
225- at D:\Projects\PN DocMS\controllers\dasroyalty.js:126:41
226- at FSReqCallback.readFileAfterClose [as oncomplete] (internal/fs/read_file_context.js:61:3)
227-data.replace is not a function
228-TypeError: data.replace is not a function
229- at D:\Projects\PN DocMS\controllers\dasroyalty.js:126:37
230- at FSReqCallback.readFileAfterClose [as oncomplete] (internal/fs/read_file_context.js:61:3)
231-decodedImg is not defined
232-ReferenceError: decodedImg is not defined
233- at D:\Projects\PN DocMS\controllers\dasroyalty.js:128:77
234- at FSReqCallback.readFileAfterClose [as oncomplete] (internal/fs/read_file_context.js:61:3)
235-Cannot read property 'comment' of null
236-TypeError: Cannot read property 'comment' of null
237- at D:\Projects\PN DocMS\controllers\routeduty.js:56:18
238- at Array.forEach (<anonymous>)
239- at D:\Projects\PN DocMS\controllers\routeduty.js:54:20
240- at D:\Projects\PN DocMS\controllers\dbhandle.js:370:15
241- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
242- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
243- at model.Query.Query._completeOne (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2074:12)
244- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2136:10)
245- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mquery\lib\utils.js:116:16)
246- at processImmediate (internal/timers.js:439:21)
247- at process.topLevelDomainCallback (domain.js:130:23)
248-ENOENT: no such file or directory, copyfile 'D:\NOC DF.pdf.sam.pdf' -> 'D:\Projects\PN DocMS\public\drive\PDF-temp\NOC DF.pdf.sam.pdf'
249-Error: ENOENT: no such file or directory, copyfile 'D:\NOC DF.pdf.sam.pdf' -> 'D:\Projects\PN DocMS\public\drive\PDF-temp\NOC DF.pdf.sam.pdf'
250-ENOENT: no such file or directory, copyfile 'D:\NOC DF.pdf.sam.pdf' -> 'D:\Projects\PN DocMS\public\drive\PDF-temp\NOC DF.pdf.sam.pdf'
251-Error: ENOENT: no such file or directory, copyfile 'D:\NOC DF.pdf.sam.pdf' -> 'D:\Projects\PN DocMS\public\drive\PDF-temp\NOC DF.pdf.sam.pdf'
252-ENOENT: no such file or directory, copyfile 'D:\NOC DF.pdf.sam.pdf.sam.pdf' -> 'D:\Projects\PN DocMS\public\drive\PDF-temp\NOC DF.pdf.sam.pdf.sam.pdf'
253-Error: ENOENT: no such file or directory, copyfile 'D:\NOC DF.pdf.sam.pdf.sam.pdf' -> 'D:\Projects\PN DocMS\public\drive\PDF-temp\NOC DF.pdf.sam.pdf.sam.pdf'
254-ENOENT: no such file or directory, copyfile 'D:\NOC DF.pdf.sam.pdf.sam.pdf.sam.pdf' -> 'D:\Projects\PN DocMS\public\drive\PDF-temp\NOC DF.pdf.sam.pdf.sam.pdf.sam.pdf'
255-Error: ENOENT: no such file or directory, copyfile 'D:\NOC DF.pdf.sam.pdf.sam.pdf.sam.pdf' -> 'D:\Projects\PN DocMS\public\drive\PDF-temp\NOC DF.pdf.sam.pdf.sam.pdf.sam.pdf'
256-Unexpected token _ in JSON at position 4
257-SyntaxError: Unexpected token _ in JSON at position 4
258- at JSON.parse (<anonymous>)
259- at D:\Projects\PN DocMS\controllers\dasincoming.js:73:30
260- at D:\Projects\PN DocMS\controllers\dbhandle.js:651:7
261- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
262- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
263- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2869:28
264- at processTicksAndRejections (internal/process/task_queues.js:75:11)
265-Cannot read property 'tostring' of undefined
266-TypeError: Cannot read property 'tostring' of undefined
267- at D:\Projects\PN DocMS\controllers\dasincoming.js:73:36
268- at D:\Projects\PN DocMS\controllers\dbhandle.js:651:7
269- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
270- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
271- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2869:28
272- at processTicksAndRejections (internal/process/task_queues.js:75:11)
273-Cannot read property 'toString' of undefined
274-TypeError: Cannot read property 'toString' of undefined
275- at D:\Projects\PN DocMS\controllers\dasincoming.js:73:36
276- at D:\Projects\PN DocMS\controllers\dbhandle.js:651:7
277- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
278- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
279- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2869:28
280- at processTicksAndRejections (internal/process/task_queues.js:75:11)
281-Cannot read property 'tostring' of undefined
282-TypeError: Cannot read property 'tostring' of undefined
283- at D:\Projects\PN DocMS\controllers\dasincoming.js:73:36
284- at D:\Projects\PN DocMS\controllers\dbhandle.js:651:7
285- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
286- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
287- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2869:28
288- at processTicksAndRejections (internal/process/task_queues.js:75:11)
289-directory is not defined
290-ReferenceError: directory is not defined
291- at D:\Projects\PN DocMS\controllers\dassysadmin.js:222:24
292- at D:\Projects\PN DocMS\controllers\dbhandle.js:515:7
293- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
294- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
295- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2869:28
296- at processTicksAndRejections (internal/process/task_queues.js:75:11)
297-activitylogsModel.findMany is not a function
298-TypeError: activitylogsModel.findMany is not a function
299- at Object.exports.actlogFindAction (D:\Projects\PN DocMS\controllers\dbhandle.js:175:21)
300- at D:\Projects\PN DocMS\controllers\dassysadmin.js:113:22
301- at D:\Projects\PN DocMS\controllers\dbhandle.js:523:7
302- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
303- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
304- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2869:28
305- at processTicksAndRejections (internal/process/task_queues.js:75:11)
306-Cannot set headers after they are sent to the client
307-Error [ERR_HTTP_HEADERS_SENT]: Cannot set headers after they are sent to the client
308- at ServerResponse.setHeader (_http_outgoing.js:485:11)
309- at ServerResponse.header (D:\Projects\PN DocMS\node_modules\express\lib\response.js:771:10)
310- at ServerResponse.location (D:\Projects\PN DocMS\node_modules\express\lib\response.js:888:15)
311- at ServerResponse.redirect (D:\Projects\PN DocMS\node_modules\express\lib\response.js:926:18)
312- at D:\Projects\PN DocMS\controllers\dasincoming.js:117:27
313- at D:\Projects\PN DocMS\controllers\dbhandle.js:524:7
314- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
315- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
316- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2869:28
317- at processTicksAndRejections (internal/process/task_queues.js:75:11)
318-Cannot set headers after they are sent to the client
319-Error [ERR_HTTP_HEADERS_SENT]: Cannot set headers after they are sent to the client
320- at ServerResponse.setHeader (_http_outgoing.js:485:11)
321- at ServerResponse.header (D:\Projects\PN DocMS\node_modules\express\lib\response.js:771:10)
322- at ServerResponse.location (D:\Projects\PN DocMS\node_modules\express\lib\response.js:888:15)
323- at ServerResponse.redirect (D:\Projects\PN DocMS\node_modules\express\lib\response.js:926:18)
324- at D:\Projects\PN DocMS\controllers\dasincoming.js:117:27
325- at D:\Projects\PN DocMS\controllers\dbhandle.js:524:7
326- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
327- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
328- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2869:28
329- at processTicksAndRejections (internal/process/task_queues.js:75:11)
330-Cannot set headers after they are sent to the client
331-Error [ERR_HTTP_HEADERS_SENT]: Cannot set headers after they are sent to the client
332- at ServerResponse.setHeader (_http_outgoing.js:485:11)
333- at ServerResponse.header (D:\Projects\PN DocMS\node_modules\express\lib\response.js:771:10)
334- at ServerResponse.location (D:\Projects\PN DocMS\node_modules\express\lib\response.js:888:15)
335- at ServerResponse.redirect (D:\Projects\PN DocMS\node_modules\express\lib\response.js:926:18)
336- at D:\Projects\PN DocMS\controllers\dasincoming.js:117:27
337- at D:\Projects\PN DocMS\controllers\dbhandle.js:524:7
338- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
339- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
340- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2869:28
341- at processTicksAndRejections (internal/process/task_queues.js:75:11)
342-Cannot set headers after they are sent to the client
343-Error [ERR_HTTP_HEADERS_SENT]: Cannot set headers after they are sent to the client
344- at ServerResponse.setHeader (_http_outgoing.js:485:11)
345- at ServerResponse.header (D:\Projects\PN DocMS\node_modules\express\lib\response.js:771:10)
346- at ServerResponse.location (D:\Projects\PN DocMS\node_modules\express\lib\response.js:888:15)
347- at ServerResponse.redirect (D:\Projects\PN DocMS\node_modules\express\lib\response.js:926:18)
348- at D:\Projects\PN DocMS\controllers\dasincoming.js:117:27
349- at D:\Projects\PN DocMS\controllers\dbhandle.js:524:7
350- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
351- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
352- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2869:28
353- at processTicksAndRejections (internal/process/task_queues.js:75:11)
354-Cannot set headers after they are sent to the client
355-Error [ERR_HTTP_HEADERS_SENT]: Cannot set headers after they are sent to the client
356- at ServerResponse.setHeader (_http_outgoing.js:485:11)
357- at ServerResponse.header (D:\Projects\PN DocMS\node_modules\express\lib\response.js:771:10)
358- at ServerResponse.location (D:\Projects\PN DocMS\node_modules\express\lib\response.js:888:15)
359- at ServerResponse.redirect (D:\Projects\PN DocMS\node_modules\express\lib\response.js:926:18)
360- at D:\Projects\PN DocMS\controllers\dasincoming.js:117:27
361- at D:\Projects\PN DocMS\controllers\dbhandle.js:524:7
362- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
363- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
364- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2869:28
365- at processTicksAndRejections (internal/process/task_queues.js:75:11)
366-Cannot set headers after they are sent to the client
367-Error [ERR_HTTP_HEADERS_SENT]: Cannot set headers after they are sent to the client
368- at ServerResponse.setHeader (_http_outgoing.js:485:11)
369- at ServerResponse.header (D:\Projects\PN DocMS\node_modules\express\lib\response.js:771:10)
370- at ServerResponse.location (D:\Projects\PN DocMS\node_modules\express\lib\response.js:888:15)
371- at ServerResponse.redirect (D:\Projects\PN DocMS\node_modules\express\lib\response.js:926:18)
372- at D:\Projects\PN DocMS\controllers\dasincoming.js:117:27
373- at D:\Projects\PN DocMS\controllers\dbhandle.js:524:7
374- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
375- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
376- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2869:28
377- at processTicksAndRejections (internal/process/task_queues.js:75:11)
1+Cannot read property 'fileroute' of undefined
2+TypeError: Cannot read property 'fileroute' of undefined
3+ at dbhandle.monitorFindFile (/edokyu/controllers/dasincoming.js:266:59)
4+ at /edokyu/controllers/dbhandle.js:220:5
5+ at /edokyu/node_modules/mongoose/lib/model.js:4827:16
6+ at /edokyu/node_modules/mongoose/lib/query.js:4390:12
7+ at process.nextTick (/edokyu/node_modules/mongoose/lib/query.js:2869:28)
8+ at process._tickCallback (internal/process/next_tick.js:61:11)
9+SON is not defined
10+ReferenceError: SON is not defined
11+ at /edokyu/controllers/dasincoming.js:164:35
12+ at /edokyu/controllers/monitoring.js:171:14
13+ at /edokyu/controllers/dbhandle.js:220:5
14+ at /edokyu/node_modules/mongoose/lib/model.js:4827:16
15+ at /edokyu/node_modules/mongoose/lib/query.js:4390:12
16+ at process.nextTick (/edokyu/node_modules/mongoose/lib/query.js:2869:28)
17+ at process._tickCallback (internal/process/next_tick.js:61:11)
18+sorArr is not defined
19+ReferenceError: sorArr is not defined
20+ at /edokyu/controllers/dasincoming.js:157:29
21+ at FSReqWrap.args [as oncomplete] (fs.js:140:20)
22+sortArr.asyncForEach is not a function
23+TypeError: sortArr.asyncForEach is not a function
24+ at /edokyu/controllers/dasincoming.js:159:25
25+ at FSReqWrap.args [as oncomplete] (fs.js:140:20)
37826 Cannot set headers after they are sent to the client
37927 Error [ERR_HTTP_HEADERS_SENT]: Cannot set headers after they are sent to the client
380- at ServerResponse.setHeader (_http_outgoing.js:485:11)
381- at ServerResponse.header (D:\Projects\PN DocMS\node_modules\express\lib\response.js:771:10)
382- at ServerResponse.location (D:\Projects\PN DocMS\node_modules\express\lib\response.js:888:15)
383- at ServerResponse.redirect (D:\Projects\PN DocMS\node_modules\express\lib\response.js:926:18)
384- at D:\Projects\PN DocMS\controllers\dasincoming.js:117:27
385- at D:\Projects\PN DocMS\controllers\dbhandle.js:524:7
386- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
387- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
388- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2869:28
389- at processTicksAndRejections (internal/process/task_queues.js:75:11)
390-Cannot set headers after they are sent to the client
391-Error [ERR_HTTP_HEADERS_SENT]: Cannot set headers after they are sent to the client
392- at ServerResponse.setHeader (_http_outgoing.js:485:11)
393- at ServerResponse.header (D:\Projects\PN DocMS\node_modules\express\lib\response.js:771:10)
394- at ServerResponse.location (D:\Projects\PN DocMS\node_modules\express\lib\response.js:888:15)
395- at ServerResponse.redirect (D:\Projects\PN DocMS\node_modules\express\lib\response.js:926:18)
396- at D:\Projects\PN DocMS\controllers\dasincoming.js:117:27
397- at D:\Projects\PN DocMS\controllers\dbhandle.js:524:7
398- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
399- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
400- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2869:28
401- at processTicksAndRejections (internal/process/task_queues.js:75:11)
402-Cannot set headers after they are sent to the client
403-Error [ERR_HTTP_HEADERS_SENT]: Cannot set headers after they are sent to the client
404- at ServerResponse.setHeader (_http_outgoing.js:485:11)
405- at ServerResponse.header (D:\Projects\PN DocMS\node_modules\express\lib\response.js:771:10)
406- at ServerResponse.location (D:\Projects\PN DocMS\node_modules\express\lib\response.js:888:15)
407- at ServerResponse.redirect (D:\Projects\PN DocMS\node_modules\express\lib\response.js:926:18)
408- at D:\Projects\PN DocMS\controllers\dasincoming.js:117:27
409- at D:\Projects\PN DocMS\controllers\dbhandle.js:524:7
410- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
411- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
412- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2869:28
413- at processTicksAndRejections (internal/process/task_queues.js:75:11)
414-express is not defined
415-ReferenceError: express is not defined
416- at D:\Projects\PN DocMS\controllers\login.js:43:28
417- at D:\Projects\PN DocMS\controllers\dbhandle.js:688:7
418- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
419- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
420- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2869:28
421- at processTicksAndRejections (internal/process/task_queues.js:75:11)
422-express is not defined
423-ReferenceError: express is not defined
424- at D:\Projects\PN DocMS\controllers\login.js:43:28
425- at D:\Projects\PN DocMS\controllers\dbhandle.js:688:7
426- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
427- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
428- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2869:28
429- at processTicksAndRejections (internal/process/task_queues.js:75:11)
430-express is not defined
431-ReferenceError: express is not defined
432- at D:\Projects\PN DocMS\controllers\login.js:44:28
433- at D:\Projects\PN DocMS\controllers\dbhandle.js:688:7
434- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
435- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
436- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2869:28
437- at processTicksAndRejections (internal/process/task_queues.js:75:11)
438-express is not defined
439-ReferenceError: express is not defined
440- at D:\Projects\PN DocMS\controllers\login.js:42:28
441- at D:\Projects\PN DocMS\controllers\dbhandle.js:688:7
442- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
443- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
444- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2869:28
445- at processTicksAndRejections (internal/process/task_queues.js:75:11)
446- at runNextTicks (internal/process/task_queues.js:62:3)
447- at processImmediate (internal/timers.js:412:9)
448- at process.topLevelDomainCallback (domain.js:130:23)
449-app.static is not a function
450-TypeError: app.static is not a function
451- at D:\Projects\PN DocMS\index.js:69:34
452- at D:\Projects\PN DocMS\controllers\dbhandle.js:688:7
453- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
454- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
455- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2869:28
456- at processTicksAndRejections (internal/process/task_queues.js:75:11)
457-ENOENT: no such file or directory, mkdir 'public/drive/n6b/'
458-Error: ENOENT: no such file or directory, mkdir 'public/drive/n6b/'
459- at Object.mkdirSync (fs.js:823:3)
460- at D:\Projects\PN DocMS\controllers\login.js:98:41
461- at D:\Projects\PN DocMS\controllers\dbhandle.js:524:7
462- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
463- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
464- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2869:28
465- at processTicksAndRejections (internal/process/task_queues.js:75:11)
466-Cannot read property 'forEach' of undefined
467-TypeError: Cannot read property 'forEach' of undefined
468- at Object.exports.checkPermission (D:\Projects\PN DocMS\controllers\utilsdocms.js:114:9)
469- at D:\Projects\PN DocMS\controllers\dasmonitor.js:120:38
470- at FSReqCallback.oncomplete (fs.js:146:23)
471-await is only valid in async function
472-D:\Projects\PN DocMS\controllers\pdflib.js:70
473- const pdfDoc = await PDFDocument.load(existingPdfBytes);
474- ^^^^^
475-
476-SyntaxError: await is only valid in async function
477- at Module._compile (internal/modules/cjs/loader.js:895:18)
478- at Object.Module._extensions..js (internal/modules/cjs/loader.js:995:10)
479- at Module.load (internal/modules/cjs/loader.js:815:32)
480- at Function.Module._load (internal/modules/cjs/loader.js:727:14)
481- at Module.require (internal/modules/cjs/loader.js:852:19)
482- at require (internal/modules/cjs/helpers.js:74:18)
483- at module.exports (D:\Projects\PN DocMS\controllers\dasroyalty.js:20:18)
484- at D:\Projects\PN DocMS\index.js:51:7
485- at D:\Projects\PN DocMS\controllers\dbhandle.js:697:7
486- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
487- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
488- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2869:28
489- at processTicksAndRejections (internal/process/task_queues.js:75:11)
490-Cannot read property 'includes' of undefined
491-TypeError: Cannot read property 'includes' of undefined
492- at D:\Projects\PN DocMS\controllers\dastransact.js:114:26
493- at D:\Projects\PN DocMS\controllers\dbhandle.js:195:5
494- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
495- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
496- at D:\Projects\PN DocMS\node_modules\mongoose\lib\helpers\query\completeMany.js:35:39
497- at processTicksAndRejections (internal/process/task_queues.js:75:11)
498-Cannot read property 'includes' of undefined
499-TypeError: Cannot read property 'includes' of undefined
500- at D:\Projects\PN DocMS\controllers\dastransact.js:114:26
501- at D:\Projects\PN DocMS\controllers\dbhandle.js:195:5
502- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
503- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
504- at D:\Projects\PN DocMS\node_modules\mongoose\lib\helpers\query\completeMany.js:35:39
505- at processTicksAndRejections (internal/process/task_queues.js:75:11)
506-Cannot set headers after they are sent to the client
507-Error [ERR_HTTP_HEADERS_SENT]: Cannot set headers after they are sent to the client
508- at ServerResponse.setHeader (_http_outgoing.js:485:11)
509- at ServerResponse.header (D:\Projects\PN DocMS\node_modules\express\lib\response.js:771:10)
510- at ServerResponse.send (D:\Projects\PN DocMS\node_modules\express\lib\response.js:170:12)
511- at ServerResponse.json (D:\Projects\PN DocMS\node_modules\express\lib\response.js:267:15)
512- at D:\Projects\PN DocMS\controllers\dastransact.js:118:15
513- at D:\Projects\PN DocMS\controllers\dbhandle.js:195:5
514- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
515- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
516- at D:\Projects\PN DocMS\node_modules\mongoose\lib\helpers\query\completeMany.js:35:39
517- at processTicksAndRejections (internal/process/task_queues.js:75:11)
518-Cannot find module '../dist/helpers'
519-Require stack:
520-- D:\Projects\PN DocMS\controllers\dasroyalty.js
521-- D:\Projects\PN DocMS\index.js
522-Error: Cannot find module '../dist/helpers'
523-Require stack:
524-- D:\Projects\PN DocMS\controllers\dasroyalty.js
525-- D:\Projects\PN DocMS\index.js
526- at Function.Module._resolveFilename (internal/modules/cjs/loader.js:797:15)
527- at Function.Module._load (internal/modules/cjs/loader.js:690:27)
528- at Module.require (internal/modules/cjs/loader.js:852:19)
529- at require (internal/modules/cjs/helpers.js:74:18)
530- at D:\Projects\PN DocMS\controllers\dasroyalty.js:43:75
531- at D:\Projects\PN DocMS\controllers\dbhandle.js:705:7
532- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
533- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
534- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2869:28
535- at processTicksAndRejections (internal/process/task_queues.js:75:11)
536- at runNextTicks (internal/process/task_queues.js:62:3)
537- at processImmediate (internal/timers.js:412:9)
538- at process.topLevelDomainCallback (domain.js:130:23)
539-Cannot find module '../dist/helpers'
540-Require stack:
541-- D:\Projects\PN DocMS\controllers\dasroyalty.js
542-- D:\Projects\PN DocMS\index.js
543-Error: Cannot find module '../dist/helpers'
544-Require stack:
545-- D:\Projects\PN DocMS\controllers\dasroyalty.js
546-- D:\Projects\PN DocMS\index.js
547- at Function.Module._resolveFilename (internal/modules/cjs/loader.js:797:15)
548- at Function.Module._load (internal/modules/cjs/loader.js:690:27)
549- at Module.require (internal/modules/cjs/loader.js:852:19)
550- at require (internal/modules/cjs/helpers.js:74:18)
551- at D:\Projects\PN DocMS\controllers\dasroyalty.js:43:75
552- at D:\Projects\PN DocMS\controllers\dbhandle.js:705:7
553- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
554- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
555- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2869:28
556- at processTicksAndRejections (internal/process/task_queues.js:75:11)
557- at runNextTicks (internal/process/task_queues.js:62:3)
558- at processImmediate (internal/timers.js:412:9)
559- at process.topLevelDomainCallback (domain.js:130:23)
560-Cannot find module '../dist/helpers'
561-Require stack:
562-- D:\Projects\PN DocMS\controllers\dasroyalty.js
563-- D:\Projects\PN DocMS\index.js
564-Error: Cannot find module '../dist/helpers'
565-Require stack:
566-- D:\Projects\PN DocMS\controllers\dasroyalty.js
567-- D:\Projects\PN DocMS\index.js
568- at Function.Module._resolveFilename (internal/modules/cjs/loader.js:797:15)
569- at Function.Module._load (internal/modules/cjs/loader.js:690:27)
570- at Module.require (internal/modules/cjs/loader.js:852:19)
571- at require (internal/modules/cjs/helpers.js:74:18)
572- at D:\Projects\PN DocMS\controllers\dasroyalty.js:43:75
573- at D:\Projects\PN DocMS\controllers\dbhandle.js:705:7
574- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
575- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
576- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2869:28
577- at processTicksAndRejections (internal/process/task_queues.js:75:11)
578- at runNextTicks (internal/process/task_queues.js:62:3)
579- at processImmediate (internal/timers.js:412:9)
580- at process.topLevelDomainCallback (domain.js:130:23)
581-ENOENT: no such file or directory, open 'public/drive/N6B/empty'
582-Error: ENOENT: no such file or directory, open 'public/drive/N6B/empty'
583- at Object.openSync (fs.js:440:3)
584- at Object.readFileSync (fs.js:342:35)
585- at Object.exports.verifySign (D:\Projects\PN DocMS\controllers\utilsdocms.js:67:30)
586- at D:\Projects\PN DocMS\controllers\dasincoming.js:435:46
587- at D:\Projects\PN DocMS\controllers\monitoring.js:169:14
588- at D:\Projects\PN DocMS\controllers\dbhandle.js:247:5
589- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
590- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
591- at model.Query.Query._completeOne (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2074:12)
592- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2136:10)
593- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mquery\lib\utils.js:116:16)
594- at processImmediate (internal/timers.js:439:21)
595- at process.topLevelDomainCallback (domain.js:130:23)
596-Cannot read property 'includes' of undefined
597-TypeError: Cannot read property 'includes' of undefined
598- at D:\Projects\PN DocMS\controllers\dasincoming.js:411:39
599- at D:\Projects\PN DocMS\controllers\dbhandle.js:397:15
600- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
601- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
602- at model.Query.Query._completeOne (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2074:12)
603- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2136:10)
604- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mquery\lib\utils.js:116:16)
605- at processImmediate (internal/timers.js:439:21)
606- at process.topLevelDomainCallback (domain.js:130:23)
607-Cannot read property 'includes' of undefined
608-TypeError: Cannot read property 'includes' of undefined
609- at D:\Projects\PN DocMS\controllers\dasincoming.js:411:57
610- at D:\Projects\PN DocMS\controllers\dbhandle.js:397:15
611- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
612- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
613- at model.Query.Query._completeOne (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2074:12)
614- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2136:10)
615- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mquery\lib\utils.js:116:16)
616- at processImmediate (internal/timers.js:439:21)
617- at process.topLevelDomainCallback (domain.js:130:23)
618-Cannot read property 'includes' of undefined
619-TypeError: Cannot read property 'includes' of undefined
620- at D:\Projects\PN DocMS\controllers\dasincoming.js:411:79
621- at D:\Projects\PN DocMS\controllers\dbhandle.js:397:15
622- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
623- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
624- at model.Query.Query._completeOne (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2074:12)
625- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2136:10)
626- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mquery\lib\utils.js:116:16)
627- at processImmediate (internal/timers.js:439:21)
628- at process.topLevelDomainCallback (domain.js:130:23)
629-Cannot read property 'includes' of undefined
630-TypeError: Cannot read property 'includes' of undefined
631- at D:\Projects\PN DocMS\controllers\dasincoming.js:411:81
632- at D:\Projects\PN DocMS\controllers\dbhandle.js:397:15
633- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
634- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
635- at model.Query.Query._completeOne (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2074:12)
636- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2136:10)
637- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mquery\lib\utils.js:116:16)
638- at processImmediate (internal/timers.js:439:21)
639- at process.topLevelDomainCallback (domain.js:130:23)
640-Cannot read property 'includes' of undefined
641-TypeError: Cannot read property 'includes' of undefined
642- at D:\Projects\PN DocMS\controllers\dasincoming.js:411:81
643- at D:\Projects\PN DocMS\controllers\dbhandle.js:397:15
644- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
645- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
646- at model.Query.Query._completeOne (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2074:12)
647- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2136:10)
648- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mquery\lib\utils.js:116:16)
649- at processImmediate (internal/timers.js:439:21)
650- at process.topLevelDomainCallback (domain.js:130:23)
28+ at ServerResponse.setHeader (_http_outgoing.js:470:11)
29+ at ServerResponse.header (/edokyu/node_modules/express/lib/response.js:771:10)
30+ at ServerResponse.send (/edokyu/node_modules/express/lib/response.js:170:12)
31+ at ServerResponse.json (/edokyu/node_modules/express/lib/response.js:267:15)
32+ at sortArr.forEach (/edokyu/controllers/dasincoming.js:171:23)
33+ at Array.forEach (<anonymous>)
34+ at /edokyu/controllers/dasincoming.js:159:25
35+ at FSReqWrap.args [as oncomplete] (fs.js:140:20)
36+itemnew is not defined
37+ReferenceError: itemnew is not defined
38+ at /edokyu/controllers/dasincoming.js:164:56
39+ at /edokyu/controllers/monitoring.js:173:12
40+ at /edokyu/controllers/dbhandle.js:220:5
41+ at /edokyu/node_modules/mongoose/lib/model.js:4827:16
42+ at /edokyu/node_modules/mongoose/lib/query.js:4390:12
43+ at model.Query.Query._completeOne (/edokyu/node_modules/mongoose/lib/query.js:2074:12)
44+ at Immediate.Query.base.findOne.call (/edokyu/node_modules/mongoose/lib/query.js:2136:10)
45+ at Immediate.<anonymous> (/edokyu/node_modules/mquery/lib/utils.js:116:16)
46+ at runCallback (timers.js:705:18)
47+ at tryOnImmediate (timers.js:676:5)
48+ at processImmediate (timers.js:658:5)
49+ at process.topLevelDomainCallback (domain.js:126:23)
50+item1 is not defined
51+ReferenceError: item1 is not defined
52+ at /edokyu/controllers/dasincoming.js:161:63
53+ at /edokyu/controllers/monitoring.js:170:85
54+ at /edokyu/controllers/dbhandle.js:220:5
55+ at /edokyu/node_modules/mongoose/lib/model.js:4827:16
56+ at /edokyu/node_modules/mongoose/lib/query.js:4390:12
57+ at process.nextTick (/edokyu/node_modules/mongoose/lib/query.js:2869:28)
58+ at process._tickCallback (internal/process/next_tick.js:61:11)
59+Cannot read property 'level' of null
60+TypeError: Cannot read property 'level' of null
61+ at /edokyu/controllers/dassysadmin.js:322:19
62+ at /edokyu/controllers/dbhandle.js:524:7
63+ at /edokyu/node_modules/mongoose/lib/model.js:4827:16
64+ at /edokyu/node_modules/mongoose/lib/query.js:4390:12
65+ at model.Query.Query._completeOne (/edokyu/node_modules/mongoose/lib/query.js:2074:12)
66+ at Immediate.Query.base.findOne.call (/edokyu/node_modules/mongoose/lib/query.js:2136:10)
67+ at Immediate.<anonymous> (/edokyu/node_modules/mquery/lib/utils.js:116:16)
68+ at runCallback (timers.js:705:18)
69+ at tryOnImmediate (timers.js:676:5)
70+ at processImmediate (timers.js:658:5)
71+ at process.topLevelDomainCallback (domain.js:126:23)
72+disBranch.toUpperCase is not a function
73+TypeError: disBranch.toUpperCase is not a function
74+ at /edokyu/controllers/monitoring.js:35:105
75+ at /edokyu/controllers/dbhandle.js:230:5
76+ at /edokyu/node_modules/mongoose/lib/model.js:4827:16
77+ at /edokyu/node_modules/mongoose/lib/query.js:4390:12
78+ at model.Query.Query._completeOne (/edokyu/node_modules/mongoose/lib/query.js:2074:12)
79+ at Immediate.Query.base.findOne.call (/edokyu/node_modules/mongoose/lib/query.js:2136:10)
80+ at Immediate.<anonymous> (/edokyu/node_modules/mquery/lib/utils.js:116:16)
81+ at runCallback (timers.js:705:18)
82+ at tryOnImmediate (timers.js:676:5)
83+ at processImmediate (timers.js:658:5)
84+ at process.topLevelDomainCallback (domain.js:126:23)
65185 EISDIR: illegal operation on a directory, read
65286 Error: EISDIR: illegal operation on a directory, read
653- at Object.readSync (fs.js:506:3)
654- at tryReadSync (fs.js:331:20)
655- at Object.readFileSync (fs.js:368:19)
656- at Object.exports.convDoctoPDF (D:\Projects\PN DocMS\controllers\dochandle.js:21:25)
657- at D:\Projects\PN DocMS\controllers\dasfileoperation.js:333:29
658- at D:\Projects\PN DocMS\controllers\dbhandle.js:247:5
659- at D:\Projects\PN DocMS\node_modules\mongoose\lib\model.js:4827:16
660- at D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:4390:12
661- at model.Query.Query._completeOne (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2074:12)
662- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mongoose\lib\query.js:2136:10)
663- at Immediate.<anonymous> (D:\Projects\PN DocMS\node_modules\mquery\lib\utils.js:116:16)
664- at processImmediate (internal/timers.js:439:21)
665- at process.topLevelDomainCallback (domain.js:130:23)
87+ at Object.readSync (fs.js:498:3)
88+ at tryReadSync (fs.js:332:20)
89+ at Object.readFileSync (fs.js:369:19)
90+ at Object.exports.convDoctoPDF (/edokyu/controllers/dochandle.js:11:25)
91+ at dbhandle.monitorFindFile (/edokyu/controllers/dasfileoperation.js:318:29)
92+ at /edokyu/controllers/dbhandle.js:230:5
93+ at /edokyu/node_modules/mongoose/lib/model.js:4827:16
94+ at /edokyu/node_modules/mongoose/lib/query.js:4390:12
95+ at model.Query.Query._completeOne (/edokyu/node_modules/mongoose/lib/query.js:2074:12)
96+ at Immediate.Query.base.findOne.call (/edokyu/node_modules/mongoose/lib/query.js:2136:10)
97+ at Immediate.<anonymous> (/edokyu/node_modules/mquery/lib/utils.js:116:16)
98+ at runCallback (timers.js:705:18)
99+ at tryOnImmediate (timers.js:676:5)
100+ at processImmediate (timers.js:658:5)
101+ at process.topLevelDomainCallback (domain.js:126:23)
--- /dev/null
+++ b/models/activitylogs.json
@@ -0,0 +1,197 @@
1+{"_id":{"$oid":"5f20ed658d2671765cbdae91"},"user":"administrator","deyt":{"$date":"2020-07-29T03:30:45.175Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
2+{"_id":{"$oid":"5f20eeb08d2671765cbdae93"},"user":"administrator","deyt":{"$date":"2020-07-29T03:36:16.503Z"},"action":"Add Correspondence","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
3+{"_id":{"$oid":"5f20ef3c8d2671765cbdae95"},"user":"administrator","deyt":{"$date":"2020-07-29T03:38:36.518Z"},"action":"Add Correspondence","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
4+{"_id":{"$oid":"5f20ef888d2671765cbdae97"},"user":"administrator","deyt":{"$date":"2020-07-29T03:39:52.006Z"},"action":"Add Correspondence","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
5+{"_id":{"$oid":"5f20ef998d2671765cbdae99"},"user":"administrator","deyt":{"$date":"2020-07-29T03:40:09.903Z"},"action":"Add Correspondence","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
6+{"_id":{"$oid":"5f20efb28d2671765cbdae9b"},"user":"administrator","deyt":{"$date":"2020-07-29T03:40:34.47Z"},"action":"Add Correspondence","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
7+{"_id":{"$oid":"5f20efb98d2671765cbdae9d"},"user":"administrator","deyt":{"$date":"2020-07-29T03:40:41.568Z"},"action":"Add Correspondence","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
8+{"_id":{"$oid":"5f20efdb8d2671765cbdae9f"},"user":"administrator","deyt":{"$date":"2020-07-29T03:41:15.772Z"},"action":"Add Correspondence","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
9+{"_id":{"$oid":"5f20f0228d2671765cbdaea1"},"user":"administrator","deyt":{"$date":"2020-07-29T03:42:26.645Z"},"action":"Add Correspondence","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
10+{"_id":{"$oid":"5f20f0338d2671765cbdaea3"},"user":"administrator","deyt":{"$date":"2020-07-29T03:42:43.851Z"},"action":"Add Correspondence","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
11+{"_id":{"$oid":"5f20f04e8d2671765cbdaea5"},"user":"administrator","deyt":{"$date":"2020-07-29T03:43:10.216Z"},"action":"Add Correspondence","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
12+{"_id":{"$oid":"5f20f06a8d2671765cbdaea7"},"user":"administrator","deyt":{"$date":"2020-07-29T03:43:38.509Z"},"action":"Add Correspondence","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
13+{"_id":{"$oid":"5f20f0878d2671765cbdaea9"},"user":"administrator","deyt":{"$date":"2020-07-29T03:44:07.969Z"},"action":"Add Correspondence","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
14+{"_id":{"$oid":"5f20f0ca8d2671765cbdaeab"},"user":"administrator","deyt":{"$date":"2020-07-29T03:45:14.648Z"},"action":"Add Correspondence","doc":"none","__v":0}
15+{"_id":{"$oid":"5f20f1678d2671765cbdaeac"},"user":"staff-secretary","deyt":{"$date":"2020-07-29T03:47:51.56Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
16+{"_id":{"$oid":"5f20f3878d2671765cbdaead"},"user":"staff-marketing","deyt":{"$date":"2020-07-29T03:56:55.473Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
17+{"_id":{"$oid":"5f20f3938d2671765cbdaeae"},"user":"staff-marketing","deyt":{"$date":"2020-07-29T03:57:07.54Z"},"action":"Open file from the File Server","doc":"Budget Proposal.pdf","serial":"::ffff:192.168.117.1","__v":0}
18+{"_id":{"$oid":"5f20f3b18d2671765cbdaeaf"},"user":"staff-secretary","deyt":{"$date":"2020-07-29T03:57:37.742Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
19+{"_id":{"$oid":"5f212139c75239969dccb750"},"user":"staff-secretary","deyt":{"$date":"2020-07-29T07:11:53.773Z"},"action":"Route Document with Duty Admin Privilege to: FINANCE","doc":"Budget Proposal.pdf","serial":"::ffff:192.168.117.1","__v":0}
20+{"_id":{"$oid":"5f2121d6c75239969dccb757"},"user":"staff-finance","deyt":{"$date":"2020-07-29T07:14:30.168Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
21+{"_id":{"$oid":"5f2131dd3525209ea8cb9f9e"},"user":"staff-secretary","deyt":{"$date":"2020-07-29T08:22:53.691Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
22+{"_id":{"$oid":"5f2132513525209ea8cb9f9f"},"user":"administrator","deyt":{"$date":"2020-07-29T08:24:49.575Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
23+{"_id":{"$oid":"5f2132853525209ea8cb9fa0"},"user":"staff-secretary","deyt":{"$date":"2020-07-29T08:25:41.717Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
24+{"_id":{"$oid":"5f2133433525209ea8cb9fa1"},"user":"boss","deyt":{"$date":"2020-07-29T08:28:51.843Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
25+{"_id":{"$oid":"5f2133c69c2aff9fcee125b1"},"user":"staff-secretary","deyt":{"$date":"2020-07-29T08:31:02.862Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
26+{"_id":{"$oid":"5f21351e3903d9a0e3dc592b"},"user":"staff-finance","deyt":{"$date":"2020-07-29T08:36:46.627Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
27+{"_id":{"$oid":"5f2139e0f8a328a3948ef9ae"},"user":"administrator","deyt":{"$date":"2020-07-29T08:57:04.924Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
28+{"_id":{"$oid":"5f2139f4f8a328a3948ef9b0"},"user":"administrator","deyt":{"$date":"2020-07-29T08:57:24.526Z"},"action":"Add Correspondence","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
29+{"_id":{"$oid":"5f213a10f8a328a3948ef9b1"},"user":"staff-finance","deyt":{"$date":"2020-07-29T08:57:52.255Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
30+{"_id":{"$oid":"5f21418c94141da7e5c4ec9f"},"user":"staff-secretary","deyt":{"$date":"2020-07-29T09:29:48.313Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
31+{"_id":{"$oid":"5f214885afc57faae3fcca1c"},"user":"staff-secretary","deyt":{"$date":"2020-07-29T09:59:33.462Z"},"action":"Route Document with Duty Admin Privilege to: MARKETING","doc":"Memorandum.doc","serial":"::ffff:192.168.117.1","__v":0}
32+{"_id":{"$oid":"5f2172f4a2de3aaee816dadc"},"user":"staff-secretary","deyt":{"$date":"2020-07-29T13:00:36.065Z"},"action":"Route Document with Duty Admin Privilege to: MARKETING","doc":"Memorandum.doc","serial":"::ffff:192.168.117.1","__v":0}
33+{"_id":{"$oid":"5f217404a2de3aaee816dae1"},"user":"invalid","deyt":{"$date":"2020-07-29T13:05:08.151Z"},"action":"Login Failed: wrongPass","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
34+{"_id":{"$oid":"5f217410a2de3aaee816dae2"},"user":"administrator","deyt":{"$date":"2020-07-29T13:05:20.828Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
35+{"_id":{"$oid":"5f21756e815df7b0ac74788e"},"user":"staff-secretary","deyt":{"$date":"2020-07-29T13:11:10.813Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
36+{"_id":{"$oid":"5f217689815df7b0ac74788f"},"user":"staff-secretary","deyt":{"$date":"2020-07-29T13:15:53.514Z"},"action":"Route Document with Duty Admin Privilege to: FINANCE","doc":"Financial Statement.doc","serial":"::ffff:192.168.117.1","__v":0}
37+{"_id":{"$oid":"5f2178be8f9422b2940038e5"},"user":"invalid","deyt":{"$date":"2020-07-29T13:25:18.871Z"},"action":"Login Failed: wrongPass","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
38+{"_id":{"$oid":"5f2178cf8f9422b2940038e6"},"user":"staff-finance","deyt":{"$date":"2020-07-29T13:25:35.589Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
39+{"_id":{"$oid":"5f217ab08f9422b2940038e7"},"user":"staff-secretary","deyt":{"$date":"2020-07-29T13:33:36.654Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
40+{"_id":{"$oid":"5f217cb770fae0b4f4d78f8c"},"user":"staff-secretary","deyt":{"$date":"2020-07-29T13:42:15.693Z"},"action":"Route Document with Duty Admin Privilege to: MARKETING","doc":"Purchase Order.doc","serial":"::ffff:192.168.117.1","__v":0}
41+{"_id":{"$oid":"5f217dd170fae0b4f4d78f92"},"user":"staff-secretary","deyt":{"$date":"2020-07-29T13:46:57.948Z"},"action":"Route Document with Duty Admin Privilege to: FINANCE","doc":"Budget Proposal.pdf","serial":"::ffff:192.168.117.1","__v":0}
42+{"_id":{"$oid":"5f217e0770fae0b4f4d78f98"},"user":"staff-marketing","deyt":{"$date":"2020-07-29T13:47:51.371Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
43+{"_id":{"$oid":"5f217e5470fae0b4f4d78f99"},"user":"staff-marketing","deyt":{"$date":"2020-07-29T13:49:08.206Z"},"action":"Save Document to Branch Folders","doc":"Purchase Order.doc","serial":"::ffff:192.168.117.1","__v":0}
44+{"_id":{"$oid":"5f217f1670fae0b4f4d78f9f"},"user":"staff-marketing","deyt":{"$date":"2020-07-29T13:52:22.943Z"},"action":"Save Document to Branch Folders","doc":"Purchase Order.doc","serial":"::ffff:192.168.117.1","__v":0}
45+{"_id":{"$oid":"5f217fc970fae0b4f4d78fa2"},"user":"staff-marketing","deyt":{"$date":"2020-07-29T13:55:21.171Z"},"action":"Route Document with non-Duty Admin Privilege to:All Branches,ASST.G.M.","doc":"Purchase Order.doc","serial":"::ffff:192.168.117.1","__v":0}
46+{"_id":{"$oid":"5f21800a70fae0b4f4d78fae"},"user":"staff-finance","deyt":{"$date":"2020-07-29T13:56:26.161Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
47+{"_id":{"$oid":"5f21801f70fae0b4f4d78faf"},"user":"boss.wannabe","deyt":{"$date":"2020-07-29T13:56:47.377Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
48+{"_id":{"$oid":"5f2180e970fae0b4f4d78fb0"},"user":"boss.wannabe","deyt":{"$date":"2020-07-29T14:00:09.819Z"},"action":"Sign document with e-signature","doc":"boss.wannabe.res.pdf","serial":"1596031209819","__v":0}
49+{"_id":{"$oid":"5f2181af70fae0b4f4d78fb1"},"user":"boss.wannabe","deyt":{"$date":"2020-07-29T14:03:27.687Z"},"action":"Upload File","doc":"Purchase Order.doc","serial":"::ffff:192.168.117.1","__v":0}
50+{"_id":{"$oid":"5f2181c370fae0b4f4d78fb3"},"user":"boss.wannabe","deyt":{"$date":"2020-07-29T14:03:47.945Z"},"action":"Released Document and forward to the Boss Incoming","doc":"Purchase Order.doc.boss.wannabe.pdf","serial":"::ffff:192.168.117.1","__v":0}
51+{"_id":{"$oid":"5e409d637a644aba4f8c9f79"},"user":"staff-secretary","deyt":{"$date":"2020-02-10T00:01:39.558Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
52+{"_id":{"$oid":"5e409fbd0f9c34bc513726c2"},"user":"staff-secretary","deyt":{"$date":"2020-02-10T00:11:41.484Z"},"action":"Route Document with Duty Admin Privilege to: FINANCE","doc":"Business Marketing Plan.pdf","serial":"::ffff:192.168.117.1","__v":0}
53+{"_id":{"$oid":"5e40a0270f9c34bc513726c8"},"user":"administrator","deyt":{"$date":"2020-02-10T00:13:27.968Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
54+{"_id":{"$oid":"5e40a0470f9c34bc513726ca"},"user":"administrator","deyt":{"$date":"2020-02-10T00:13:59.476Z"},"action":"Add user account","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
55+{"_id":{"$oid":"5f225a868bb0280a35c58399"},"user":"administrator","deyt":{"$date":"2020-07-30T05:28:38.857Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
56+{"_id":{"$oid":"5e4491ac8bb0280a35c5839b"},"user":"administrator","deyt":{"$date":"2020-02-13T00:00:44.065Z"},"action":"Add user account","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
57+{"_id":{"$oid":"5e4491ec8bb0280a35c5839d"},"user":"administrator","deyt":{"$date":"2020-02-13T00:01:48.271Z"},"action":"Add user account","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
58+{"_id":{"$oid":"5e4492058bb0280a35c5839f"},"user":"administrator","deyt":{"$date":"2020-02-13T00:02:13.261Z"},"action":"Add user account","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
59+{"_id":{"$oid":"5e44923b8bb0280a35c583a1"},"user":"administrator","deyt":{"$date":"2020-02-13T00:03:07.391Z"},"action":"Add user account","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
60+{"_id":{"$oid":"5e4492868bb0280a35c583a3"},"user":"administrator","deyt":{"$date":"2020-02-13T00:04:22.44Z"},"action":"Add user account","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
61+{"_id":{"$oid":"5e4492ae8bb0280a35c583a5"},"user":"administrator","deyt":{"$date":"2020-02-13T00:05:02.587Z"},"action":"Add user account","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
62+{"_id":{"$oid":"5e44938d8bb0280a35c583a7"},"user":"administrator","deyt":{"$date":"2020-02-13T00:08:45.516Z"},"action":"Add user account","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
63+{"_id":{"$oid":"5e4493bd8bb0280a35c583a9"},"user":"administrator","deyt":{"$date":"2020-02-13T00:09:33.126Z"},"action":"Add user account","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
64+{"_id":{"$oid":"5e44956a8bb0280a35c583ab"},"user":"administrator","deyt":{"$date":"2020-02-13T00:16:42.948Z"},"action":"Add user account","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
65+{"_id":{"$oid":"5e4495918bb0280a35c583ad"},"user":"administrator","deyt":{"$date":"2020-02-13T00:17:21.247Z"},"action":"Add user account","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
66+{"_id":{"$oid":"5e4496ef8bb0280a35c583ae"},"user":"staff-secretary","deyt":{"$date":"2020-02-13T00:23:11.534Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
67+{"_id":{"$oid":"5e4498898bb0280a35c583af"},"user":"staff-secretary","deyt":{"$date":"2020-02-13T00:30:01.576Z"},"action":"Route Document with Duty Admin Privilege to: LOGISTICS","doc":"Transmittal Letter.doc","serial":"::ffff:192.168.117.1","__v":0}
68+{"_id":{"$oid":"5e4498e38bb0280a35c583b5"},"user":"staff-secretary","deyt":{"$date":"2020-02-13T00:31:31.331Z"},"action":"Route Document with Duty Admin Privilege to: LOGISTICS","doc":"Standard Operating Procedure SOP.doc","serial":"::ffff:192.168.117.1","__v":0}
69+{"_id":{"$oid":"5e4498f68bb0280a35c583ba"},"user":"staff-secretary","deyt":{"$date":"2020-02-13T00:31:50.133Z"},"action":"Open file from the File Server","doc":"Budget Proposal.pdf","serial":"::ffff:192.168.117.1","__v":0}
70+{"_id":{"$oid":"5e44992a8bb0280a35c583bb"},"user":"staff-secretary","deyt":{"$date":"2020-02-13T00:32:42.577Z"},"action":"Send File to User/Person: manager-hr","doc":"Budget Proposal.pdf","serial":"::ffff:192.168.117.1","__v":0}
71+{"_id":{"$oid":"5e44993f8bb0280a35c583c0"},"user":"manager-hr","deyt":{"$date":"2020-02-13T00:33:03.511Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
72+{"_id":{"$oid":"5e44995d8bb0280a35c583c1"},"user":"manager-hr","deyt":{"$date":"2020-02-13T00:33:33.942Z"},"action":"Open file from the File Server","doc":"Purchase Order.doc","serial":"::ffff:192.168.117.1","__v":0}
73+{"_id":{"$oid":"5e44998c8bb0280a35c583c2"},"user":"manager-hr","deyt":{"$date":"2020-02-13T00:34:20.286Z"},"action":"Open file from the File Server","doc":"Quotation Form.pdf","serial":"::ffff:192.168.117.1","__v":0}
74+{"_id":{"$oid":"5e4499c48bb0280a35c583c3"},"user":"manager-hr","deyt":{"$date":"2020-02-13T00:35:16.943Z"},"action":"Route Document from File Server to: MARKETING","doc":"Quotation Form.pdf","serial":"::ffff:192.168.117.1","__v":0}
75+{"_id":{"$oid":"5e449a6d8bb0280a35c583c9"},"user":"manager-hr","deyt":{"$date":"2020-02-13T00:38:05.026Z"},"action":"Open file from the File Server","doc":"Budget Proposal.pdf","serial":"::ffff:192.168.117.1","__v":0}
76+{"_id":{"$oid":"5e449a748bb0280a35c583ca"},"user":"manager-hr","deyt":{"$date":"2020-02-13T00:38:12.361Z"},"action":"Sign document with e-signature","doc":"manager-hr.res.pdf","serial":"1581554292361","__v":0}
77+{"_id":{"$oid":"5e449a7e8bb0280a35c583cc"},"user":"manager-hr","deyt":{"$date":"2020-02-13T00:38:22.881Z"},"action":"Open file from the File Server","doc":"Budget Proposal.pdf.manager-hr.pdf","serial":"::ffff:192.168.117.1","__v":0}
78+{"_id":{"$oid":"5e449a988bb0280a35c583cd"},"user":"manager-hr","deyt":{"$date":"2020-02-13T00:38:48.515Z"},"action":"Route Document from File Server to: ACCOUNTING","doc":"Budget Proposal.pdf.manager-hr.pdf","serial":"::ffff:192.168.117.1","__v":0}
79+{"_id":{"$oid":"5e44a3fc8bb0280a35c583d1"},"user":"staff-finance","deyt":{"$date":"2020-02-13T01:18:52.659Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
80+{"_id":{"$oid":"5e44a40a8bb0280a35c583d2"},"user":"staff-finance","deyt":{"$date":"2020-02-13T01:19:06.712Z"},"action":"Delete Commo/File from Monitoring","doc":"Budget Proposal.pdf","serial":"::ffff:192.168.117.1","__v":0}
81+{"_id":{"$oid":"5e44a4368bb0280a35c583d3"},"user":"staff-finance","deyt":{"$date":"2020-02-13T01:19:50.129Z"},"action":"Delete document during routing - branch for info","doc":"Budget Proposal.pdf","serial":"::ffff:192.168.117.1","__v":0}
82+{"_id":{"$oid":"5e60421dc48510152d5fa996"},"user":"manager-logistics","deyt":{"$date":"2020-03-05T00:04:45.885Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
83+{"_id":{"$oid":"5e604299c48510152d5fa997"},"user":"manager-logistics","deyt":{"$date":"2020-03-05T00:06:49.459Z"},"action":"Upload File","doc":"Standard Operating Procedure SOP.doc","serial":"::ffff:192.168.117.1","__v":0}
84+{"_id":{"$oid":"5e6042bcc48510152d5fa999"},"user":"manager-logistics","deyt":{"$date":"2020-03-05T00:07:24.304Z"},"action":"Route Document with non-Duty Admin Privilege to:ACCOUNTING","doc":"Standard Operating Procedure SOP.doc.manager-logistics.pdf","serial":"::ffff:192.168.117.1","__v":0}
85+{"_id":{"$oid":"5e6044ccc48510152d5fa99c"},"user":"manager-logistics","deyt":{"$date":"2020-03-05T00:16:12.231Z"},"action":"Open file from the File Server","doc":"Loan Contract.pdf","serial":"::ffff:192.168.117.1","__v":0}
86+{"_id":{"$oid":"5e6044f4c48510152d5fa99f"},"user":"manager-logistics","deyt":{"$date":"2020-03-05T00:16:52.436Z"},"action":"Monitoring: Title: Purchase Order.doc with file Purchase Order.doc renamed as Loan Contract.pdf","doc":"Purchase Order.doc","serial":"::ffff:192.168.117.1","__v":0}
87+{"_id":{"$oid":"5e60451ac48510152d5fa9a0"},"user":"manager-logistics","deyt":{"$date":"2020-03-05T00:17:30.636Z"},"action":"Route Document from File Server to: PRODUCTION","doc":"Loan Contract.pdf","serial":"::ffff:192.168.117.1","__v":0}
88+{"_id":{"$oid":"5e604593c48510152d5fa9a4"},"user":"boss","deyt":{"$date":"2020-03-05T00:19:31.182Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
89+{"_id":{"$oid":"5e6045ebc48510152d5fa9a6"},"user":"staff-secretary","deyt":{"$date":"2020-03-05T00:20:59.83Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
90+{"_id":{"$oid":"5e60484825aa30197b5c3d53"},"user":"staff-secretary","deyt":{"$date":"2020-03-05T00:31:04.374Z"},"action":"File downloaded by the user","doc":"Purchase Order.doc.pdf","serial":"::ffff:192.168.117.1","__v":0}
91+{"_id":{"$oid":"5e6048a225aa30197b5c3d54"},"user":"staff-secretary","deyt":{"$date":"2020-03-05T00:32:34.571Z"},"action":"File downloaded by the user","doc":"Purchase Order.doc.pdf","serial":"::ffff:192.168.117.1","__v":0}
92+{"_id":{"$oid":"5e6048ba25aa30197b5c3d55"},"user":"staff-secretary","deyt":{"$date":"2020-03-05T00:32:58.804Z"},"action":"File downloaded by the user","doc":"Purchase Order.doc.pdf","serial":"::ffff:192.168.117.1","__v":0}
93+{"_id":{"$oid":"5e604b8f25aa30197b5c3d56"},"user":"staff-secretary","deyt":{"$date":"2020-03-05T00:45:03.981Z"},"action":"File downloaded by the user","doc":"Purchase Order.doc.pdf","serial":"::ffff:192.168.117.1","__v":0}
94+{"_id":{"$oid":"5e604c26a1a6ea1b4bffd30f"},"user":"staff-secretary","deyt":{"$date":"2020-03-05T00:47:34.547Z"},"action":"File downloaded by the user","doc":"Purchase Order.doc.pdf","serial":"::ffff:192.168.117.1","__v":0}
95+{"_id":{"$oid":"5e604c29a1a6ea1b4bffd310"},"user":"staff-secretary","deyt":{"$date":"2020-03-05T00:47:37.145Z"},"action":"File downloaded by the user","doc":"Purchase Order.doc.pdf","serial":"::ffff:192.168.117.1","__v":0}
96+{"_id":{"$oid":"5e604c69911bb81b7f25284e"},"user":"staff-secretary","deyt":{"$date":"2020-03-05T00:48:41.066Z"},"action":"File downloaded by the user","doc":"Purchase Order.doc.pdf","serial":"::ffff:192.168.117.1","__v":0}
97+{"_id":{"$oid":"5e604c6b911bb81b7f25284f"},"user":"staff-secretary","deyt":{"$date":"2020-03-05T00:48:43.703Z"},"action":"File downloaded by the user","doc":"Purchase Order.doc.pdf","serial":"::ffff:192.168.117.1","__v":0}
98+{"_id":{"$oid":"5e604c81911bb81b7f252850"},"user":"staff-secretary","deyt":{"$date":"2020-03-05T00:49:05.718Z"},"action":"File downloaded by the user","doc":"Purchase Order.doc.pdf","serial":"::ffff:192.168.117.1","__v":0}
99+{"_id":{"$oid":"5e604ca6d307151ba9cb307a"},"user":"staff-secretary","deyt":{"$date":"2020-03-05T00:49:42.794Z"},"action":"File downloaded by the user","doc":"Purchase Order.doc.pdf","serial":"::ffff:192.168.117.1","__v":0}
100+{"_id":{"$oid":"5e604cadd307151ba9cb307b"},"user":"staff-secretary","deyt":{"$date":"2020-03-05T00:49:49.95Z"},"action":"Released document deleted","doc":"Purchase Order.doc.pdf","serial":"::ffff:192.168.117.1","__v":0}
101+{"_id":{"$oid":"5e604d17d307151ba9cb307c"},"user":"staff-secretary","deyt":{"$date":"2020-03-05T00:51:35.958Z"},"action":"Update Commo Title from Monitoring","doc":"Loan Contract.pdf","serial":"::ffff:192.168.117.1","__v":0}
102+{"_id":{"$oid":"5e604d4ad307151ba9cb307d"},"user":"administrator","deyt":{"$date":"2020-03-05T00:52:26.394Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
103+{"_id":{"$oid":"5e604e31d307151ba9cb307e"},"user":"administrator","deyt":{"$date":"2020-03-05T00:56:17.717Z"},"action":"Delete Commo/File from Monitoring","doc":"Purchase Order.doc.boss.wannabe.pdf","serial":"::ffff:192.168.117.1","__v":0}
104+{"_id":{"$oid":"5e60559626541f1f0ebb00a9"},"user":"staff-logistics","deyt":{"$date":"2020-03-05T01:27:50.589Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
105+{"_id":{"$oid":"5e60560926541f1f0ebb00aa"},"user":"staff-logistics","deyt":{"$date":"2020-03-05T01:29:45.855Z"},"action":"Route Document with non-Duty Admin Privilege to:ASST.G.M.","doc":"Transmittal Letter.doc","serial":"::ffff:192.168.117.1","__v":0}
106+{"_id":{"$oid":"5e6056d126541f1f0ebb00ad"},"user":"staff-logistics","deyt":{"$date":"2020-03-05T01:33:05.727Z"},"action":"Open file from the File Server","doc":"Purchase Order.doc","serial":"::ffff:192.168.117.1","__v":0}
107+{"_id":{"$oid":"5e60579826541f1f0ebb00ae"},"user":"staff-logistics","deyt":{"$date":"2020-03-05T01:36:24.702Z"},"action":"Route Document from File Server to: HR","doc":"Purchase Order.doc","serial":"::ffff:192.168.117.1","__v":0}
108+{"_id":{"$oid":"5e605839b11817219164c55d"},"user":"staff-accounting","deyt":{"$date":"2020-03-05T01:39:05.83Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
109+{"_id":{"$oid":"5e6058d2b11817219164c55e"},"user":"staff-accounting","deyt":{"$date":"2020-03-05T01:41:38.136Z"},"action":"Route Document with non-Duty Admin Privilege to:MARKETING","doc":"Budget Proposal.pdf.manager-hr.pdf","serial":"::ffff:192.168.117.1","__v":0}
110+{"_id":{"$oid":"5e60593cb11817219164c561"},"user":"staff-accounting","deyt":{"$date":"2020-03-05T01:43:24.203Z"},"action":"Open file from the File Server","doc":"Business Introduction Letter.doc","serial":"::ffff:192.168.117.1","__v":0}
111+{"_id":{"$oid":"5e60597fb11817219164c562"},"user":"staff-accounting","deyt":{"$date":"2020-03-05T01:44:31.737Z"},"action":"Send File to User/Person: manager-accounting","doc":"Business Introduction Letter.doc","serial":"::ffff:192.168.117.1","__v":0}
112+{"_id":{"$oid":"5e605996b11817219164c567"},"user":"staff-accounting","deyt":{"$date":"2020-03-05T01:44:54.532Z"},"action":"Send File to User/Person: manager-accounting","doc":"Business Introduction Letter.doc","serial":"::ffff:192.168.117.1","__v":0}
113+{"_id":{"$oid":"5e6059a4b11817219164c568"},"user":"manager-accounting","deyt":{"$date":"2020-03-05T01:45:08.751Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
114+{"_id":{"$oid":"5e6059acb11817219164c569"},"user":"manager-accounting","deyt":{"$date":"2020-03-05T01:45:16.72Z"},"action":"Open file from the File Server","doc":"Business Introduction Letter.doc","serial":"::ffff:192.168.117.1","__v":0}
115+{"_id":{"$oid":"5e6059f5b11817219164c56a"},"user":"manager-accounting","deyt":{"$date":"2020-03-05T01:46:29.087Z"},"action":"Route Document from File Server to: IT","doc":"Business Introduction Letter.doc","serial":"::ffff:192.168.117.1","__v":0}
116+{"_id":{"$oid":"5e605a2cb11817219164c56f"},"user":"manager-marketing","deyt":{"$date":"2020-03-05T01:47:24.517Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
117+{"_id":{"$oid":"5e605a8bb11817219164c570"},"user":"manager-marketing","deyt":{"$date":"2020-03-05T01:48:59.237Z"},"action":"Route Document with non-Duty Admin Privilege to:LOGISTICS","doc":"Quotation Form.pdf","serial":"::ffff:192.168.117.1","__v":0}
118+{"_id":{"$oid":"5ea0da9cb11817219164c573"},"user":"staff-hr","deyt":{"$date":"2020-04-23T00:00:28.42Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
119+{"_id":{"$oid":"5ea0db29b11817219164c574"},"user":"staff-hr","deyt":{"$date":"2020-04-23T00:02:49.152Z"},"action":"Open file from the File Server","doc":"Job Order Sample.doc","serial":"::ffff:192.168.117.1","__v":0}
120+{"_id":{"$oid":"5ea0db76b11817219164c575"},"user":"staff-hr","deyt":{"$date":"2020-04-23T00:04:06.679Z"},"action":"Route Document from File Server to: ASST.G.M.","doc":"Job Order Sample.doc","serial":"::ffff:192.168.117.1","__v":0}
121+{"_id":{"$oid":"5ea0dba7b11817219164c57b"},"user":"staff-hr","deyt":{"$date":"2020-04-23T00:04:55.269Z"},"action":"Content Search","doc":"purchase","serial":"::ffff:192.168.117.1","__v":0}
122+{"_id":{"$oid":"5ea0dbdbb11817219164c57c"},"user":"staff-hr","deyt":{"$date":"2020-04-23T00:05:47.388Z"},"action":"Save Document to Branch Folders","doc":"Purchase Order.doc","serial":"::ffff:192.168.117.1","__v":0}
123+{"_id":{"$oid":"5ea0dcadb11817219164c580"},"user":"staff-hr","deyt":{"$date":"2020-04-23T00:09:17.442Z"},"action":"Route Document with non-Duty Admin Privilege to:IT","doc":"Purchase Order.doc","serial":"::ffff:192.168.117.1","__v":0}
124+{"_id":{"$oid":"5ea0dcd2b11817219164c582"},"user":"manager-it","deyt":{"$date":"2020-04-23T00:09:54.862Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
125+{"_id":{"$oid":"5ea0dd0eb11817219164c583"},"user":"manager-it","deyt":{"$date":"2020-04-23T00:10:54.955Z"},"action":"Route Document with non-Duty Admin Privilege to:All Branches,ASST.G.M.","doc":"Business Introduction Letter.doc","serial":"::ffff:192.168.117.1","__v":0}
126+{"_id":{"$oid":"5ea0dd22b11817219164c58f"},"user":"manager-it","deyt":{"$date":"2020-04-23T00:11:14.345Z"},"action":"Open file from the File Server","doc":"Payment Voucher.doc","serial":"::ffff:192.168.117.1","__v":0}
127+{"_id":{"$oid":"5ea0dd5cb11817219164c590"},"user":"manager-it","deyt":{"$date":"2020-04-23T00:12:12.7Z"},"action":"Route Document from File Server to: PRODUCTION","doc":"Payment Voucher.doc","serial":"::ffff:192.168.117.1","__v":0}
128+{"_id":{"$oid":"5ea0ddb3b11817219164c596"},"user":"manager-accounting","deyt":{"$date":"2020-04-23T00:13:39.366Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
129+{"_id":{"$oid":"5ea0dde7b11817219164c597"},"user":"manager-accounting","deyt":{"$date":"2020-04-23T00:14:31.189Z"},"action":"Route Document with non-Duty Admin Privilege to:G.M.","doc":"Standard Operating Procedure SOP.doc.manager-logistics.pdf","serial":"::ffff:192.168.117.1","__v":0}
130+{"_id":{"$oid":"5ea0de08b11817219164c59a"},"user":"manager-marketing","deyt":{"$date":"2020-04-23T00:15:04.207Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
131+{"_id":{"$oid":"5ea0de54b11817219164c59b"},"user":"manager-marketing","deyt":{"$date":"2020-04-23T00:16:20.203Z"},"action":"Route Document with non-Duty Admin Privilege to:LOGISTICS","doc":"Budget Proposal.pdf.manager-hr.pdf","serial":"::ffff:192.168.117.1","__v":0}
132+{"_id":{"$oid":"5ea0de71b11817219164c59e"},"user":"manager-marketing","deyt":{"$date":"2020-04-23T00:16:49.114Z"},"action":"Delete document during routing - branch for info","doc":"Purchase Order.doc","serial":"::ffff:192.168.117.1","__v":0}
133+{"_id":{"$oid":"5ea0de77b11817219164c59f"},"user":"manager-marketing","deyt":{"$date":"2020-04-23T00:16:55.943Z"},"action":"File downloaded by the user","doc":"Business Introduction Letter.doc","serial":"::ffff:192.168.117.1","__v":0}
134+{"_id":{"$oid":"5ebddb95b11817219164c5a0"},"user":"invalid","deyt":{"$date":"2020-05-15T00:00:21.378Z"},"action":"Login Failed: wrongUser","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
135+{"_id":{"$oid":"5ebddb9fb11817219164c5a1"},"user":"invalid","deyt":{"$date":"2020-05-15T00:00:31.784Z"},"action":"Login Failed: wrongUser","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
136+{"_id":{"$oid":"5ebddbaeb11817219164c5a2"},"user":"administrator","deyt":{"$date":"2020-05-15T00:00:46.68Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
137+{"_id":{"$oid":"5ebddbcbb11817219164c5a4"},"user":"administrator","deyt":{"$date":"2020-05-15T00:01:15.582Z"},"action":"Add user account","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
138+{"_id":{"$oid":"5ebddbd9b11817219164c5a5"},"user":"manager-production","deyt":{"$date":"2020-05-15T00:01:29.194Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
139+{"_id":{"$oid":"5ebddc0cb11817219164c5a6"},"user":"manager-production","deyt":{"$date":"2020-05-15T00:02:20.024Z"},"action":"Upload File","doc":"","serial":"::ffff:192.168.117.1","__v":0}
140+{"_id":{"$oid":"5ebddc34b11817219164c5a8"},"user":"manager-production","deyt":{"$date":"2020-05-15T00:03:00.237Z"},"action":"Route Document with non-Duty Admin Privilege to:ASST.G.M.","doc":"Payment Voucher.doc.manager-production.pdf","serial":"::ffff:192.168.117.1","__v":0}
141+{"_id":{"$oid":"5ebddc89b11817219164c5ab"},"user":"manager-production","deyt":{"$date":"2020-05-15T00:04:25.807Z"},"action":"Route Document with non-Duty Admin Privilege to:ACCOUNTING","doc":"Loan Contract.pdf","serial":"::ffff:192.168.117.1","__v":0}
142+{"_id":{"$oid":"5ebddcb7b11817219164c5ae"},"user":"manager-production","deyt":{"$date":"2020-05-15T00:05:11.378Z"},"action":"Open file from the File Server","doc":"Sales Report.xls","serial":"::ffff:192.168.117.1","__v":0}
143+{"_id":{"$oid":"5ebddcf4b11817219164c5af"},"user":"manager-production","deyt":{"$date":"2020-05-15T00:06:12.938Z"},"action":"Route Document from File Server to: MARKETING","doc":"Sales Report.xls","serial":"::ffff:192.168.117.1","__v":0}
144+{"_id":{"$oid":"5ebddd7ab11817219164c5b5"},"user":"manager-finance","deyt":{"$date":"2020-05-15T00:08:26.442Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
145+{"_id":{"$oid":"5ebdddaab11817219164c5b6"},"user":"manager-finance","deyt":{"$date":"2020-05-15T00:09:14.652Z"},"action":"Route Document with non-Duty Admin Privilege to:LOGISTICS","doc":"Business Marketing Plan.pdf","serial":"::ffff:192.168.117.1","__v":0}
146+{"_id":{"$oid":"5ebdde10b11817219164c5b9"},"user":"manager-finance","deyt":{"$date":"2020-05-15T00:10:56.326Z"},"action":"Upload File","doc":"Taal Vista Hotel Reservation Confirmation.docx","serial":"::ffff:192.168.117.1","__v":0}
147+{"_id":{"$oid":"5ebdde11b11817219164c5ba"},"user":"manager-finance","deyt":{"$date":"2020-05-15T00:10:57.362Z"},"action":"Open file from the File Server","doc":"Taal Vista Hotel Reservation Confirmation.docx","serial":"::ffff:192.168.117.1","__v":0}
148+{"_id":{"$oid":"5ebdde79b11817219164c5bb"},"user":"manager-finance","deyt":{"$date":"2020-05-15T00:12:41.644Z"},"action":"Route Document from File Server to: ASST.G.M.","doc":"Taal Vista Hotel Reservation Confirmation.docx","serial":"::ffff:192.168.117.1","__v":0}
149+{"_id":{"$oid":"5ebdded6b11817219164c5c1"},"user":"manager-finance","deyt":{"$date":"2020-05-15T00:14:14.267Z"},"action":"Upload File","doc":"Obstacles Between You And A Paperless Office.docx","serial":"::ffff:192.168.117.1","__v":0}
150+{"_id":{"$oid":"5ebdded7b11817219164c5c2"},"user":"manager-finance","deyt":{"$date":"2020-05-15T00:14:15.277Z"},"action":"Open file from the File Server","doc":"Obstacles Between You And A Paperless Office.docx","serial":"::ffff:192.168.117.1","__v":0}
151+{"_id":{"$oid":"5ebddf4bb11817219164c5c3"},"user":"manager-finance","deyt":{"$date":"2020-05-15T00:16:11.902Z"},"action":"Route Document from File Server to: ACCOUNTING,All Branches","doc":"Obstacles Between You And A Paperless Office.docx","serial":"::ffff:192.168.117.1","__v":0}
152+{"_id":{"$oid":"5ebddf90b11817219164c5d1"},"user":"manager-finance","deyt":{"$date":"2020-05-15T00:17:20.382Z"},"action":"Upload File","doc":"Dear Mr.docx","serial":"::ffff:192.168.117.1","__v":0}
153+{"_id":{"$oid":"5ebddf91b11817219164c5d2"},"user":"manager-finance","deyt":{"$date":"2020-05-15T00:17:21.358Z"},"action":"Open file from the File Server","doc":"Dear Mr.docx","serial":"::ffff:192.168.117.1","__v":0}
154+{"_id":{"$oid":"5ebddfd7b11817219164c5d3"},"user":"manager-finance","deyt":{"$date":"2020-05-15T00:18:31.208Z"},"action":"Route Document from File Server to: IT","doc":"Dear Mr.docx","serial":"::ffff:192.168.117.1","__v":0}
155+{"_id":{"$oid":"5f22c4fbb11817219164c5d7"},"user":"boss.wannabe","deyt":{"$date":"2020-07-30T13:02:51.871Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
156+{"_id":{"$oid":"5f22c5afb11817219164c5d8"},"user":"boss.wannabe","deyt":{"$date":"2020-07-30T13:05:51.026Z"},"action":"Upload File","doc":"Empty","serial":"::ffff:192.168.117.1","__v":0}
157+{"_id":{"$oid":"5f22d15201931f30ff79f4eb"},"user":"boss.wannabe","deyt":{"$date":"2020-07-30T13:55:30.804Z"},"action":"Released Document and forward to the Boss Incoming","doc":"Transmittal Letter.doc","serial":"::ffff:192.168.117.1","__v":0}
158+{"_id":{"$oid":"5f22d17701931f30ff79f4ed"},"user":"boss.wannabe","deyt":{"$date":"2020-07-30T13:56:07.168Z"},"action":"Released Document and forward to the Boss Incoming","doc":"Job Order Sample.doc.boss.wannabe.pdf","serial":"::ffff:192.168.117.1","__v":0}
159+{"_id":{"$oid":"5f22d1ab01931f30ff79f4ef"},"user":"boss","deyt":{"$date":"2020-07-30T13:56:59.615Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
160+{"_id":{"$oid":"5f2377e266dd0e3a09f06306"},"user":"boss.wannabe","deyt":{"$date":"2020-07-31T01:46:10.319Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
161+{"_id":{"$oid":"5f23781566dd0e3a09f06307"},"user":"boss.wannabe","deyt":{"$date":"2020-07-31T01:47:01.53Z"},"action":"Released Document and forward to the Boss Incoming","doc":"Job Order Sample.doc.boss.wannabe.pdf","serial":"::ffff:192.168.117.1","__v":0}
162+{"_id":{"$oid":"5f2378cd66dd0e3a09f06309"},"user":"boss.wannabe","deyt":{"$date":"2020-07-31T01:50:05.918Z"},"action":"Released Document and forward to the Boss Incoming","doc":"Transmittal Letter.doc","serial":"::ffff:192.168.117.1","__v":0}
163+{"_id":{"$oid":"5f23791666dd0e3a09f0630b"},"user":"boss","deyt":{"$date":"2020-07-31T01:51:18.323Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
164+{"_id":{"$oid":"5f23794d66dd0e3a09f0630c"},"user":"administrator","deyt":{"$date":"2020-07-31T01:52:13.834Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
165+{"_id":{"$oid":"5f23797066dd0e3a09f0630d"},"user":"administrator","deyt":{"$date":"2020-07-31T01:52:48.827Z"},"action":"Update Top Management Setting","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
166+{"_id":{"$oid":"5f23798066dd0e3a09f0630e"},"user":"boss.wannabe","deyt":{"$date":"2020-07-31T01:53:04.605Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
167+{"_id":{"$oid":"5f2379ab66dd0e3a09f0630f"},"user":"boss.wannabe","deyt":{"$date":"2020-07-31T01:53:47.176Z"},"action":"Released Document and forward to the Boss Incoming","doc":"Job Order Sample.doc.boss.wannabe.pdf","serial":"::ffff:192.168.117.1","__v":0}
168+{"_id":{"$oid":"5f237a1966dd0e3a09f06311"},"user":"boss.wannabe","deyt":{"$date":"2020-07-31T01:55:37.523Z"},"action":"Released Document and forward to the Boss Incoming","doc":"Transmittal Letter.doc","serial":"::ffff:192.168.117.1","__v":0}
169+{"_id":{"$oid":"5f237b3566dd0e3a09f06313"},"user":"boss","deyt":{"$date":"2020-07-31T02:00:21.887Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
170+{"_id":{"$oid":"5ee02709df40ca3fe084435e"},"user":"boss","deyt":{"$date":"2020-06-10T00:19:21.559Z"},"action":"Released signed document and forward to duty Admin","doc":"Transmittal Letter.doc","serial":"::ffff:192.168.117.1","__v":0}
171+{"_id":{"$oid":"5ee02728df40ca3fe0844360"},"user":"boss","deyt":{"$date":"2020-06-10T00:19:52.818Z"},"action":"Sign document with e-signature","doc":"Job Order Sample.doc.boss.wannabe.pdf","serial":"1591748392818","__v":0}
172+{"_id":{"$oid":"5ee02737df40ca3fe0844361"},"user":"boss","deyt":{"$date":"2020-06-10T00:20:07.761Z"},"action":"Released signed document and forward to duty Admin","doc":"Job Order Sample.doc.boss.wannabe.pdf","serial":"::ffff:192.168.117.1","__v":0}
173+{"_id":{"$oid":"5ee02772df40ca3fe0844363"},"user":"staff-secretary","deyt":{"$date":"2020-06-10T00:21:06.572Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
174+{"_id":{"$oid":"5ee0280bdf40ca3fe0844364"},"user":"staff-secretary","deyt":{"$date":"2020-06-10T00:23:39.564Z"},"action":"Released document deleted","doc":"Transmittal Letter.doc","serial":"::ffff:192.168.117.1","__v":0}
175+{"_id":{"$oid":"5ee02841df40ca3fe0844365"},"user":"staff-secretary","deyt":{"$date":"2020-06-10T00:24:33.159Z"},"action":"Released document deleted","doc":"Job Order Sample.doc.boss.wannabe.pdf","serial":"::ffff:192.168.117.1","__v":0}
176+{"_id":{"$oid":"5ee02868df40ca3fe0844366"},"user":"invalid","deyt":{"$date":"2020-06-10T00:25:12.351Z"},"action":"Login Failed: wrongPass","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
177+{"_id":{"$oid":"5ee02870df40ca3fe0844367"},"user":"manager-it","deyt":{"$date":"2020-06-10T00:25:20.114Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
178+{"_id":{"$oid":"5ee028bbdf40ca3fe0844368"},"user":"manager-it","deyt":{"$date":"2020-06-10T00:26:35.241Z"},"action":"Route Document with non-Duty Admin Privilege to:LOGISTICS","doc":"Dear Mr.docx","serial":"::ffff:192.168.117.1","__v":0}
179+{"_id":{"$oid":"5ee028e8df40ca3fe084436b"},"user":"manager-it","deyt":{"$date":"2020-06-10T00:27:20.654Z"},"action":"Open file from the File Server","doc":"Job Order Sample.doc","serial":"::ffff:192.168.117.1","__v":0}
180+{"_id":{"$oid":"5ee02958df40ca3fe084436c"},"user":"manager-it","deyt":{"$date":"2020-06-10T00:29:12.382Z"},"action":"Route Document from File Server to: MARKETING","doc":"Job Order Sample.doc","serial":"::ffff:192.168.117.1","__v":0}
181+{"_id":{"$oid":"5ee0299adf40ca3fe0844371"},"user":"manager-marketing","deyt":{"$date":"2020-06-10T00:30:18.1Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
182+{"_id":{"$oid":"5ee029e0df40ca3fe0844372"},"user":"manager-marketing","deyt":{"$date":"2020-06-10T00:31:28.391Z"},"action":"Route Document with non-Duty Admin Privilege to:HR","doc":"Sales Report.xls","serial":"::ffff:192.168.117.1","__v":0}
183+{"_id":{"$oid":"5f23a860df40ca3fe0844375"},"user":"staff-secretary","deyt":{"$date":"2020-07-31T05:13:04.174Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
184+{"_id":{"$oid":"5f23df23963f2004a0f14899"},"user":"staff-secretary","deyt":{"$date":"2020-07-31T09:06:43.465Z"},"action":"Route Document with Duty Admin Privilege to: FINANCE","doc":"Work FInancial Plans.docx","serial":"::ffff:192.168.117.1","__v":0}
185+{"_id":{"$oid":"5f252397dc8a45b931586fd3"},"user":"administrator","deyt":{"$date":"2020-08-01T08:11:03.622Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
186+{"_id":{"$oid":"5f2523aadc8a45b931586fd4"},"user":"administrator","deyt":{"$date":"2020-08-01T08:11:22.272Z"},"action":"Update Drive Setting","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
187+{"_id":{"$oid":"5f2523eec62f27bd7f9d7b9c"},"user":"staff-finance","deyt":{"$date":"2020-08-01T08:12:30.412Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
188+{"_id":{"$oid":"5f252d6a86be4f412c845432"},"user":"staff-finance","deyt":{"$date":"2020-08-01T08:52:58.765Z"},"action":"Open file from the File Server","doc":"Business Introduction Letter.doc","serial":"::ffff:192.168.117.1","__v":0}
189+{"_id":{"$oid":"5f252da586be4f412c845433"},"user":"staff-finance","deyt":{"$date":"2020-08-01T08:53:57.411Z"},"action":"Send File to User/Person: staff-finance","doc":"Business Introduction Letter.doc","serial":"::ffff:192.168.117.1","__v":0}
190+{"_id":{"$oid":"5f252dbc86be4f412c845435"},"user":"staff-finance","deyt":{"$date":"2020-08-01T08:54:20.416Z"},"action":"Open file from the File Server","doc":"Business Introduction Letter.doc","serial":"::ffff:192.168.117.1","__v":0}
191+{"_id":{"$oid":"5f252e2686be4f412c845436"},"user":"staff-finance","deyt":{"$date":"2020-08-01T08:56:06.067Z"},"action":"Upload File","doc":"Intrusion_Detection_Systems.pdf","serial":"::ffff:192.168.117.1","__v":0}
192+{"_id":{"$oid":"5f252e2786be4f412c845437"},"user":"staff-finance","deyt":{"$date":"2020-08-01T08:56:07.872Z"},"action":"Open file from the File Server","doc":"Intrusion_Detection_Systems.pdf","serial":"::ffff:192.168.117.1","__v":0}
193+{"_id":{"$oid":"5f2617e5fe4ca9057a71a50c"},"user":"administrator","deyt":{"$date":"2020-08-02T01:33:25.655Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
194+{"_id":{"$oid":"5f2617f1fe4ca9057a71a50d"},"user":"administrator","deyt":{"$date":"2020-08-02T01:33:37.217Z"},"action":"Update Drive Setting","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
195+{"_id":{"$oid":"5f2617fdfe4ca9057a71a50e"},"user":"manager-it","deyt":{"$date":"2020-08-02T01:33:49.837Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
196+{"_id":{"$oid":"5f2618330131d1b4c46e8eb7"},"user":"manager-it","deyt":{"$date":"2020-08-02T01:34:43.821Z"},"action":"Open file from the File Server","doc":"Budget Proposal.pdf","serial":"::ffff:192.168.117.1","__v":0}
197+{"_id":{"$oid":"5f3f3c418c51b006777759a5"},"user":"manager-it","deyt":{"$date":"2020-08-21T03:15:13.345Z"},"action":"Login Successful","doc":"none","serial":"::ffff:192.168.117.1","__v":0}
--- /dev/null
+++ b/models/branches.json
@@ -0,0 +1,12 @@
1+{"_id":{"$oid":"5f1fd9fb6dfb3ee348370c9b"},"name":"FINANCE"}
2+{"_id":{"$oid":"5f1fdace6dfb3ee348370c9c"},"name":"MARKETING"}
3+{"_id":{"$oid":"5f1fdadf6dfb3ee348370c9d"},"name":"PRODUCTION"}
4+{"_id":{"$oid":"5f1fdae76dfb3ee348370c9e"},"name":"LOGISTICS"}
5+{"_id":{"$oid":"5f1fdaf16dfb3ee348370c9f"},"name":"HR"}
6+{"_id":{"$oid":"5f1fdaf76dfb3ee348370ca0"},"name":"IT"}
7+{"_id":{"$oid":"5f1fdb096dfb3ee348370ca1"},"name":"ACCOUNTING"}
8+{"_id":{"$oid":"5f1fdb126dfb3ee348370ca2"},"name":"QA"}
9+{"_id":{"$oid":"5f1fde1b6dfb3ee348370ca5"},"name":"SECRETARY-RECEIVING"}
10+{"_id":{"$oid":"5f1fdf406dfb3ee348370ca8"},"name":"All Branches"}
11+{"_id":{"$oid":"5f1fdf4b6dfb3ee348370ca9"},"name":"ASST.G.M."}
12+{"_id":{"$oid":"5f1fdf4e6dfb3ee348370caa"},"name":"G.M."}
--- /dev/null
+++ b/models/classes.json
@@ -0,0 +1,14 @@
1+{"_id":{"$oid":"5f20eeb08d2671765cbdae92"},"name":"Purchase Order","__v":0}
2+{"_id":{"$oid":"5f20ef3c8d2671765cbdae94"},"name":"Business Letter","__v":0}
3+{"_id":{"$oid":"5f20ef888d2671765cbdae96"},"name":"Contract","__v":0}
4+{"_id":{"$oid":"5f20ef998d2671765cbdae98"},"name":"Sales Report","__v":0}
5+{"_id":{"$oid":"5f20efb28d2671765cbdae9a"},"name":"Memorandum","__v":0}
6+{"_id":{"$oid":"5f20efb98d2671765cbdae9c"},"name":"SOP","__v":0}
7+{"_id":{"$oid":"5f20efdb8d2671765cbdae9e"},"name":"Disbursement Voucher","__v":0}
8+{"_id":{"$oid":"5f20f0228d2671765cbdaea0"},"name":"Marketing Plan","__v":0}
9+{"_id":{"$oid":"5f20f0338d2671765cbdaea2"},"name":"Financial Statement","__v":0}
10+{"_id":{"$oid":"5f20f04e8d2671765cbdaea4"},"name":"Transmittal Letter","__v":0}
11+{"_id":{"$oid":"5f20f06a8d2671765cbdaea6"},"name":"Job Order","__v":0}
12+{"_id":{"$oid":"5f20f0878d2671765cbdaea8"},"name":"Financial Plan","__v":0}
13+{"_id":{"$oid":"5f20f0ca8d2671765cbdaeaa"},"name":"Quotation","__v":0}
14+{"_id":{"$oid":"5f2139f4f8a328a3948ef9af"},"name":"Proposal","__v":0}
--- /dev/null
+++ b/models/commologs.json
@@ -0,0 +1,13 @@
1+{"_id":{"$oid":"5f212139c75239969dccb753"},"year":"2020","month":"JUL","branch":"SECRETARY-RECEIVING","count":3,"__v":0}
2+{"_id":{"$oid":"5f217cb770fae0b4f4d78f8f"},"year":"2020","month":"JUL","branch":"MARKETING","count":1,"__v":0}
3+{"_id":{"$oid":"5f217dd170fae0b4f4d78f95"},"year":"2020","month":"JUL","branch":"FINANCE","count":2,"__v":0}
4+{"_id":{"$oid":"5e409fbd0f9c34bc513726c5"},"year":"2020","month":"FEB","branch":"FINANCE","count":1,"__v":0}
5+{"_id":{"$oid":"5e4498898bb0280a35c583b2"},"year":"2020","month":"FEB","branch":"LOGISTICS","count":2,"__v":0}
6+{"_id":{"$oid":"5e4499c58bb0280a35c583c6"},"year":"2020","month":"FEB","branch":"HR","count":2,"__v":0}
7+{"_id":{"$oid":"5e60579826541f1f0ebb00b1"},"year":"2020","month":"MAR","branch":"LOGISTICS","count":1,"__v":0}
8+{"_id":{"$oid":"5e6059f5b11817219164c56d"},"year":"2020","month":"MAR","branch":"ACCOUNTING","count":1,"__v":0}
9+{"_id":{"$oid":"5ea0db76b11817219164c578"},"year":"2020","month":"APR","branch":"HR","count":1,"__v":0}
10+{"_id":{"$oid":"5ea0dd5cb11817219164c593"},"year":"2020","month":"APR","branch":"IT","count":1,"__v":0}
11+{"_id":{"$oid":"5ebddcfab11817219164c5b2"},"year":"2020","month":"MAY","branch":"PRODUCTION","count":1,"__v":0}
12+{"_id":{"$oid":"5ebdde79b11817219164c5be"},"year":"2020","month":"MAY","branch":"FINANCE","count":3,"__v":0}
13+{"_id":{"$oid":"5ee02958df40ca3fe084436f"},"year":"2020","month":"JUN","branch":"IT","count":1,"__v":0}
--- /dev/null
+++ b/models/monitoraccs.json
@@ -0,0 +1,14 @@
1+{"_id":{"$oid":"5e409fbd0f9c34bc513726c3"},"title":"Business Marketing Plan.pdf","filename":"Business Marketing Plan.pdf","filepath":"/edokyu/public/drive","route":[{"branch":["FINANCE"],"_id":{"$oid":"5e409fbd0f9c34bc513726c4"},"deyt":"10 Feb 2020 00:11"},{"branch":["LOGISTICS"],"_id":{"$oid":"5ebdddaab11817219164c5b7"},"deyt":"15 May 2020 00:09"}],"__v":0}
2+{"_id":{"$oid":"5e4498e38bb0280a35c583b6"},"title":"Standard Operating Procedure SOP.doc","filename":"Standard Operating Procedure SOP.doc.manager-logistics.pdf","filepath":"/edokyu/public/drive","route":[{"branch":["LOGISTICS"],"_id":{"$oid":"5e4498e38bb0280a35c583b7"},"deyt":"13 Feb 2020 00:31"},{"branch":["ACCOUNTING"],"_id":{"$oid":"5e6042bcc48510152d5fa99a"},"deyt":"05 Mar 2020 00:07"},{"branch":["G.M."],"_id":{"$oid":"5ea0dde7b11817219164c598"},"deyt":"23 Apr 2020 00:14"}],"__v":0}
3+{"_id":{"$oid":"5e4499c58bb0280a35c583c4"},"title":"Quotation Form.pdf","filename":"Quotation Form.pdf","filepath":"/edokyu/public/drive","route":[{"branch":["HR","MARKETING"],"_id":{"$oid":"5e4499c58bb0280a35c583c5"},"deyt":"13 Feb 2020 00:35"},{"branch":["LOGISTICS"],"_id":{"$oid":"5e605a8bb11817219164c571"},"deyt":"05 Mar 2020 01:48"}],"__v":0}
4+{"_id":{"$oid":"5e449a988bb0280a35c583ce"},"title":"Budget Proposal.pdf.manager-hr.pdf","filename":"Budget Proposal.pdf.manager-hr.pdf","filepath":"/edokyu/public/drive","route":[{"branch":["HR","ACCOUNTING"],"_id":{"$oid":"5e449a988bb0280a35c583cf"},"deyt":"13 Feb 2020 00:38"},{"branch":["MARKETING"],"_id":{"$oid":"5e6058d2b11817219164c55f"},"deyt":"05 Mar 2020 01:41"},{"branch":["LOGISTICS"],"_id":{"$oid":"5ea0de54b11817219164c59c"},"deyt":"23 Apr 2020 00:16"}],"__v":0}
5+{"_id":{"$oid":"5e6044f4c48510152d5fa99d"},"title":"Loan Contract","filename":"Loan Contract.pdf","filepath":"/edokyu/public/drive","route":[{"branch":["MARKETING"],"_id":{"$oid":"5f217cb770fae0b4f4d78f8e"},"deyt":"29 Jul 2020 13:42"},{"branch":["PRODUCTION"],"_id":{"$oid":"5e60451ac48510152d5fa9a1"},"deyt":"05 Mar 2020 00:17"},{"branch":["ACCOUNTING"],"_id":{"$oid":"5ebddc89b11817219164c5ac"},"deyt":"15 May 2020 00:04"}],"__v":0}
6+{"_id":{"$oid":"5e60579826541f1f0ebb00af"},"title":"Purchase Order.doc","filename":"Purchase Order.doc","filepath":"/edokyu/public/drive","route":[{"branch":["LOGISTICS","HR"],"_id":{"$oid":"5e60579826541f1f0ebb00b0"},"deyt":"05 Mar 2020 01:36"},{"branch":["IT"],"_id":{"$oid":"5ea0dcadb11817219164c581"},"deyt":"23 Apr 2020 00:09"}],"__v":0}
7+{"_id":{"$oid":"5e6059f5b11817219164c56b"},"title":"Business Introduction Letter.doc","filename":"Business Introduction Letter.doc","filepath":"/edokyu/public/drive","route":[{"branch":["ACCOUNTING","IT"],"_id":{"$oid":"5e6059f5b11817219164c56c"},"deyt":"05 Mar 2020 01:46"},{"branch":["All Branches","ASST.G.M."],"_id":{"$oid":"5ea0dd0fb11817219164c586"},"deyt":"23 Apr 2020 00:10"}],"__v":0}
8+{"_id":{"$oid":"5ea0dd5cb11817219164c591"},"title":"Payment Voucher.doc","filename":"Payment Voucher.doc.manager-production.pdf","filepath":"/edokyu/public/drive","route":[{"branch":["IT","PRODUCTION"],"_id":{"$oid":"5ea0dd5cb11817219164c592"},"deyt":"23 Apr 2020 00:12"},{"branch":["ASST.G.M."],"_id":{"$oid":"5ebddc34b11817219164c5a9"},"deyt":"15 May 2020 00:03"}],"__v":0}
9+{"_id":{"$oid":"5ebddcf5b11817219164c5b0"},"title":"Sales Report.xls","filename":"Sales Report.xls","filepath":"/edokyu/public/drive","route":[{"branch":["PRODUCTION","MARKETING"],"_id":{"$oid":"5ebddcf5b11817219164c5b1"},"deyt":"15 May 2020 00:06"},{"branch":["HR"],"_id":{"$oid":"5ee029e0df40ca3fe0844373"},"deyt":"10 Jun 2020 00:31"}],"__v":0}
10+{"_id":{"$oid":"5ebdde79b11817219164c5bc"},"title":"Taal Vista Hotel Reservation Confirmation.docx","filename":"Taal Vista Hotel Reservation Confirmation.docx","filepath":"/edokyu/public/drive","route":[{"branch":["FINANCE","ASST.G.M."],"_id":{"$oid":"5ebdde79b11817219164c5bd"},"deyt":"15 May 2020 00:12"}],"__v":0}
11+{"_id":{"$oid":"5ebddf4cb11817219164c5c4"},"title":"Obstacles Between You And A Paperless Office.docx","filename":"Obstacles Between You And A Paperless Office.docx","filepath":"/edokyu/public/drive","route":[{"branch":["FINANCE","ACCOUNTING"],"_id":{"$oid":"5ebddf4cb11817219164c5c5"},"deyt":"15 May 2020 00:16"}],"__v":0}
12+{"_id":{"$oid":"5ebddfd7b11817219164c5d4"},"title":"Dear Mr.docx","filename":"Dear Mr.docx","filepath":"/edokyu/public/drive","route":[{"branch":["FINANCE","IT"],"_id":{"$oid":"5ebddfd7b11817219164c5d5"},"deyt":"15 May 2020 00:18"},{"branch":["LOGISTICS"],"_id":{"$oid":"5ee028bbdf40ca3fe0844369"},"deyt":"10 Jun 2020 00:26"}],"__v":0}
13+{"_id":{"$oid":"5ee02958df40ca3fe084436d"},"title":"Job Order Sample-new.doc","filename":"Job Order Sample-new.doc","filepath":"/edokyu/public/drive","route":[{"branch":["IT","MARKETING"],"_id":{"$oid":"5ee02958df40ca3fe084436e"},"deyt":"10 Jun 2020 00:29"}],"__v":0}
14+{"_id":{"$oid":"5f23df23963f2004a0f1489a"},"title":"Work FInancial Plans.docx","filename":"Work FInancial Plans.docx","filepath":"/edokyu/public/drive","route":[{"branch":["FINANCE"],"_id":{"$oid":"5f23df23963f2004a0f1489b"},"deyt":"31 Jul 2020 09:06"}],"__v":0}
--- /dev/null
+++ b/models/pndocs.json
@@ -0,0 +1,329 @@
1+{"_id":{"$oid":"5f217fc970fae0b4f4d78fa4"},"projects":["Tsinelas"],"reference":["/drive/FINANCE/Draft/Budget Proposal.pdf"],"enclosure":["/drive/FINANCE/Draft/Disbursement Voucher.docx"],"comment":[{"branch":"staff-secretary-1596029987656","content":"Sir pls check"}],"id":"15960309216977","title":"Purchase Order.doc","filename":"public/drive/ACCOUNTING/Purchase Order.doc","category":"Purchase Order","author":"staff-marketing","deyt":{"$date":"2020-07-29T13:55:21.697Z"},"size":34816,"content":" Date: Serial Number: Purchase Order To Customer # Terms Ship To Salesperson Ship Week Of Order # Delivery Via Routing Please Ship the Following Items as Specified Item Quantity Ordered Description Unit Count Unit Price Total Amount Total Special Instructions Date Approval Signature Purchaser Signature Title ","routeslip":"/drive/Routing Slip/2020/JUL/route-Purchase Order.doc.pdf","__v":0}
2+{"_id":{"$oid":"5f217fc970fae0b4f4d78fa5"},"projects":["Tsinelas"],"reference":["/drive/FINANCE/Draft/Budget Proposal.pdf"],"enclosure":["/drive/FINANCE/Draft/Disbursement Voucher.docx.boss.wannabe.pdf"],"comment":[{"branch":"staff-secretary-1596029987656","content":"Sir pls check"}],"id":"15960309217015","title":"Purchase Order.doc","filename":"public/drive/ASST.G.M./Purchase Order.doc","category":"Purchase Order","author":"staff-marketing","deyt":{"$date":"2020-07-29T13:55:21.701Z"},"size":34816,"content":" Date: Serial Number: Purchase Order To Customer # Terms Ship To Salesperson Ship Week Of Order # Delivery Via Routing Please Ship the Following Items as Specified Item Quantity Ordered Description Unit Count Unit Price Total Amount Total Special Instructions Date Approval Signature Purchaser Signature Title ","routeslip":"/drive/Routing Slip/2020/JUL/route-Purchase Order.doc.pdf","__v":0}
3+{"_id":{"$oid":"5f217fc970fae0b4f4d78fa6"},"projects":["Tsinelas"],"reference":["/drive/FINANCE/Draft/Budget Proposal.pdf"],"enclosure":["/drive/FINANCE/Draft/Disbursement Voucher.docx"],"comment":[{"branch":"staff-secretary-1596029987656","content":"Sir pls check"}],"id":"15960309217043","title":"Purchase Order.doc","filename":"public/drive/PRODUCTION/Purchase Order.doc","category":"Purchase Order","author":"staff-marketing","deyt":{"$date":"2020-07-29T13:55:21.704Z"},"size":34816,"content":" Date: Serial Number: Purchase Order To Customer # Terms Ship To Salesperson Ship Week Of Order # Delivery Via Routing Please Ship the Following Items as Specified Item Quantity Ordered Description Unit Count Unit Price Total Amount Total Special Instructions Date Approval Signature Purchaser Signature Title ","routeslip":"/drive/Routing Slip/2020/JUL/route-Purchase Order.doc.pdf","__v":0}
4+{"_id":{"$oid":"5f217fc970fae0b4f4d78fa7"},"projects":["Tsinelas"],"reference":["/drive/FINANCE/Draft/Budget Proposal.pdf"],"enclosure":["/drive/FINANCE/Draft/Disbursement Voucher.docx"],"comment":[{"branch":"staff-secretary-1596029987656","content":"Sir pls check"}],"id":"15960309217083","title":"Purchase Order.doc","filename":"public/drive/LOGISTICS/Purchase Order.doc","category":"Purchase Order","author":"staff-marketing","deyt":{"$date":"2020-07-29T13:55:21.708Z"},"size":34816,"content":" Date: Serial Number: Purchase Order To Customer # Terms Ship To Salesperson Ship Week Of Order # Delivery Via Routing Please Ship the Following Items as Specified Item Quantity Ordered Description Unit Count Unit Price Total Amount Total Special Instructions Date Approval Signature Purchaser Signature Title ","routeslip":"/drive/Routing Slip/2020/JUL/route-Purchase Order.doc.pdf","__v":0}
5+{"_id":{"$oid":"5f217fc970fae0b4f4d78fa8"},"projects":["Tsinelas"],"reference":["/drive/FINANCE/Draft/Budget Proposal.pdf"],"enclosure":["/drive/FINANCE/Draft/Disbursement Voucher.docx"],"comment":[{"branch":"staff-secretary-1596029987656","content":"Sir pls check"}],"id":"15960309217536","title":"Purchase Order.doc","filename":"public/drive/FINANCE/Purchase Order.doc","category":"Purchase Order","author":"staff-marketing","deyt":{"$date":"2020-07-29T13:55:21.753Z"},"size":34816,"content":" Date: Serial Number: Purchase Order To Customer # Terms Ship To Salesperson Ship Week Of Order # Delivery Via Routing Please Ship the Following Items as Specified Item Quantity Ordered Description Unit Count Unit Price Total Amount Total Special Instructions Date Approval Signature Purchaser Signature Title ","routeslip":"/drive/Routing Slip/2020/JUL/route-Purchase Order.doc.pdf","__v":0}
6+{"_id":{"$oid":"5f217fc970fae0b4f4d78faa"},"projects":["Tsinelas"],"reference":["/drive/FINANCE/Draft/Budget Proposal.pdf"],"enclosure":["/drive/FINANCE/Draft/Disbursement Voucher.docx"],"comment":[{"branch":"staff-secretary-1596029987656","content":"Sir pls check"}],"id":"15960309218517","title":"Purchase Order.doc","filename":"public/drive/IT/Purchase Order.doc","category":"Purchase Order","author":"staff-marketing","deyt":{"$date":"2020-07-29T13:55:21.852Z"},"size":34816,"content":" Date: Serial Number: Purchase Order To Customer # Terms Ship To Salesperson Ship Week Of Order # Delivery Via Routing Please Ship the Following Items as Specified Item Quantity Ordered Description Unit Count Unit Price Total Amount Total Special Instructions Date Approval Signature Purchaser Signature Title ","routeslip":"/drive/Routing Slip/2020/APR/route-Purchase Order.doc.pdf","__v":0}
7+{"_id":{"$oid":"5f217fc970fae0b4f4d78fab"},"projects":["Tsinelas"],"reference":["/drive/FINANCE/Draft/Budget Proposal.pdf"],"enclosure":["/drive/FINANCE/Draft/Disbursement Voucher.docx"],"comment":[{"branch":"staff-secretary-1596029987656","content":"Sir pls check"}],"id":"15960309218626","title":"Purchase Order.doc","filename":"public/drive/QA/Purchase Order.doc","category":"Purchase Order","author":"staff-marketing","deyt":{"$date":"2020-07-29T13:55:21.862Z"},"size":34816,"content":" Date: Serial Number: Purchase Order To Customer # Terms Ship To Salesperson Ship Week Of Order # Delivery Via Routing Please Ship the Following Items as Specified Item Quantity Ordered Description Unit Count Unit Price Total Amount Total Special Instructions Date Approval Signature Purchaser Signature Title ","routeslip":"/drive/Routing Slip/2020/JUL/route-Purchase Order.doc.pdf","__v":0}
8+{"_id":{"$oid":"5f217fc970fae0b4f4d78fac"},"projects":["Tsinelas"],"reference":["/drive/FINANCE/Draft/Budget Proposal.pdf"],"enclosure":["/drive/FINANCE/Draft/Disbursement Voucher.docx"],"comment":[{"branch":"staff-secretary-1596029987656","content":"Sir pls check"}],"id":"15960309218690","title":"Purchase Order.doc","filename":"public/drive/SECRETARY-RECEIVING/Purchase Order.doc","category":"Purchase Order","author":"staff-marketing","deyt":{"$date":"2020-07-29T13:55:21.869Z"},"size":34816,"content":" Date: Serial Number: Purchase Order To Customer # Terms Ship To Salesperson Ship Week Of Order # Delivery Via Routing Please Ship the Following Items as Specified Item Quantity Ordered Description Unit Count Unit Price Total Amount Total Special Instructions Date Approval Signature Purchaser Signature Title ","routeslip":"/drive/Routing Slip/2020/JUL/route-Purchase Order.doc.pdf","__v":0}
9+{"_id":{"$oid":"5f2181af70fae0b4f4d78fb2"},"projects":["Tsinelas"],"reference":["/drive/FINANCE/Draft/Budget Proposal.pdf"],"enclosure":["/drive/FINANCE/Draft/Disbursement Voucher.docx.boss.wannabe.pdf"],"comment":[{"branch":"staff-secretary-1596029987656","content":"Sir pls check"}],"id":"15960314078414","title":"Purchase Order.doc.boss.wannabe.pdf","filename":"public/drive/GM/Purchase Order.doc.boss.wannabe.pdf","category":"Purchase Order","author":"staff-marketing","deyt":{"$date":"2020-07-29T13:55:21.701Z"},"size":34816,"content":" Date: Serial Number: Purchase Order To Customer # Terms Ship To Salesperson Ship Week Of Order # Delivery Via Routing Please Ship the Following Items as Specified Item Quantity Ordered Description Unit Count Unit Price Total Amount Total Special Instructions Date Approval Signature Purchaser Signature Title ","routeslip":"/drive/Routing Slip/2020/JUL/route-Purchase Order.doc.boss.wannabe.pdf.pdf","__v":0}
10+{"_id":{"$oid":"5e4498e38bb0280a35c583b9"},"projects":[],"reference":[],"enclosure":["/drive/FINANCE/Draft/Business Marketing Plan.pdf"],"comment":[],"id":"15815538914055","title":"Standard Operating Procedure SOP.doc","filename":"public/drive/LOGISTICS/Standard Operating Procedure SOP.doc","category":"","author":"staff-secretary","deyt":{"$date":"2020-02-13T00:31:31.405Z"},"size":87040,"content":"Standard Operating Procedure 1. Purpose Describe the process for <official name of SOP>. Describe relevant background information. 2. Scope Identify the intended audience and /or activities where the SOP may be relevant. 3. Prerequisites Outline information required before proceeding with the listed procedure; for example, worksheets, documents, IFAS reports, etc. 4. Responsibilities Identify the personnel that have a primary role in the SOP and describe how their responsibilities relate to this SOP. If necessary, include contact information. 5. Procedure Provide the steps required to perform this procedure (who, what, when, where, why, how). Include a process flowchart. 6. References List resources that may be useful when performing the procedure; for example, Admin policies, Municipal Code, government standards and other SOPs. 7. Definitions Identify and define frequently used terms or acronyms. Provide additional and/or relevant information needed to understand this SOP. ","routeslip":"/drive/Routing Slip/2020/FEB/route-Standard Operating Procedure SOP.doc.pdf","__v":0}
11+{"_id":{"$oid":"5e60560926541f1f0ebb00ac"},"projects":["Defense"],"reference":["/drive/FINANCE/Draft/Business Marketing Plan.pdf"],"enclosure":[],"comment":[{"branch":"staff-secretary-1596088766004","content":"hello"}],"id":"15833717859482","title":"Transmittal Letter.doc","filename":"public/drive/Boss/Transmittal Letter.doc","category":"Business Letter","author":"staff-logistics","deyt":{"$date":"2020-03-05T01:29:45.948Z"},"size":96256,"content":" United Department of the Interior NATIONAL PARK SERVICE DENVER SERVICE CENTER 12795 W. Alameda Parkway P.O. Box 25287 Denver, Colorado 80225-0287 IN REPLY REFER TO: Gentlemen: Reference: Park, _____ County, State, Contract No. 1443CX_____, Developed Area, Project Title, PARK-PMIS Subject: Pre-Construction Conference Minutes Attached please find your copy of the minutes from the pre-construction conference held on date. After reviewing the minutes for errors and omissions, please indicate receipt and approval of the minutes by signing and returning two copies of this letter to this office. Sincerely, Name Contracting Officer ************************************************************************************* Received: By: Company Name Title: _________________________________________ Date: _________________________________________ bcc: DSC-PM, Name Supt., _____ ","routeslip":"/drive/Routing Slip/2020/JUL/route-Transmittal Letter.doc.pdf","__v":0}
12+{"_id":{"$oid":"5e6059f5b11817219164c56e"},"projects":["utang"],"reference":["/drive/FINANCE/Draft/Sales Report.xls"],"enclosure":[],"comment":[{"branch":"staff-accounting-1596098158183","content":"sir for comment"},{"branch":"manager-accounting-1596098235867","content":"ok na to"}],"id":"15833727893506","title":"Business Introduction Letter.doc","filename":"public/drive/IT/Business Introduction Letter.doc","category":"Business Letter","author":"manager-accounting","deyt":{"$date":"2020-03-05T01:46:29.35Z"},"size":28672,"content":" (print Business Introduction Letter on corporate letterhead paper) \u000bFebruary 20, 20xx  Ms. Margaret Campion\u000bDirector, Corporate Services\u000bRiviera Industries Inc.\u000b245 Dearborn Park Road\u000bChicago, Il 60610\u000b\u000b\u000bDear Ms. Campion:\u000b\u000bIt was a pleasure meeting you briefly at last week's Board of Trade event. It's amazing how small the world does seem sometimes, considering that we both earned our undergraduate degrees at U. of Kansas, even overlapping for one year! I suppose we were destined to eventually meet face-to-face. \u000b\u000bI was fascinated by your synopsis of the history of Riviera Industries over the past, almost half-century. Clearly, your company has a rich corporate heritage and tradition. At the same time, the company has been blessed with a continuum of leaders of foresight and imagination who had the courage to change course at key points along the way so that the company could remain competitive and continue to lead its industry. \u000b\u000bAs I was mentioning to you, Final Edition Publications is a specialty publisher that focuses on corporate publications including annual reports, corporate profiles and corporate histories. We have been in business for over 15 years and during that time have grown from a two-person start-up, to a serious corporate publisher with over 100 employees. We have been contracted by over a dozen Fortune 500 companies to produce both annual and special occasion publications on their behalf. \u000b\u000bAfter our chat at last week's meeting, it occurred to me that with Riviera approaching its 50th anniversary, it would be the perfect occasion to produce a Corporate History to celebrate your company's first half-century. It so happens, that these are exactly the types of corporate publications that we specialize in here at Final Edition. In fact, we have produced corporate histories for dozens of companies. \u000b\u000bWith Riviera's 50th just around the corner, I'm sure that you have been thinking about ways to make that anniversary a special one. Accordingly, I would ","routeslip":"/drive/Routing Slip/2020/APR/route-Business Introduction Letter.doc.pdf","__v":0}
13+{"_id":{"$oid":"5e605a8bb11817219164c572"},"projects":["Construction"],"reference":["/drive/MARKETING/Draft/Budget Proposal.pdf"],"enclosure":[],"comment":[{"branch":"manager-hr-1596089092907","content":"please comment"},{"branch":"manager-marketing-1596098346740","content":"ok go"}],"id":"15833729392944","title":"Quotation Form.pdf","filename":"public/drive/LOGISTICS/Quotation Form.pdf","category":"Quotation","author":"manager-hr","deyt":{"$date":"2020-02-13T00:35:17.765Z"},"size":107832,"content":"Community Fund – Contractor Quote Form Please get your contractor to complete this form and attach a copy of the contractor quote with a detailed breakdown of the cost and the works. For guidance on how to complete this form please visit www.sseairtricity.com or www.sse.com/ireland for sample completed forms with FAQ's. It is important that this form is completed in full before we can consider the application. a. Contractor Details Contractor Name: Contact Name: Address: Contact Telephone Number: Contact Email: Registered with SEAI? What is your SEAI number? Estimated Project Start Date: Estimated Project End Date: b. Quote Details Project Details: (Please give a description of the project details that you have been requested to quote for) Building Details Year of construction: Floor Area m² Wall Area m² Roof Area m² Volume of Building m 3 Number of floors Door Area m² Glazing Area m² Roof light Area m² Does the space heating system also heat the hot water? Y/N For Loft insulation projects please specify the following: New Insulation Product Type: Conductivity of Insulation of the Product Type: W/mK Thickness of the insulation being installed: mm What is the coverage area of the insulation? m 2 U-Value after Proposed Work: W/m 2 K For Wall insulation projects please specify the following: Insulation method? Cavity/External/Internal (delete as appropriate) New Insulation Product Type: Conductivity of Insulation of the Product Type: W/mK Thickness of the insulation being installed: mm What is the coverage area of the insulation? m 2 U-Value after Proposed Work: W/m 2 K For window/door replacements please specify the following: What is the number of doors / windows being replaced? doors windows What m 2 area is being replaced? m 2 doors m 2 windows U-Value after proposed work Doors: W/m 2 K U-Value after proposed work Windows: W/m 2 K For Boiler heating system replacements / upgrades please specify the following: Existing Heating System Fuel type Make: Model: Year of M","routeslip":"/drive/Routing Slip/2020/MAR/route-Quotation Form.pdf.pdf","__v":0}
14+{"_id":{"$oid":"5ea0db76b11817219164c57a"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15876002469128","title":"Job Order Sample.doc","filename":"public/drive/ASST.G.M./Job Order Sample.doc","category":"Job Order","author":"staff-hr","deyt":{"$date":"2020-04-23T00:04:06.912Z"},"size":38400,"content":" ADDITIONAL JOB ORDER ______________________________) Name and Address of ______________________________) Philippine Agent ______________________________) Sir: Please be informed that our Company is in need of the following workers to work in the United Arab Emirates and we would like your agency to handle the recruitment for us: JOB TITLE/CATEGORIES NUMBER REQUIRED BASIC SALARY (US $/DHS) 1. 2. 3. TOTAL TERMS AND CONDITIONS: Free airline ticket from the Philippines to the site of employment and return after completion of contract. Free food and accommodation Free transportation from accommodation to the site of work Two years contract. Visa and medical fees, labour card and all other fees, if any will be paid for by the company. (FOR DRIVERS ONLY) The sponsor shall secure the driver with accident insurance and the vehicle assigned to him/her or will be driven by him/her during the entire duration of the contract shall be covered by a comprehensive vehicle insurance. The Employer shall assist the driver in applying for his driver’s license and will not charge him of expenses incurred in securing same. Meantime that the driver is securing his license, his/her salaries and allowances shall continuously be given to him from the time of his arrival at the jobsite. The employer will pay for the repatriation cost if in case the driver fails the driver’s test. Other terms and conditions according to UAE laws. Very truly yours, _________________________ Print Name/Signature\u0001 ","routeslip":"/drive/Routing Slip/2020/APR/route-Job Order Sample.doc.pdf","__v":0}
15+{"_id":{"$oid":"5ea0dd0fb11817219164c584"},"projects":["utang"],"reference":["/drive/FINANCE/Draft/Sales Report.xls"],"enclosure":[],"comment":[{"branch":"staff-accounting-1596098158183","content":"sir for comment"},{"branch":"manager-accounting-1596098235867","content":"ok na to"}],"id":"15876006550775","title":"Business Introduction Letter.doc","filename":"public/drive/PRODUCTION/Business Introduction Letter.doc","category":"Business Letter","author":"manager-accounting","deyt":{"$date":"2020-03-05T01:46:29.35Z"},"size":28672,"content":" (print Business Introduction Letter on corporate letterhead paper) \u000bFebruary 20, 20xx  Ms. Margaret Campion\u000bDirector, Corporate Services\u000bRiviera Industries Inc.\u000b245 Dearborn Park Road\u000bChicago, Il 60610\u000b\u000b\u000bDear Ms. Campion:\u000b\u000bIt was a pleasure meeting you briefly at last week's Board of Trade event. It's amazing how small the world does seem sometimes, considering that we both earned our undergraduate degrees at U. of Kansas, even overlapping for one year! I suppose we were destined to eventually meet face-to-face. \u000b\u000bI was fascinated by your synopsis of the history of Riviera Industries over the past, almost half-century. Clearly, your company has a rich corporate heritage and tradition. At the same time, the company has been blessed with a continuum of leaders of foresight and imagination who had the courage to change course at key points along the way so that the company could remain competitive and continue to lead its industry. \u000b\u000bAs I was mentioning to you, Final Edition Publications is a specialty publisher that focuses on corporate publications including annual reports, corporate profiles and corporate histories. We have been in business for over 15 years and during that time have grown from a two-person start-up, to a serious corporate publisher with over 100 employees. We have been contracted by over a dozen Fortune 500 companies to produce both annual and special occasion publications on their behalf. \u000b\u000bAfter our chat at last week's meeting, it occurred to me that with Riviera approaching its 50th anniversary, it would be the perfect occasion to produce a Corporate History to celebrate your company's first half-century. It so happens, that these are exactly the types of corporate publications that we specialize in here at Final Edition. In fact, we have produced corporate histories for dozens of companies. \u000b\u000bWith Riviera's 50th just around the corner, I'm sure that you have been thinking about ways to make that anniversary a special one. Accordingly, I would ","routeslip":"/drive/Routing Slip/2020/APR/route-Business Introduction Letter.doc.pdf","__v":0}
16+{"_id":{"$oid":"5ea0dd0fb11817219164c585"},"projects":["utang"],"reference":["/drive/FINANCE/Draft/Sales Report.xls"],"enclosure":[],"comment":[{"branch":"staff-accounting-1596098158183","content":"sir for comment"},{"branch":"manager-accounting-1596098235867","content":"ok na to"}],"id":"15876006550846","title":"Business Introduction Letter.doc","filename":"public/drive/ASST.G.M./Business Introduction Letter.doc","category":"Business Letter","author":"manager-accounting","deyt":{"$date":"2020-03-05T01:46:29.35Z"},"size":28672,"content":" (print Business Introduction Letter on corporate letterhead paper) \u000bFebruary 20, 20xx  Ms. Margaret Campion\u000bDirector, Corporate Services\u000bRiviera Industries Inc.\u000b245 Dearborn Park Road\u000bChicago, Il 60610\u000b\u000b\u000bDear Ms. Campion:\u000b\u000bIt was a pleasure meeting you briefly at last week's Board of Trade event. It's amazing how small the world does seem sometimes, considering that we both earned our undergraduate degrees at U. of Kansas, even overlapping for one year! I suppose we were destined to eventually meet face-to-face. \u000b\u000bI was fascinated by your synopsis of the history of Riviera Industries over the past, almost half-century. Clearly, your company has a rich corporate heritage and tradition. At the same time, the company has been blessed with a continuum of leaders of foresight and imagination who had the courage to change course at key points along the way so that the company could remain competitive and continue to lead its industry. \u000b\u000bAs I was mentioning to you, Final Edition Publications is a specialty publisher that focuses on corporate publications including annual reports, corporate profiles and corporate histories. We have been in business for over 15 years and during that time have grown from a two-person start-up, to a serious corporate publisher with over 100 employees. We have been contracted by over a dozen Fortune 500 companies to produce both annual and special occasion publications on their behalf. \u000b\u000bAfter our chat at last week's meeting, it occurred to me that with Riviera approaching its 50th anniversary, it would be the perfect occasion to produce a Corporate History to celebrate your company's first half-century. It so happens, that these are exactly the types of corporate publications that we specialize in here at Final Edition. In fact, we have produced corporate histories for dozens of companies. \u000b\u000bWith Riviera's 50th just around the corner, I'm sure that you have been thinking about ways to make that anniversary a special one. Accordingly, I would ","routeslip":"/drive/Routing Slip/2020/APR/route-Business Introduction Letter.doc.pdf","__v":0}
17+{"_id":{"$oid":"5ea0dd0fb11817219164c587"},"projects":["utang"],"reference":["/drive/FINANCE/Draft/Sales Report.xls"],"enclosure":[],"comment":[{"branch":"staff-accounting-1596098158183","content":"sir for comment"},{"branch":"manager-accounting-1596098235867","content":"ok na to"}],"id":"15876006550995","title":"Business Introduction Letter.doc","filename":"public/drive/FINANCE/Business Introduction Letter.doc","category":"Business Letter","author":"manager-accounting","deyt":{"$date":"2020-03-05T01:46:29.35Z"},"size":28672,"content":" (print Business Introduction Letter on corporate letterhead paper) \u000bFebruary 20, 20xx  Ms. Margaret Campion\u000bDirector, Corporate Services\u000bRiviera Industries Inc.\u000b245 Dearborn Park Road\u000bChicago, Il 60610\u000b\u000b\u000bDear Ms. Campion:\u000b\u000bIt was a pleasure meeting you briefly at last week's Board of Trade event. It's amazing how small the world does seem sometimes, considering that we both earned our undergraduate degrees at U. of Kansas, even overlapping for one year! I suppose we were destined to eventually meet face-to-face. \u000b\u000bI was fascinated by your synopsis of the history of Riviera Industries over the past, almost half-century. Clearly, your company has a rich corporate heritage and tradition. At the same time, the company has been blessed with a continuum of leaders of foresight and imagination who had the courage to change course at key points along the way so that the company could remain competitive and continue to lead its industry. \u000b\u000bAs I was mentioning to you, Final Edition Publications is a specialty publisher that focuses on corporate publications including annual reports, corporate profiles and corporate histories. We have been in business for over 15 years and during that time have grown from a two-person start-up, to a serious corporate publisher with over 100 employees. We have been contracted by over a dozen Fortune 500 companies to produce both annual and special occasion publications on their behalf. \u000b\u000bAfter our chat at last week's meeting, it occurred to me that with Riviera approaching its 50th anniversary, it would be the perfect occasion to produce a Corporate History to celebrate your company's first half-century. It so happens, that these are exactly the types of corporate publications that we specialize in here at Final Edition. In fact, we have produced corporate histories for dozens of companies. \u000b\u000bWith Riviera's 50th just around the corner, I'm sure that you have been thinking about ways to make that anniversary a special one. Accordingly, I would ","routeslip":"/drive/Routing Slip/2020/APR/route-Business Introduction Letter.doc.pdf","__v":0}
18+{"_id":{"$oid":"5ea0dd0fb11817219164c588"},"projects":["utang"],"reference":["/drive/FINANCE/Draft/Sales Report.xls"],"enclosure":[],"comment":[{"branch":"staff-accounting-1596098158183","content":"sir for comment"},{"branch":"manager-accounting-1596098235867","content":"ok na to"}],"id":"15876006551051","title":"Business Introduction Letter.doc","filename":"public/drive/MARKETING/Business Introduction Letter.doc","category":"Business Letter","author":"manager-accounting","deyt":{"$date":"2020-03-05T01:46:29.35Z"},"size":28672,"content":" (print Business Introduction Letter on corporate letterhead paper) \u000bFebruary 20, 20xx  Ms. Margaret Campion\u000bDirector, Corporate Services\u000bRiviera Industries Inc.\u000b245 Dearborn Park Road\u000bChicago, Il 60610\u000b\u000b\u000bDear Ms. Campion:\u000b\u000bIt was a pleasure meeting you briefly at last week's Board of Trade event. It's amazing how small the world does seem sometimes, considering that we both earned our undergraduate degrees at U. of Kansas, even overlapping for one year! I suppose we were destined to eventually meet face-to-face. \u000b\u000bI was fascinated by your synopsis of the history of Riviera Industries over the past, almost half-century. Clearly, your company has a rich corporate heritage and tradition. At the same time, the company has been blessed with a continuum of leaders of foresight and imagination who had the courage to change course at key points along the way so that the company could remain competitive and continue to lead its industry. \u000b\u000bAs I was mentioning to you, Final Edition Publications is a specialty publisher that focuses on corporate publications including annual reports, corporate profiles and corporate histories. We have been in business for over 15 years and during that time have grown from a two-person start-up, to a serious corporate publisher with over 100 employees. We have been contracted by over a dozen Fortune 500 companies to produce both annual and special occasion publications on their behalf. \u000b\u000bAfter our chat at last week's meeting, it occurred to me that with Riviera approaching its 50th anniversary, it would be the perfect occasion to produce a Corporate History to celebrate your company's first half-century. It so happens, that these are exactly the types of corporate publications that we specialize in here at Final Edition. In fact, we have produced corporate histories for dozens of companies. \u000b\u000bWith Riviera's 50th just around the corner, I'm sure that you have been thinking about ways to make that anniversary a special one. Accordingly, I would ","routeslip":"/drive/Routing Slip/2020/APR/route-Business Introduction Letter.doc.pdf","__v":0}
19+{"_id":{"$oid":"5ea0dd0fb11817219164c589"},"projects":["utang"],"reference":["/drive/FINANCE/Draft/Sales Report.xls"],"enclosure":[],"comment":[{"branch":"staff-accounting-1596098158183","content":"sir for comment"},{"branch":"manager-accounting-1596098235867","content":"ok na to"}],"id":"15876006551090","title":"Business Introduction Letter.doc","filename":"public/drive/LOGISTICS/Business Introduction Letter.doc","category":"Business Letter","author":"manager-accounting","deyt":{"$date":"2020-03-05T01:46:29.35Z"},"size":28672,"content":" (print Business Introduction Letter on corporate letterhead paper) \u000bFebruary 20, 20xx  Ms. Margaret Campion\u000bDirector, Corporate Services\u000bRiviera Industries Inc.\u000b245 Dearborn Park Road\u000bChicago, Il 60610\u000b\u000b\u000bDear Ms. Campion:\u000b\u000bIt was a pleasure meeting you briefly at last week's Board of Trade event. It's amazing how small the world does seem sometimes, considering that we both earned our undergraduate degrees at U. of Kansas, even overlapping for one year! I suppose we were destined to eventually meet face-to-face. \u000b\u000bI was fascinated by your synopsis of the history of Riviera Industries over the past, almost half-century. Clearly, your company has a rich corporate heritage and tradition. At the same time, the company has been blessed with a continuum of leaders of foresight and imagination who had the courage to change course at key points along the way so that the company could remain competitive and continue to lead its industry. \u000b\u000bAs I was mentioning to you, Final Edition Publications is a specialty publisher that focuses on corporate publications including annual reports, corporate profiles and corporate histories. We have been in business for over 15 years and during that time have grown from a two-person start-up, to a serious corporate publisher with over 100 employees. We have been contracted by over a dozen Fortune 500 companies to produce both annual and special occasion publications on their behalf. \u000b\u000bAfter our chat at last week's meeting, it occurred to me that with Riviera approaching its 50th anniversary, it would be the perfect occasion to produce a Corporate History to celebrate your company's first half-century. It so happens, that these are exactly the types of corporate publications that we specialize in here at Final Edition. In fact, we have produced corporate histories for dozens of companies. \u000b\u000bWith Riviera's 50th just around the corner, I'm sure that you have been thinking about ways to make that anniversary a special one. Accordingly, I would ","routeslip":"/drive/Routing Slip/2020/APR/route-Business Introduction Letter.doc.pdf","__v":0}
20+{"_id":{"$oid":"5ea0dd0fb11817219164c58b"},"projects":["utang"],"reference":["/drive/FINANCE/Draft/Sales Report.xls"],"enclosure":[],"comment":[{"branch":"staff-accounting-1596098158183","content":"sir for comment"},{"branch":"manager-accounting-1596098235867","content":"ok na to"}],"id":"15876006551411","title":"Business Introduction Letter.doc","filename":"public/drive/ACCOUNTING/Business Introduction Letter.doc","category":"Business Letter","author":"manager-accounting","deyt":{"$date":"2020-03-05T01:46:29.35Z"},"size":28672,"content":" (print Business Introduction Letter on corporate letterhead paper) \u000bFebruary 20, 20xx  Ms. Margaret Campion\u000bDirector, Corporate Services\u000bRiviera Industries Inc.\u000b245 Dearborn Park Road\u000bChicago, Il 60610\u000b\u000b\u000bDear Ms. Campion:\u000b\u000bIt was a pleasure meeting you briefly at last week's Board of Trade event. It's amazing how small the world does seem sometimes, considering that we both earned our undergraduate degrees at U. of Kansas, even overlapping for one year! I suppose we were destined to eventually meet face-to-face. \u000b\u000bI was fascinated by your synopsis of the history of Riviera Industries over the past, almost half-century. Clearly, your company has a rich corporate heritage and tradition. At the same time, the company has been blessed with a continuum of leaders of foresight and imagination who had the courage to change course at key points along the way so that the company could remain competitive and continue to lead its industry. \u000b\u000bAs I was mentioning to you, Final Edition Publications is a specialty publisher that focuses on corporate publications including annual reports, corporate profiles and corporate histories. We have been in business for over 15 years and during that time have grown from a two-person start-up, to a serious corporate publisher with over 100 employees. We have been contracted by over a dozen Fortune 500 companies to produce both annual and special occasion publications on their behalf. \u000b\u000bAfter our chat at last week's meeting, it occurred to me that with Riviera approaching its 50th anniversary, it would be the perfect occasion to produce a Corporate History to celebrate your company's first half-century. It so happens, that these are exactly the types of corporate publications that we specialize in here at Final Edition. In fact, we have produced corporate histories for dozens of companies. \u000b\u000bWith Riviera's 50th just around the corner, I'm sure that you have been thinking about ways to make that anniversary a special one. Accordingly, I would ","routeslip":"/drive/Routing Slip/2020/APR/route-Business Introduction Letter.doc.pdf","__v":0}
21+{"_id":{"$oid":"5ea0dd0fb11817219164c58c"},"projects":["utang"],"reference":["/drive/FINANCE/Draft/Sales Report.xls"],"enclosure":[],"comment":[{"branch":"staff-accounting-1596098158183","content":"sir for comment"},{"branch":"manager-accounting-1596098235867","content":"ok na to"}],"id":"15876006551461","title":"Business Introduction Letter.doc","filename":"public/drive/QA/Business Introduction Letter.doc","category":"Business Letter","author":"manager-accounting","deyt":{"$date":"2020-03-05T01:46:29.35Z"},"size":28672,"content":" (print Business Introduction Letter on corporate letterhead paper) \u000bFebruary 20, 20xx  Ms. Margaret Campion\u000bDirector, Corporate Services\u000bRiviera Industries Inc.\u000b245 Dearborn Park Road\u000bChicago, Il 60610\u000b\u000b\u000bDear Ms. Campion:\u000b\u000bIt was a pleasure meeting you briefly at last week's Board of Trade event. It's amazing how small the world does seem sometimes, considering that we both earned our undergraduate degrees at U. of Kansas, even overlapping for one year! I suppose we were destined to eventually meet face-to-face. \u000b\u000bI was fascinated by your synopsis of the history of Riviera Industries over the past, almost half-century. Clearly, your company has a rich corporate heritage and tradition. At the same time, the company has been blessed with a continuum of leaders of foresight and imagination who had the courage to change course at key points along the way so that the company could remain competitive and continue to lead its industry. \u000b\u000bAs I was mentioning to you, Final Edition Publications is a specialty publisher that focuses on corporate publications including annual reports, corporate profiles and corporate histories. We have been in business for over 15 years and during that time have grown from a two-person start-up, to a serious corporate publisher with over 100 employees. We have been contracted by over a dozen Fortune 500 companies to produce both annual and special occasion publications on their behalf. \u000b\u000bAfter our chat at last week's meeting, it occurred to me that with Riviera approaching its 50th anniversary, it would be the perfect occasion to produce a Corporate History to celebrate your company's first half-century. It so happens, that these are exactly the types of corporate publications that we specialize in here at Final Edition. In fact, we have produced corporate histories for dozens of companies. \u000b\u000bWith Riviera's 50th just around the corner, I'm sure that you have been thinking about ways to make that anniversary a special one. Accordingly, I would ","routeslip":"/drive/Routing Slip/2020/APR/route-Business Introduction Letter.doc.pdf","__v":0}
22+{"_id":{"$oid":"5ea0dd0fb11817219164c58d"},"projects":["utang"],"reference":["/drive/FINANCE/Draft/Sales Report.xls"],"enclosure":[],"comment":[{"branch":"staff-accounting-1596098158183","content":"sir for comment"},{"branch":"manager-accounting-1596098235867","content":"ok na to"}],"id":"15876006551685","title":"Business Introduction Letter.doc","filename":"public/drive/SECRETARY-RECEIVING/Business Introduction Letter.doc","category":"Business Letter","author":"manager-accounting","deyt":{"$date":"2020-03-05T01:46:29.35Z"},"size":28672,"content":" (print Business Introduction Letter on corporate letterhead paper) \u000bFebruary 20, 20xx  Ms. Margaret Campion\u000bDirector, Corporate Services\u000bRiviera Industries Inc.\u000b245 Dearborn Park Road\u000bChicago, Il 60610\u000b\u000b\u000bDear Ms. Campion:\u000b\u000bIt was a pleasure meeting you briefly at last week's Board of Trade event. It's amazing how small the world does seem sometimes, considering that we both earned our undergraduate degrees at U. of Kansas, even overlapping for one year! I suppose we were destined to eventually meet face-to-face. \u000b\u000bI was fascinated by your synopsis of the history of Riviera Industries over the past, almost half-century. Clearly, your company has a rich corporate heritage and tradition. At the same time, the company has been blessed with a continuum of leaders of foresight and imagination who had the courage to change course at key points along the way so that the company could remain competitive and continue to lead its industry. \u000b\u000bAs I was mentioning to you, Final Edition Publications is a specialty publisher that focuses on corporate publications including annual reports, corporate profiles and corporate histories. We have been in business for over 15 years and during that time have grown from a two-person start-up, to a serious corporate publisher with over 100 employees. We have been contracted by over a dozen Fortune 500 companies to produce both annual and special occasion publications on their behalf. \u000b\u000bAfter our chat at last week's meeting, it occurred to me that with Riviera approaching its 50th anniversary, it would be the perfect occasion to produce a Corporate History to celebrate your company's first half-century. It so happens, that these are exactly the types of corporate publications that we specialize in here at Final Edition. In fact, we have produced corporate histories for dozens of companies. \u000b\u000bWith Riviera's 50th just around the corner, I'm sure that you have been thinking about ways to make that anniversary a special one. Accordingly, I would ","routeslip":"/drive/Routing Slip/2020/APR/route-Business Introduction Letter.doc.pdf","__v":0}
23+{"_id":{"$oid":"5ea0dd0fb11817219164c58e"},"projects":["utang"],"reference":["/drive/FINANCE/Draft/Sales Report.xls"],"enclosure":[],"comment":[{"branch":"staff-accounting-1596098158183","content":"sir for comment"},{"branch":"manager-accounting-1596098235867","content":"ok na to"}],"id":"15876006552006","title":"Business Introduction Letter.doc","filename":"public/drive/G.M./Business Introduction Letter.doc","category":"Business Letter","author":"manager-accounting","deyt":{"$date":"2020-03-05T01:46:29.35Z"},"size":28672,"content":" (print Business Introduction Letter on corporate letterhead paper) \u000bFebruary 20, 20xx  Ms. Margaret Campion\u000bDirector, Corporate Services\u000bRiviera Industries Inc.\u000b245 Dearborn Park Road\u000bChicago, Il 60610\u000b\u000b\u000bDear Ms. Campion:\u000b\u000bIt was a pleasure meeting you briefly at last week's Board of Trade event. It's amazing how small the world does seem sometimes, considering that we both earned our undergraduate degrees at U. of Kansas, even overlapping for one year! I suppose we were destined to eventually meet face-to-face. \u000b\u000bI was fascinated by your synopsis of the history of Riviera Industries over the past, almost half-century. Clearly, your company has a rich corporate heritage and tradition. At the same time, the company has been blessed with a continuum of leaders of foresight and imagination who had the courage to change course at key points along the way so that the company could remain competitive and continue to lead its industry. \u000b\u000bAs I was mentioning to you, Final Edition Publications is a specialty publisher that focuses on corporate publications including annual reports, corporate profiles and corporate histories. We have been in business for over 15 years and during that time have grown from a two-person start-up, to a serious corporate publisher with over 100 employees. We have been contracted by over a dozen Fortune 500 companies to produce both annual and special occasion publications on their behalf. \u000b\u000bAfter our chat at last week's meeting, it occurred to me that with Riviera approaching its 50th anniversary, it would be the perfect occasion to produce a Corporate History to celebrate your company's first half-century. It so happens, that these are exactly the types of corporate publications that we specialize in here at Final Edition. In fact, we have produced corporate histories for dozens of companies. \u000b\u000bWith Riviera's 50th just around the corner, I'm sure that you have been thinking about ways to make that anniversary a special one. Accordingly, I would ","routeslip":"/drive/Routing Slip/2020/APR/route-Business Introduction Letter.doc.pdf","__v":0}
24+{"_id":{"$oid":"5ea0dd0fb11817219164c58a"},"projects":["utang"],"reference":["/drive/FINANCE/Draft/Sales Report.xls"],"enclosure":[],"comment":[{"branch":"staff-accounting-1596098158183","content":"sir for comment"},{"branch":"manager-accounting-1596098235867","content":"ok na to"}],"id":"15876006551152","title":"Business Introduction Letter.doc","filename":"public/drive/HR/Business Introduction Letter.doc","category":"Business Letter","author":"manager-accounting","deyt":{"$date":"2020-03-05T01:46:29.35Z"},"size":28672,"content":" (print Business Introduction Letter on corporate letterhead paper) \u000bFebruary 20, 20xx  Ms. Margaret Campion\u000bDirector, Corporate Services\u000bRiviera Industries Inc.\u000b245 Dearborn Park Road\u000bChicago, Il 60610\u000b\u000b\u000bDear Ms. Campion:\u000b\u000bIt was a pleasure meeting you briefly at last week's Board of Trade event. It's amazing how small the world does seem sometimes, considering that we both earned our undergraduate degrees at U. of Kansas, even overlapping for one year! I suppose we were destined to eventually meet face-to-face. \u000b\u000bI was fascinated by your synopsis of the history of Riviera Industries over the past, almost half-century. Clearly, your company has a rich corporate heritage and tradition. At the same time, the company has been blessed with a continuum of leaders of foresight and imagination who had the courage to change course at key points along the way so that the company could remain competitive and continue to lead its industry. \u000b\u000bAs I was mentioning to you, Final Edition Publications is a specialty publisher that focuses on corporate publications including annual reports, corporate profiles and corporate histories. We have been in business for over 15 years and during that time have grown from a two-person start-up, to a serious corporate publisher with over 100 employees. We have been contracted by over a dozen Fortune 500 companies to produce both annual and special occasion publications on their behalf. \u000b\u000bAfter our chat at last week's meeting, it occurred to me that with Riviera approaching its 50th anniversary, it would be the perfect occasion to produce a Corporate History to celebrate your company's first half-century. It so happens, that these are exactly the types of corporate publications that we specialize in here at Final Edition. In fact, we have produced corporate histories for dozens of companies. \u000b\u000bWith Riviera's 50th just around the corner, I'm sure that you have been thinking about ways to make that anniversary a special one. Accordingly, I would ","routeslip":"/drive/Routing Slip/2020/APR/route-Business Introduction Letter.doc.pdf","__v":0}
25+{"_id":{"$oid":"5ea0dd5cb11817219164c595"},"projects":["Payment"],"reference":["/drive/PRODUCTION/Signature/manager-production.png"],"enclosure":[],"comment":[],"id":"15876007329730","title":"Payment Voucher.doc","filename":"public/drive/PRODUCTION/Payment Voucher.doc","category":"Disbursement Voucher","author":"manager-it","deyt":{"$date":"2020-04-23T00:12:12.973Z"},"size":28160,"content":" Edmonds Unitarian Universalist Church Payment Voucher Make check payable to: _____________________________ Send check to: __________________________________________________________ Please staple proofs of purchase to the front of this voucher (receipts, statements, invoices, etc.) Refer to the Chart of Accounts hanging by the Assistant Treasurer’s mailbox and enter the appropriate budget account and sub-account. Use the Memo-line entry to indicate what you purchased. Use abbreviations, as needed, to fit the space provided.  If you need a copy of this voucher, please check the box. Budget Account Sub-account Amount Memo-line Entry 1 2 3 4 5 ___________________________________ _________ Total: Signature of Purchaser Date ____________________________________ Date Paid: Print Your Name Check No: ____________________________________ Authorized Committee Signature ____________________________________ Rev.2013 - 0317 Print Authorized Signature ","routeslip":"/drive/Routing Slip/2020/APR/route-Payment Voucher.doc.pdf","__v":0}
26+{"_id":{"$oid":"5ea0dde7b11817219164c599"},"projects":["policies"],"reference":[],"enclosure":["/drive/FINANCE/Draft/Business Marketing Plan.pdf"],"comment":[{"branch":"manager-logistics-1596092237016","content":"ok good"}],"id":"15876008712162","title":"Standard Operating Procedure SOP.doc.manager-logistics.pdf","filename":"public/drive/G.M./Standard Operating Procedure SOP.doc.manager-logistics.pdf","category":"SOP","author":"manager-logistics","deyt":{"$date":"2020-03-05T00:07:29.728Z"},"size":130389,"content":"Xxxxxx Department Xxxxxx Division/Function SOP # Revision # Implementation Date Page # 1 of xx Last Reviewed/Update Date SOP Owner Approval Standard Operating Procedure 1. Purpose Describe the process for <official name of SOP>. Describe relevant background information. 2. Scope Identify the intended audience and /or activities where the SOP may be relevant. 3. Prerequisites Outline information required before proceeding with the listed procedure; for example, worksheets, documents, IFAS reports, etc. 4. Responsibilities Identify the personnel that have a primary role in the SOP and describe how their responsibilities relate to this SOP. If necessary, include contact information. 5. Procedure Provide the steps required to perform this procedure (who, what, when, where, why, how). Include a process flowchart. 6. References List resources that may be useful when performing the procedure; for example, Admin policies, Municipal Code, government standards and other SOPs. 7. Definitions Identify and define frequently used terms or acronyms. Provide additional and/or relevant information needed to understand this SOP. Documents: SOP short-form","routeslip":"/drive/Routing Slip/2020/APR/route-Standard Operating Procedure SOP.doc.manager-logistics.pdf.pdf","__v":0}
27+{"_id":{"$oid":"5ea0de54b11817219164c59d"},"projects":["Budget"],"reference":["/drive/FINANCE/Draft/Disbursement Voucher.docx"],"enclosure":[],"comment":[],"id":"15876009802405","title":"Budget Proposal.pdf.manager-hr.pdf","filename":"public/drive/LOGISTICS/Budget Proposal.pdf.manager-hr.pdf","category":"Proposal","author":"manager-hr","deyt":{"$date":"2020-02-13T00:38:49.305Z"},"size":74600,"content":"54 SUMMARY PROPOSAL BUDGET FOR NSF USE ONLY ORGANIZATION PROPOSAL NO. DURATION (MONTHS) Proposed Granted PRINCIPAL INVESTIGATOR/PROJECT DIRECTOR AWARD NO. A. SENIOR PERSONNEL: PI/PD, Co-PIs, Faculty and Other Senior Associates NSF-Funded Funds Funds List each separately with name and title. (A.7. Show number in brackets) Person-months Requested By Granted by NSF CAL ACAD SUMR Proposer (If Different) 1. $ $ 2. 3. 4. 5. 6. ( ) OTHERS (LIST INDIVIDUALLY ON BUDGET EXPLANATION PAGE) 7. ( ) TOTAL SENIOR PERSONNEL (1-6) B. OTHER PERSONNEL (SHOW NUMBERS IN BRACKETS) 1. ( ) POSTDOCTORAL ASSOCIATES 2. ( ) OTHER PROFESSIONALS (TECHNICIAN, PROGRAMMER, ETC.) 3. ( ) GRADUATE STUDENTS 4. ( ) UNDERGRADUATE STUDENTS 5. ( ) SECRETARIAL - CLERICAL (IF CHARGED DIRECTLY) 6. ( ) OTHER TOTAL SALARIES AND WAGES (A + B) C. FRINGE BENEFITS (IF CHARGED AS DIRECT COSTS) TOTAL SALARIES, WAGES AND FRINGE BENEFITS (A + B + C) D. EQUIPMENT (LIST ITEM AND DOLLAR AMOUNT FOR EACH ITEM EXCEEDING $5,000.) TOTAL EQUIPMENT E. TRAVEL 1. DOMESTIC (INCL. CANADA, MEXICO AND U.S. POSSESSIONS) 2. FOREIGN F. PARTICIPANT SUPPORT 1. STIPENDS $ 2. TRAVEL 3. SUBSISTENCE 4. OTHER TOTAL NUMBER OF PARTICIPANTS ( ) TOTAL PARTICIPANT COSTS G. OTHER DIRECT COSTS 1. MATERIALS AND SUPPLIES 2. PUBLICATION/DOCUMENTATION/DISSEMINATION 3. CONSULTANT SERVICES 4. COMPUTER SERVICES 5. SUBAWARDS 6. OTHER TOTAL OTHER DIRECT COSTS H. TOTAL DIRECT COSTS (A THROUGH G) I. INDIRECT COSTS (F&A) (SPECIFY RATE AND BASE) TOTAL INDIRECT COSTS (F&A) J. TOTAL DIRECT AND INDIRECT COSTS (H + I) K. RESIDUAL FUNDS (IF FOR FURTHER SUPPORT OF CURRENT PROJECT SEE GPG II.D.7.j.) L. AMOUNT OF THIS REQUEST (J) OR (J MINUS K) $ $ M. COST SHARING: PROPOSED LEVEL $ AGREED LEVEL IF DIFFERENT: $ PI/PD TYPED NAME AND SIGNATURE* DATE FOR NSF USE ONLY INDIRECT COST RATE VERIFICATION ORG. REP. TYPED NAME & SIGNATURE* DATE Date Checked Date of Rate Sheet Initials-ORG NSF Form 1030 (10/99) Supersedes All Previous Editions *SIGNATURES REQUIRED ONLY FOR REVISED BUDG","routeslip":"/drive/Routing Slip/2020/APR/route-Budget Proposal.pdf.manager-hr.pdf.pdf","__v":0}
28+{"_id":{"$oid":"5ebddc34b11817219164c5aa"},"projects":["Payment"],"reference":["/drive/PRODUCTION/Signature/manager-production.png"],"enclosure":[],"comment":[],"id":"15895009802971","title":"Payment Voucher.doc.manager-production.pdf","filename":"public/drive/ASST.G.M./Payment Voucher.doc.manager-production.pdf","category":"Disbursement Voucher","author":"manager-it","deyt":{"$date":"2020-04-23T00:12:12.973Z"},"size":28160,"content":" Edmonds Unitarian Universalist Church Payment Voucher Make check payable to: _____________________________ Send check to: __________________________________________________________ Please staple proofs of purchase to the front of this voucher (receipts, statements, invoices, etc.) Refer to the Chart of Accounts hanging by the Assistant Treasurer’s mailbox and enter the appropriate budget account and sub-account. Use the Memo-line entry to indicate what you purchased. Use abbreviations, as needed, to fit the space provided.  If you need a copy of this voucher, please check the box. Budget Account Sub-account Amount Memo-line Entry 1 2 3 4 5 ___________________________________ _________ Total: Signature of Purchaser Date ____________________________________ Date Paid: Print Your Name Check No: ____________________________________ Authorized Committee Signature ____________________________________ Rev.2013 - 0317 Print Authorized Signature ","routeslip":"/drive/Routing Slip/2020/MAY/route-Payment Voucher.doc.manager-production.pdf.pdf","__v":0}
29+{"_id":{"$oid":"5ebddc89b11817219164c5ad"},"projects":["Loan"],"reference":["/drive/MARKETING/Purchase Order/2020/JUL/Purchase Order.doc"],"enclosure":[],"comment":[],"id":"15895010658493","title":"Loan Contract.pdf","filename":"public/drive/ACCOUNTING/Loan Contract.pdf","category":"Contract","author":"manager-logistics","deyt":{"$date":"2020-03-05T00:17:31.339Z"},"size":24107,"content":"Title Loan Agreement Date of Loan: Loan Number: Name of Lender Certificate Number: Street Address City, State Telephone Number Hours of Operation: Name of Borrower Street Address City, State Date of Birth: Social Security Number: Description of Titled Personal Property: Year: Make: Model: Type: VIN#: Color: License Plate #: Vehicle May Be Delivered To: Between the hours of: Date of Loan: Monthly Rate of Interest: % Your payment schedule will be: FINANCE CHARGE The dollar amount the credit will cost you. $ Amount Financed The amount of credit provided to you or on your behalf. $ Total of Payments The amount you will have paid after you have made all payments as scheduled. $ When Payments Are Due Amount of Payment Number of Payments ANNUAL PERCENTAGE RATE The cost of your credit as a yearly rate. % Security: You are giving a security interest in _____________________________ Late Charge: If this is a single payment loan and a payment is 15 days late you will be charged 5% of the payment, or $50, whichever is less. If this is a monthly payment loan and a payment is 15 days late you will be charged 5% of the payment, or $50, whichever is less, subject to a minimum charge of $15 for payments over $25 and $5 for payments of $25 or less. Prepayment: If you pay off early you will not have to pay a penalty. See your contract documents for any additional information about nonpayment, default, any required repayment in full before the scheduled date, and prepayment refunds and penalties. ________________________________ e means an estimate. Itemization of Amount Financed of $________________ $_____________ Amount given to you directly $_____________ Loan Proceeds paid on your account $_____________ Amount paid to public officials $_____________ Amount paid to others $_____________ Loan Origination Fee $_(_________) _ Prepaid Finance Charge $_____________ Amount Financed NOTICE: You may cancel this loan without any costs by returning the full principal balance to the lender by ","routeslip":"/drive/Routing Slip/2020/MAY/route-Loan Contract.pdf.pdf","__v":0}
30+{"_id":{"$oid":"5ebdddabb11817219164c5b8"},"projects":[],"reference":["/drive/FINANCE/Draft/Budget Proposal.pdf","/drive/FINANCE/Draft/Disbursement Voucher.docx"],"enclosure":[],"comment":[],"id":"15895013551405","title":"Business Marketing Plan.pdf","filename":"public/drive/LOGISTICS/Business Marketing Plan.pdf","category":"Business Letter","author":"manager-finance","deyt":{"$date":"2020-05-15T00:09:15.14Z"},"size":45331,"content":"1 The Marketing Plan The most important part of a business plan is the Marketing Plan. To keep one's business on course this plan must be geared toward the business's mission—its product and service lines, its markets, its financial situation and marketing/sales tactics. The business must be aware of its strengths and weaknesses through internal and external analysis and look for market opportunities. The business must analyze its products and services from the viewpoint of the customer—outside-in thinking. What is the customer looking for and what does the customer want (benefits)? The business must gain knowledge of the marketplace from its customers. The business must analyze its target markets. What other additional markets can the business tap into and are there additional products or services the business can add? The business must know its competition, current and potential. By identifying the competitor's strengths and weaknesses the business can improve its position in the marketplace. The business must make decisions on how to apply its resources to the target market(s). The business must utilize the information it has gathered about itself, its customers, its markets, and its competition by developing a written Marketing Plan that provides measurable goals. The business must select marketing/sales tactics that will allow it to achieve or surpass its goals. The business must implement the plan (within an established budget) and then measure its success in terms of whether or not the goals were met (or the extent to which they were). The Marketing Plan is an ongoing tool designed to help the business compete in the market for customers. It should be re-visited, re-worked, and re-created often. 2 MARKETING PLAN OUTLINE There is no single \"right\" way to approach a marketing plan. Your marketing plan should be part of an ongoing self-evaluation process and unique to your business. A. Mission Statement 1. State the purpose of the marketing plan. 2. Review busin","routeslip":"/drive/Routing Slip/2020/MAY/route-Business Marketing Plan.pdf.pdf","__v":0}
31+{"_id":{"$oid":"5ebdde7bb11817219164c5c0"},"projects":["rootcon"],"reference":[],"enclosure":[],"comment":[],"id":"15895015635701","title":"Taal Vista Hotel Reservation Confirmation.docx","filename":"public/drive/ASST.G.M./Taal Vista Hotel Reservation Confirmation.docx","category":"Quotation","author":"manager-finance","deyt":{"$date":"2020-05-15T00:12:43.57Z"},"size":16889,"content":" Taal Vista Hotel Reservation Confirmation Dear Mr. Maligro, Thank you for choosing Taal Vista Hotel. We are pleased to confirm your reservation as detailed below. Reservation Details Confirmation Number 1054480 Guest Name Mr. Nelson Maligro Arrival Date 25 September 2019 Departure Date 27 September 2019 Number of Nights 2 Number of Guest 1 Adult Room Type 1 Premier King Lake Wing Bldg. Nightly Rate Premier at PHP 8,9250.00 Room rates per night are inclusive of VAT, service charge, and local government tax. Guaranteed Method Your reservation is on a TENTATIVE status. **Please deposit FULL payment on/before August 23, 2019 (until 4PM) . ** AUTO CANCEL IF UNSETTLED ON THE GIVEN OPTION DATE ** Payment is non refundable Bank Name: Any BANCO DE ORO branch Account Name: SM PRIME HOLDINGS INC – TAAL VISTA HOTEL Reference Number: FIT0000007463 Account Number: 1500009073 A copy of the deposit slip must be sent thru email at reservations@taalvistahotel.com. Breakfast Buffet Breakfast is included Grand Total PHP 17,900.00 Total amount per stay are inclusive of VAT, service charge, and local government tax. Check-in Time 02:00 PM Check-out Time 12:00 NN ","routeslip":"/drive/Routing Slip/2020/MAY/route-Taal Vista Hotel Reservation Confirmation.docx.pdf","__v":0}
32+{"_id":{"$oid":"5ebddf4db11817219164c5c6"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15895017731292","title":"Obstacles Between You And A Paperless Office.docx","filename":"public/drive/FINANCE/Obstacles Between You And A Paperless Office.docx","category":"Memorandum","author":"manager-finance","deyt":{"$date":"2020-05-15T00:16:13.129Z"},"size":25536,"content":"Obstacles Between You And A Paperless Office By Thomas Schneck June 3, 2015 at 2:09 PM Creating a paperless office gives you a competitive advantage whether you're at a large organization or a small business. But 100-percent paperless organizations are still relatively rare. What's holding you back? For smaller businesses, the main advantage of going paperless with a document management or enterprise content management (ECM) system is that it prepares you for disaster recovery. Even if you have a disaster recovery plan in place, continuing to use paper processes results in ongoing expenses for managing documents, buying supplies (such as paper and file cabinets) and physical space for document storage. Here are some obstacles that prevent today's companies from making the paperless office a reality: Company culture: If your company culture is a source of inertia, it's difficult to switch to digital document management, because it requires change. People often resist new technology rather than learning about it because they don't have confidence that they'll be successful. A learned affinity for using paper: We've been living with paper for a long time, and many people express a preference for reading on paper rather than on a screen. This preference is just a learned behavior, and the solution is better technology. As interactive screens make it easier to read on a tablet or PC, more organizations are adopting digital document management. While established organizations may still have paper-based routines, Generation Y has fully embraced digital documents, and that trend is sure to continue. Legislative obstacles: Do compliance regulations require you to retain hard copies of documents for a certain period, or save originals with a \"wet\" ink signature? These legislative obstacles are often the most difficult to overcome. The solution here is to do some research and see if your compliance needs have changed. In many cases, electronic signatures are now as valid as a ","routeslip":"/drive/Routing Slip/2020/MAY/route-Obstacles Between You And A Paperless Office.docx.pdf","__v":0}
33+{"_id":{"$oid":"5ebddf4db11817219164c5c7"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15895017732767","title":"Obstacles Between You And A Paperless Office.docx","filename":"public/drive/MARKETING/Obstacles Between You And A Paperless Office.docx","category":"Memorandum","author":"manager-finance","deyt":{"$date":"2020-05-15T00:16:13.276Z"},"size":25536,"content":"Obstacles Between You And A Paperless Office By Thomas Schneck June 3, 2015 at 2:09 PM Creating a paperless office gives you a competitive advantage whether you're at a large organization or a small business. But 100-percent paperless organizations are still relatively rare. What's holding you back? For smaller businesses, the main advantage of going paperless with a document management or enterprise content management (ECM) system is that it prepares you for disaster recovery. Even if you have a disaster recovery plan in place, continuing to use paper processes results in ongoing expenses for managing documents, buying supplies (such as paper and file cabinets) and physical space for document storage. Here are some obstacles that prevent today's companies from making the paperless office a reality: Company culture: If your company culture is a source of inertia, it's difficult to switch to digital document management, because it requires change. People often resist new technology rather than learning about it because they don't have confidence that they'll be successful. A learned affinity for using paper: We've been living with paper for a long time, and many people express a preference for reading on paper rather than on a screen. This preference is just a learned behavior, and the solution is better technology. As interactive screens make it easier to read on a tablet or PC, more organizations are adopting digital document management. While established organizations may still have paper-based routines, Generation Y has fully embraced digital documents, and that trend is sure to continue. Legislative obstacles: Do compliance regulations require you to retain hard copies of documents for a certain period, or save originals with a \"wet\" ink signature? These legislative obstacles are often the most difficult to overcome. The solution here is to do some research and see if your compliance needs have changed. In many cases, electronic signatures are now as valid as a ","routeslip":"/drive/Routing Slip/2020/MAY/route-Obstacles Between You And A Paperless Office.docx.pdf","__v":0}
34+{"_id":{"$oid":"5ebddf4db11817219164c5c8"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15895017733920","title":"Obstacles Between You And A Paperless Office.docx","filename":"public/drive/ACCOUNTING/Obstacles Between You And A Paperless Office.docx","category":"Memorandum","author":"manager-finance","deyt":{"$date":"2020-05-15T00:16:13.392Z"},"size":25536,"content":"Obstacles Between You And A Paperless Office By Thomas Schneck June 3, 2015 at 2:09 PM Creating a paperless office gives you a competitive advantage whether you're at a large organization or a small business. But 100-percent paperless organizations are still relatively rare. What's holding you back? For smaller businesses, the main advantage of going paperless with a document management or enterprise content management (ECM) system is that it prepares you for disaster recovery. Even if you have a disaster recovery plan in place, continuing to use paper processes results in ongoing expenses for managing documents, buying supplies (such as paper and file cabinets) and physical space for document storage. Here are some obstacles that prevent today's companies from making the paperless office a reality: Company culture: If your company culture is a source of inertia, it's difficult to switch to digital document management, because it requires change. People often resist new technology rather than learning about it because they don't have confidence that they'll be successful. A learned affinity for using paper: We've been living with paper for a long time, and many people express a preference for reading on paper rather than on a screen. This preference is just a learned behavior, and the solution is better technology. As interactive screens make it easier to read on a tablet or PC, more organizations are adopting digital document management. While established organizations may still have paper-based routines, Generation Y has fully embraced digital documents, and that trend is sure to continue. Legislative obstacles: Do compliance regulations require you to retain hard copies of documents for a certain period, or save originals with a \"wet\" ink signature? These legislative obstacles are often the most difficult to overcome. The solution here is to do some research and see if your compliance needs have changed. In many cases, electronic signatures are now as valid as a ","routeslip":"/drive/Routing Slip/2020/MAY/route-Obstacles Between You And A Paperless Office.docx.pdf","__v":0}
35+{"_id":{"$oid":"5ebddf4db11817219164c5c9"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15895017734438","title":"Obstacles Between You And A Paperless Office.docx","filename":"public/drive/PRODUCTION/Obstacles Between You And A Paperless Office.docx","category":"Memorandum","author":"manager-finance","deyt":{"$date":"2020-05-15T00:16:13.443Z"},"size":25536,"content":"Obstacles Between You And A Paperless Office By Thomas Schneck June 3, 2015 at 2:09 PM Creating a paperless office gives you a competitive advantage whether you're at a large organization or a small business. But 100-percent paperless organizations are still relatively rare. What's holding you back? For smaller businesses, the main advantage of going paperless with a document management or enterprise content management (ECM) system is that it prepares you for disaster recovery. Even if you have a disaster recovery plan in place, continuing to use paper processes results in ongoing expenses for managing documents, buying supplies (such as paper and file cabinets) and physical space for document storage. Here are some obstacles that prevent today's companies from making the paperless office a reality: Company culture: If your company culture is a source of inertia, it's difficult to switch to digital document management, because it requires change. People often resist new technology rather than learning about it because they don't have confidence that they'll be successful. A learned affinity for using paper: We've been living with paper for a long time, and many people express a preference for reading on paper rather than on a screen. This preference is just a learned behavior, and the solution is better technology. As interactive screens make it easier to read on a tablet or PC, more organizations are adopting digital document management. While established organizations may still have paper-based routines, Generation Y has fully embraced digital documents, and that trend is sure to continue. Legislative obstacles: Do compliance regulations require you to retain hard copies of documents for a certain period, or save originals with a \"wet\" ink signature? These legislative obstacles are often the most difficult to overcome. The solution here is to do some research and see if your compliance needs have changed. In many cases, electronic signatures are now as valid as a ","routeslip":"/drive/Routing Slip/2020/MAY/route-Obstacles Between You And A Paperless Office.docx.pdf","__v":0}
36+{"_id":{"$oid":"5ebddf4db11817219164c5ca"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15895017735192","title":"Obstacles Between You And A Paperless Office.docx","filename":"public/drive/LOGISTICS/Obstacles Between You And A Paperless Office.docx","category":"Memorandum","author":"manager-finance","deyt":{"$date":"2020-05-15T00:16:13.519Z"},"size":25536,"content":"Obstacles Between You And A Paperless Office By Thomas Schneck June 3, 2015 at 2:09 PM Creating a paperless office gives you a competitive advantage whether you're at a large organization or a small business. But 100-percent paperless organizations are still relatively rare. What's holding you back? For smaller businesses, the main advantage of going paperless with a document management or enterprise content management (ECM) system is that it prepares you for disaster recovery. Even if you have a disaster recovery plan in place, continuing to use paper processes results in ongoing expenses for managing documents, buying supplies (such as paper and file cabinets) and physical space for document storage. Here are some obstacles that prevent today's companies from making the paperless office a reality: Company culture: If your company culture is a source of inertia, it's difficult to switch to digital document management, because it requires change. People often resist new technology rather than learning about it because they don't have confidence that they'll be successful. A learned affinity for using paper: We've been living with paper for a long time, and many people express a preference for reading on paper rather than on a screen. This preference is just a learned behavior, and the solution is better technology. As interactive screens make it easier to read on a tablet or PC, more organizations are adopting digital document management. While established organizations may still have paper-based routines, Generation Y has fully embraced digital documents, and that trend is sure to continue. Legislative obstacles: Do compliance regulations require you to retain hard copies of documents for a certain period, or save originals with a \"wet\" ink signature? These legislative obstacles are often the most difficult to overcome. The solution here is to do some research and see if your compliance needs have changed. In many cases, electronic signatures are now as valid as a ","routeslip":"/drive/Routing Slip/2020/MAY/route-Obstacles Between You And A Paperless Office.docx.pdf","__v":0}
37+{"_id":{"$oid":"5ebddf4db11817219164c5cb"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15895017735534","title":"Obstacles Between You And A Paperless Office.docx","filename":"public/drive/HR/Obstacles Between You And A Paperless Office.docx","category":"Memorandum","author":"manager-finance","deyt":{"$date":"2020-05-15T00:16:13.553Z"},"size":25536,"content":"Obstacles Between You And A Paperless Office By Thomas Schneck June 3, 2015 at 2:09 PM Creating a paperless office gives you a competitive advantage whether you're at a large organization or a small business. But 100-percent paperless organizations are still relatively rare. What's holding you back? For smaller businesses, the main advantage of going paperless with a document management or enterprise content management (ECM) system is that it prepares you for disaster recovery. Even if you have a disaster recovery plan in place, continuing to use paper processes results in ongoing expenses for managing documents, buying supplies (such as paper and file cabinets) and physical space for document storage. Here are some obstacles that prevent today's companies from making the paperless office a reality: Company culture: If your company culture is a source of inertia, it's difficult to switch to digital document management, because it requires change. People often resist new technology rather than learning about it because they don't have confidence that they'll be successful. A learned affinity for using paper: We've been living with paper for a long time, and many people express a preference for reading on paper rather than on a screen. This preference is just a learned behavior, and the solution is better technology. As interactive screens make it easier to read on a tablet or PC, more organizations are adopting digital document management. While established organizations may still have paper-based routines, Generation Y has fully embraced digital documents, and that trend is sure to continue. Legislative obstacles: Do compliance regulations require you to retain hard copies of documents for a certain period, or save originals with a \"wet\" ink signature? These legislative obstacles are often the most difficult to overcome. The solution here is to do some research and see if your compliance needs have changed. In many cases, electronic signatures are now as valid as a ","routeslip":"/drive/Routing Slip/2020/MAY/route-Obstacles Between You And A Paperless Office.docx.pdf","__v":0}
38+{"_id":{"$oid":"5ebddf4db11817219164c5cc"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15895017736054","title":"Obstacles Between You And A Paperless Office.docx","filename":"public/drive/QA/Obstacles Between You And A Paperless Office.docx","category":"Memorandum","author":"manager-finance","deyt":{"$date":"2020-05-15T00:16:13.605Z"},"size":25536,"content":"Obstacles Between You And A Paperless Office By Thomas Schneck June 3, 2015 at 2:09 PM Creating a paperless office gives you a competitive advantage whether you're at a large organization or a small business. But 100-percent paperless organizations are still relatively rare. What's holding you back? For smaller businesses, the main advantage of going paperless with a document management or enterprise content management (ECM) system is that it prepares you for disaster recovery. Even if you have a disaster recovery plan in place, continuing to use paper processes results in ongoing expenses for managing documents, buying supplies (such as paper and file cabinets) and physical space for document storage. Here are some obstacles that prevent today's companies from making the paperless office a reality: Company culture: If your company culture is a source of inertia, it's difficult to switch to digital document management, because it requires change. People often resist new technology rather than learning about it because they don't have confidence that they'll be successful. A learned affinity for using paper: We've been living with paper for a long time, and many people express a preference for reading on paper rather than on a screen. This preference is just a learned behavior, and the solution is better technology. As interactive screens make it easier to read on a tablet or PC, more organizations are adopting digital document management. While established organizations may still have paper-based routines, Generation Y has fully embraced digital documents, and that trend is sure to continue. Legislative obstacles: Do compliance regulations require you to retain hard copies of documents for a certain period, or save originals with a \"wet\" ink signature? These legislative obstacles are often the most difficult to overcome. The solution here is to do some research and see if your compliance needs have changed. In many cases, electronic signatures are now as valid as a ","routeslip":"/drive/Routing Slip/2020/MAY/route-Obstacles Between You And A Paperless Office.docx.pdf","__v":0}
39+{"_id":{"$oid":"5ebddf4db11817219164c5cd"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15895017737088","title":"Obstacles Between You And A Paperless Office.docx","filename":"public/drive/ASST.G.M./Obstacles Between You And A Paperless Office.docx","category":"Memorandum","author":"manager-finance","deyt":{"$date":"2020-05-15T00:16:13.708Z"},"size":25536,"content":"Obstacles Between You And A Paperless Office By Thomas Schneck June 3, 2015 at 2:09 PM Creating a paperless office gives you a competitive advantage whether you're at a large organization or a small business. But 100-percent paperless organizations are still relatively rare. What's holding you back? For smaller businesses, the main advantage of going paperless with a document management or enterprise content management (ECM) system is that it prepares you for disaster recovery. Even if you have a disaster recovery plan in place, continuing to use paper processes results in ongoing expenses for managing documents, buying supplies (such as paper and file cabinets) and physical space for document storage. Here are some obstacles that prevent today's companies from making the paperless office a reality: Company culture: If your company culture is a source of inertia, it's difficult to switch to digital document management, because it requires change. People often resist new technology rather than learning about it because they don't have confidence that they'll be successful. A learned affinity for using paper: We've been living with paper for a long time, and many people express a preference for reading on paper rather than on a screen. This preference is just a learned behavior, and the solution is better technology. As interactive screens make it easier to read on a tablet or PC, more organizations are adopting digital document management. While established organizations may still have paper-based routines, Generation Y has fully embraced digital documents, and that trend is sure to continue. Legislative obstacles: Do compliance regulations require you to retain hard copies of documents for a certain period, or save originals with a \"wet\" ink signature? These legislative obstacles are often the most difficult to overcome. The solution here is to do some research and see if your compliance needs have changed. In many cases, electronic signatures are now as valid as a ","routeslip":"/drive/Routing Slip/2020/MAY/route-Obstacles Between You And A Paperless Office.docx.pdf","__v":0}
40+{"_id":{"$oid":"5ebddf4db11817219164c5ce"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15895017738250","title":"Obstacles Between You And A Paperless Office.docx","filename":"public/drive/IT/Obstacles Between You And A Paperless Office.docx","category":"Memorandum","author":"manager-finance","deyt":{"$date":"2020-05-15T00:16:13.825Z"},"size":25536,"content":"Obstacles Between You And A Paperless Office By Thomas Schneck June 3, 2015 at 2:09 PM Creating a paperless office gives you a competitive advantage whether you're at a large organization or a small business. But 100-percent paperless organizations are still relatively rare. What's holding you back? For smaller businesses, the main advantage of going paperless with a document management or enterprise content management (ECM) system is that it prepares you for disaster recovery. Even if you have a disaster recovery plan in place, continuing to use paper processes results in ongoing expenses for managing documents, buying supplies (such as paper and file cabinets) and physical space for document storage. Here are some obstacles that prevent today's companies from making the paperless office a reality: Company culture: If your company culture is a source of inertia, it's difficult to switch to digital document management, because it requires change. People often resist new technology rather than learning about it because they don't have confidence that they'll be successful. A learned affinity for using paper: We've been living with paper for a long time, and many people express a preference for reading on paper rather than on a screen. This preference is just a learned behavior, and the solution is better technology. As interactive screens make it easier to read on a tablet or PC, more organizations are adopting digital document management. While established organizations may still have paper-based routines, Generation Y has fully embraced digital documents, and that trend is sure to continue. Legislative obstacles: Do compliance regulations require you to retain hard copies of documents for a certain period, or save originals with a \"wet\" ink signature? These legislative obstacles are often the most difficult to overcome. The solution here is to do some research and see if your compliance needs have changed. In many cases, electronic signatures are now as valid as a ","routeslip":"/drive/Routing Slip/2020/MAY/route-Obstacles Between You And A Paperless Office.docx.pdf","__v":0}
41+{"_id":{"$oid":"5ebddf4db11817219164c5cf"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15895017739058","title":"Obstacles Between You And A Paperless Office.docx","filename":"public/drive/SECRETARY-RECEIVING/Obstacles Between You And A Paperless Office.docx","category":"Memorandum","author":"manager-finance","deyt":{"$date":"2020-05-15T00:16:13.905Z"},"size":25536,"content":"Obstacles Between You And A Paperless Office By Thomas Schneck June 3, 2015 at 2:09 PM Creating a paperless office gives you a competitive advantage whether you're at a large organization or a small business. But 100-percent paperless organizations are still relatively rare. What's holding you back? For smaller businesses, the main advantage of going paperless with a document management or enterprise content management (ECM) system is that it prepares you for disaster recovery. Even if you have a disaster recovery plan in place, continuing to use paper processes results in ongoing expenses for managing documents, buying supplies (such as paper and file cabinets) and physical space for document storage. Here are some obstacles that prevent today's companies from making the paperless office a reality: Company culture: If your company culture is a source of inertia, it's difficult to switch to digital document management, because it requires change. People often resist new technology rather than learning about it because they don't have confidence that they'll be successful. A learned affinity for using paper: We've been living with paper for a long time, and many people express a preference for reading on paper rather than on a screen. This preference is just a learned behavior, and the solution is better technology. As interactive screens make it easier to read on a tablet or PC, more organizations are adopting digital document management. While established organizations may still have paper-based routines, Generation Y has fully embraced digital documents, and that trend is sure to continue. Legislative obstacles: Do compliance regulations require you to retain hard copies of documents for a certain period, or save originals with a \"wet\" ink signature? These legislative obstacles are often the most difficult to overcome. The solution here is to do some research and see if your compliance needs have changed. In many cases, electronic signatures are now as valid as a ","routeslip":"/drive/Routing Slip/2020/MAY/route-Obstacles Between You And A Paperless Office.docx.pdf","__v":0}
42+{"_id":{"$oid":"5ebddf4db11817219164c5d0"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15895017739977","title":"Obstacles Between You And A Paperless Office.docx","filename":"public/drive/G.M./Obstacles Between You And A Paperless Office.docx","category":"Memorandum","author":"manager-finance","deyt":{"$date":"2020-05-15T00:16:13.997Z"},"size":25536,"content":"Obstacles Between You And A Paperless Office By Thomas Schneck June 3, 2015 at 2:09 PM Creating a paperless office gives you a competitive advantage whether you're at a large organization or a small business. But 100-percent paperless organizations are still relatively rare. What's holding you back? For smaller businesses, the main advantage of going paperless with a document management or enterprise content management (ECM) system is that it prepares you for disaster recovery. Even if you have a disaster recovery plan in place, continuing to use paper processes results in ongoing expenses for managing documents, buying supplies (such as paper and file cabinets) and physical space for document storage. Here are some obstacles that prevent today's companies from making the paperless office a reality: Company culture: If your company culture is a source of inertia, it's difficult to switch to digital document management, because it requires change. People often resist new technology rather than learning about it because they don't have confidence that they'll be successful. A learned affinity for using paper: We've been living with paper for a long time, and many people express a preference for reading on paper rather than on a screen. This preference is just a learned behavior, and the solution is better technology. As interactive screens make it easier to read on a tablet or PC, more organizations are adopting digital document management. While established organizations may still have paper-based routines, Generation Y has fully embraced digital documents, and that trend is sure to continue. Legislative obstacles: Do compliance regulations require you to retain hard copies of documents for a certain period, or save originals with a \"wet\" ink signature? These legislative obstacles are often the most difficult to overcome. The solution here is to do some research and see if your compliance needs have changed. In many cases, electronic signatures are now as valid as a ","routeslip":"/drive/Routing Slip/2020/MAY/route-Obstacles Between You And A Paperless Office.docx.pdf","__v":0}
43+{"_id":{"$oid":"5f22c5afb11817219164c5d9"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15961143512825","title":"Job Order Sample.doc.boss.wannabe.pdf","filename":"public/drive/Boss/Job Order Sample.doc.boss.wannabe.pdf","category":"Job Order","author":"staff-hr","deyt":{"$date":"2020-04-23T00:04:06.912Z"},"size":38400,"content":" ADDITIONAL JOB ORDER ______________________________) Name and Address of ______________________________) Philippine Agent ______________________________) Sir: Please be informed that our Company is in need of the following workers to work in the United Arab Emirates and we would like your agency to handle the recruitment for us: JOB TITLE/CATEGORIES NUMBER REQUIRED BASIC SALARY (US $/DHS) 1. 2. 3. TOTAL TERMS AND CONDITIONS: Free airline ticket from the Philippines to the site of employment and return after completion of contract. Free food and accommodation Free transportation from accommodation to the site of work Two years contract. Visa and medical fees, labour card and all other fees, if any will be paid for by the company. (FOR DRIVERS ONLY) The sponsor shall secure the driver with accident insurance and the vehicle assigned to him/her or will be driven by him/her during the entire duration of the contract shall be covered by a comprehensive vehicle insurance. The Employer shall assist the driver in applying for his driver’s license and will not charge him of expenses incurred in securing same. Meantime that the driver is securing his license, his/her salaries and allowances shall continuously be given to him from the time of his arrival at the jobsite. The employer will pay for the repatriation cost if in case the driver fails the driver’s test. Other terms and conditions according to UAE laws. Very truly yours, _________________________ Print Name/Signature\u0001 ","routeslip":"/drive/Routing Slip/2020/JUL/route-Job Order Sample.doc.boss.wannabe.pdf.pdf","__v":0}
44+{"_id":{"$oid":"5ee028bbdf40ca3fe084436a"},"projects":[],"reference":[],"enclosure":[],"comment":[{"branch":"manager-finance-1596100778639","content":"fund request\n"}],"id":"15917487952936","title":"Dear Mr.docx","filename":"public/drive/LOGISTICS/Dear Mr.docx","category":"","author":"manager-finance","deyt":{"$date":"2020-05-15T00:18:31.844Z"},"size":122869,"content":" Dear Mr. Nelson Maligro: Paper Title: Secured Instant Messaging Application using Hybrid Encryption Algorithm We are pleased to inform you that your paper has been accepted for ORAL PRESENTATION in INTERNATIONAL RESEARCH CONFERENCE IN COMPUTING, ENGINEERING, EDUCATION AND EDUCATION TECHNOLOGY (IRCCEEE 2020) which will be held on January 9-10, 2020 at LA PIAZZA HOTEL AND CONVENTION CENTER, Imelda Roces Ave, Legazpi City, Philippines. This email also served as notification for publication in Scopus-indexed journal. Please find reviewer's comments below for the basis of your revisions. Additional instruction will be given to you during the conference for the publication instruction. Please revise your paper according to reviewer's comments and make sure that the similarity index using turnitin/ithenticate or any reliable plagiarism software will not exceed 15%. Please visit www.irccee2020.com for more announcement and updates. We are looking forward to meeting you at the conference. Respectfully yours, Organizing and Technical Committee of IRCCEE 2019 ","routeslip":"/drive/Routing Slip/2020/JUN/route-Dear Mr.docx.pdf","__v":0}
45+{"_id":{"$oid":"5ee02958df40ca3fe0844370"},"projects":["construction"],"reference":["/drive/QA/Signature/manager-qa.png"],"enclosure":[],"comment":[{"branch":"manager-it-1596162692806","content":"pls check"}],"id":"15917489527085","title":"Job Order Sample-new.doc","filename":"public/drive/MARKETING/Job Order Sample-new.doc","category":"Job Order","author":"manager-it","deyt":{"$date":"2020-06-10T00:29:12.708Z"},"size":38400,"content":" ADDITIONAL JOB ORDER ______________________________) Name and Address of ______________________________) Philippine Agent ______________________________) Sir: Please be informed that our Company is in need of the following workers to work in the United Arab Emirates and we would like your agency to handle the recruitment for us: JOB TITLE/CATEGORIES NUMBER REQUIRED BASIC SALARY (US $/DHS) 1. 2. 3. TOTAL TERMS AND CONDITIONS: Free airline ticket from the Philippines to the site of employment and return after completion of contract. Free food and accommodation Free transportation from accommodation to the site of work Two years contract. Visa and medical fees, labour card and all other fees, if any will be paid for by the company. (FOR DRIVERS ONLY) The sponsor shall secure the driver with accident insurance and the vehicle assigned to him/her or will be driven by him/her during the entire duration of the contract shall be covered by a comprehensive vehicle insurance. The Employer shall assist the driver in applying for his driver’s license and will not charge him of expenses incurred in securing same. Meantime that the driver is securing his license, his/her salaries and allowances shall continuously be given to him from the time of his arrival at the jobsite. The employer will pay for the repatriation cost if in case the driver fails the driver’s test. Other terms and conditions according to UAE laws. Very truly yours, _________________________ Print Name/Signature\u0001 ","routeslip":"/drive/Routing Slip/2020/JUN/route-Job Order Sample-new.doc.pdf","__v":0}
46+{"_id":{"$oid":"5ee029e0df40ca3fe0844374"},"projects":["Halin"],"reference":["/drive/Routing Slip/2020/APR/route-Budget Proposal.pdf.manager-hr.pdf.pdf"],"enclosure":[],"comment":[],"id":"15917490885263","title":"Sales Report.xls","filename":"public/drive/HR/Sales Report.xls","category":"Sales Report","author":"manager-production","deyt":{"$date":"2020-05-15T00:06:20.363Z"},"size":37376,"content":"monthly sales report/forecast (template),,,,,,sales dept/team ………….,,month …………,,,,,,,,,,,,,, \"This basic sales report/forecast tool is for a small or new businesses which does not yet have a computerised full management information system, which would normally integrate sales reporting with other business processes.\",,,,,,,,,,,,,,,,,,,,,, ,month,,,,cumulative (year to date),,,,,,,,,,,,,,,,, sales for month,actual,plan,variance,%,actual,plan,variance,%,,,,,,,,,,,,,, volumes/quantity/number,,,,,,,,,,,,,,,,,,,,,, values/revenues,,,,,,,,,,,,,,,,,,,,,, margin/contribution,,,,,,,,,,,,,,,,,,,,,, % margin/contribution,,,,,,,,,,,,,,,,,,,,,, number of orders,,,,,,,,,,,,,,,,,,,,,, average order value,,,,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,,,,, next month forecast,f'cast ,plan,variance,%,f'cast ,plan,variance,%,,,,,,,,,,,,,, volumes/quantity/number,,,,,,,,,,,,,,,,,,,,,, values/revenues,,,,,,,,,,,,,,,,,,,,,, margin,,,,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,,,,, quarter forecast,f'cast ,plan,variance,%,f'cast ,plan,variance,%,,,,,,,,,,,,,, values/revenues,,,,,,,,,,,,,,,,,,,,,, margin,,,,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,,,,, year forecast,\"see note (in msexcel version only, available from businessballs.com)\",,,,f'cast ,plan,variance,%,,,,,,,,,,,,,, values/revenues,,,,,,,,,,,,,,,,,,,,,, margin,,,,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,,,,, summary/forecast of sales performance and activities ,,,,,,,,,,,,,,,,,,,,,, \"comments on internal services affecting sales and customers (e.g., order processing, customer services, stock, distribution and deliveries/installations, service support, invoicing, major/national contracts, new product development, recruitment and training, etc) \",,,,,,,,,,,,,,,,,,,,,, competitor activity,,,,,,,,,,,,,,,,,,,,,, \"market comments (trends, developments, SWOT factors of note, i.e., strengths, weaknesses, opportunities, threats)\",,,,,,,,,,,,,,,,,,,,,, Report compiled by ……………...………..….. Date ………………..,,,,,,,,,,,,,,,,,,,,,, \"© alan chapman 2006, from www.busi","routeslip":"/drive/Routing Slip/2020/JUN/route-Sales Report.xls.pdf","__v":0}
47+{"_id":{"$oid":"5f23df2c963f2004a0f1489d"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15961864128792","title":"Work FInancial Plans.docx","filename":"public/drive/FINANCE/Work FInancial Plans.docx","category":"","author":"staff-secretary","deyt":{"$date":"2020-07-31T09:06:52.879Z"},"size":18865,"content":" LBE WFPRA Form No. PAGE 1 of 1 Office/Department: SCHOOLS DIVISION OFFICE - Local School Board Program: SOCIAL SERVICES Fund: SPECIAL EDUCATION FUND 2020 WORK AND FINANCIAL PLAN AND REQUEST FOR ALLOTMENT NO. FINANCIAL PLAN OBJECT OF EXPENDITURES AMOUNT OF REQUEST PERIOD RECOMMENDATION APPROPRIATION 20% RESERVE TOTAL ALLOTMENT PERIOD TOTAL PHP 0.00 JUSTIFICATION / PURPOSE: Submitted by: Recommended by: JENILYN ROSE B. CORPUZ, CESO VI MARIAN C. ORAYANI Schools Division Superintendent City Budget Officer ","routeslip":"/drive/Routing Slip/2020/JUL/route-Work FInancial Plans.docx.pdf","__v":0}
48+{"_id":{"$oid":"5f3e31e566cc3f0590a28a4f"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15921358141717","title":"corrupt.doc","filename":"/drive/N6B/corrupt.doc","category":"","author":"System","deyt":{"$date":"2020-03-13T03:38:43.183Z"},"size":14922,"content":"No Content. File Corrupted","routeslip":"","__v":0}
49+{"_id":{"$oid":"5f3e335166cc3f0590a28a50"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979114559586","title":"Network and IS.xlsx","filename":"/drive/Network and IS.xlsx","category":"","author":"System","deyt":{"$date":"2020-03-09T08:29:45.081Z"},"size":21370,"content":"USERS,PROVIDER,BANDWIDTH (MBPS),,Status ,,,, HNICTC,PLDT,10,30,Operating NICTS-Manila,PLDT,20,60,Operating NICTS –La Union,PLDT,2,20,Operating NICTS-Legazpi,PLDT,2,2,Operating NICTS- Palawan,PLDT,2,2,Operating NICTS-Zamboanga,PLDT,2,20,Operating NICTS- Davao,PLDT,2,20,Operating NICTS- Cebu,PLDT,2,20,Operating NICTS-Bonifacio,PLDT,4,20,Operating NICTU ZAMBALES,PLDT,2,2,Operating NICTU CAGAYAN,PLDT,2,2,Operating FORT SANTIAGO(NRC),PLDT,0.5,4,Operating \"MRIC,NISF\",PLDT,2,10,Operating CWS ZAMBOANGA,PLDT,2,4,Operating NICTU-Ulugan,PLDT,2,2,Operating USERS,Bandwidth (MBPS) ,PROVIDER,REMARKS HNICTC,60,IP CONVERGE,\"Operating(catered within Cavite area units ;NSSC,PHLFLT,FMRF,NCBDE and other tenant units of Cavite\" ,4,I-GATE PREMIUM,Operating(use only by PNC2 Internet) CNSSC,4,BIZ DSL ENTREPRENEUR,Operating(exclusive for CNSSC use only)/offline BNS,8,I-GATE ,Operating NICTS-LaUnion,5,BIZ DSL SMALL BIZ JR,Operating NICTS Palawan,2,DSL SERVICE,Operating NICTS Zamboanga,4,BIZ DSL ENTREPRENEUR ,Operating NICTS Davao,4,DSL SERVICE,Operating NICTS Cebu,2,BIZ DSL SMALL BIZ JR,Operating Information Systems,Software Development (%),End-User Encoding (%) IPMS,100,100 IPMS-Payroll,100,0 CEBIS,100,30 PN GSIS,60,0 IPMS-MEDICS,100,70 IPMS-Reservist,100,50 PRISM (Procurement),100,100 NORS (Operation),0,0 LMIS (OPTAR),0,0 PALMS (Logistics),80,0 Online Recruitment,100,0 PN SEMIS,100,80 ","routeslip":"","__v":0}
50+{"_id":{"$oid":"5f3e335166cc3f0590a28a51"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979115044967","title":"Network and IS.xlsx","filename":"/drive/N6B/Network and IS.xlsx","category":"","author":"System","deyt":{"$date":"2020-03-09T08:29:45.081Z"},"size":21370,"content":"USERS,PROVIDER,BANDWIDTH (MBPS),,Status ,,,, HNICTC,PLDT,10,30,Operating NICTS-Manila,PLDT,20,60,Operating NICTS –La Union,PLDT,2,20,Operating NICTS-Legazpi,PLDT,2,2,Operating NICTS- Palawan,PLDT,2,2,Operating NICTS-Zamboanga,PLDT,2,20,Operating NICTS- Davao,PLDT,2,20,Operating NICTS- Cebu,PLDT,2,20,Operating NICTS-Bonifacio,PLDT,4,20,Operating NICTU ZAMBALES,PLDT,2,2,Operating NICTU CAGAYAN,PLDT,2,2,Operating FORT SANTIAGO(NRC),PLDT,0.5,4,Operating \"MRIC,NISF\",PLDT,2,10,Operating CWS ZAMBOANGA,PLDT,2,4,Operating NICTU-Ulugan,PLDT,2,2,Operating USERS,Bandwidth (MBPS) ,PROVIDER,REMARKS HNICTC,60,IP CONVERGE,\"Operating(catered within Cavite area units ;NSSC,PHLFLT,FMRF,NCBDE and other tenant units of Cavite\" ,4,I-GATE PREMIUM,Operating(use only by PNC2 Internet) CNSSC,4,BIZ DSL ENTREPRENEUR,Operating(exclusive for CNSSC use only)/offline BNS,8,I-GATE ,Operating NICTS-LaUnion,5,BIZ DSL SMALL BIZ JR,Operating NICTS Palawan,2,DSL SERVICE,Operating NICTS Zamboanga,4,BIZ DSL ENTREPRENEUR ,Operating NICTS Davao,4,DSL SERVICE,Operating NICTS Cebu,2,BIZ DSL SMALL BIZ JR,Operating Information Systems,Software Development (%),End-User Encoding (%) IPMS,100,100 IPMS-Payroll,100,0 CEBIS,100,30 PN GSIS,60,0 IPMS-MEDICS,100,70 IPMS-Reservist,100,50 PRISM (Procurement),100,100 NORS (Operation),0,0 LMIS (OPTAR),0,0 PALMS (Logistics),80,0 Online Recruitment,100,0 PN SEMIS,100,80 ","routeslip":"","__v":0}
51+{"_id":{"$oid":"5f3e339166cc3f0590a28a52"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979114585592","title":"AuditScripts-Critical-Security-Control-Executive-Assessment-Tool-v7.0c.xlsx","filename":"/drive/CRA/AuditScripts-Critical-Security-Control-Executive-Assessment-Tool-v7.0c.xlsx","category":"","author":"System","deyt":{"$date":"2019-02-22T07:28:56Z"},"size":100944,"content":"Critical Security Controls Executive Assessment Tool (v7.0c),,,,,,,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,,,,,,,, ,,,,,,,,Risk Addressed:,,0%,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,,,,,,,, ,,,,,,,,Risk Accepted:,,100%,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,,,,,,,, Critical Security Control #1: Inventory and Control of Hardware Assets,,,,,,,,,,,,,,,,,,,,,,,,, Has your organization implemented scanning tools (active & passive) to identify all the devices attached to the network?,,,,,,,,,,,,,,,,,Select one of the Following:,,,,,0,0,, ,,,,,,,,,,,,,,,,,,,,,,,,, \"Has your organization implemented a network port control solution (802.1x), which requires certificates, to authenticate devices before they can connect to the network?\",,,,,,,,,,,,,,,,,Select one of the Following:,,,,,0,0,, ,,,,,,,,,,,,,,,,,,,,,,,,, Critical Security Control #2: Inventory and Control of Software Assets,,,,,,,,,,,,,,,,,,,,,,,,, Has your organization implemented scanning tools to identify all software applications installed in the organization?,,,,,,,,,,,,,,,,,Select one of the Following:,,,,,0,0,, ,,,,,,,,,,,,,,,,,,,,,,,,, Has your organization implemented a software whitelisting tool that only allows authorized software program to execute on the organization's systems?,,,,,,,,,,,,,,,,,Select one of the Following:,,,,,0,0,, ,,,,,,,,,,,,,,,,,,,,,,,,, Critical Security Control #3: Continuous Vulnerability Management,,,,,,,,,,,,,,,,,,,,,,,,, Has your organization implemented scanning tools to identify any software vulnerabilities on systems in the organization?,,,,,,,,,,,,,,,,,Select one of the Following:,,,,,0,0,, ,,,,,,,,,,,,,,,,,,,,,,,,, Has your organization implemented an automated patch management system to continuously update the organization's systems?,,,,,,,,,,,,,,,,,Select one of the Following:,,,,,0,0,, ,,,,,,,,,,,,,,,,,,,,,,,,, Critical Security Control #4: Controlled Use of Administrative Privileges,,,,,,,,,,,,,,,,,,,,,,,,, Has your organization implemented a scanning tool to inventory all users with elevated administrative rights on the organization's systems?,,,,,,,,,,,,,,,,,Select one of the Following:,,,,,0,0,, ,,,,,,,,,,,,,,,,,,,,,,,,, Has your organization ensured that only users with clear business need are granted elevated administrative rights on the organization's systems?,,,,,,,,,,,,,,,,,Select one of the Following:,,,,,0,0,, ,,,,,,,,,,,,,,,,,,,,,,,,, Critical Security Control #5: Secure Configuration for Hardware and Software,,,,,,,,,,,,,,,,,,,,,,,,, Has your organization implemented scanning tools to identify any mis-configured security settings on systems in the organization?,,,,,,,,,,,,,,,,,Select one of the Following:,,,,,0,0,, ,,,,,,,,,,,,,,,,,,,,,,,,, Has your organization implemented a security setting configuration enforcement system on the organization's systems?,,,,,,,,,,,,,,,,,Select one of the Following:,,,,,0,0,, ,,,,,,,,,,,,,,,,,,,,,,,,, \"Critical Security Control #6: Maintenance, Monitoring, and Analysis of Audit Logs\",,,,,,,,,,,,,,,,,,,,,,,,, Has your organization enabled comprehensive audit logging on each of its critical information systems (including network devices and applications)?,,,,,,,,,,,,,,,,,Select one of the Following:,,,,,0,0,, ,,,,,,,,,,,,,,,,,,,,,,,,, Has your organization centrally aggregated their critical audit logs on a Security Information and Event Management (SIEM) platform?,,,,,,,,,,,,,,,,,Select one of the Following:,,,,,0,0,, ,,,,,,,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,,,,,,0,1, ,,,,,,,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,,,,,,,, This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.,,,,,,,,,,,,,,,,,,,,,,,,, DO NOT CHANGE THESE VALUES Implementation Status Select one of the Following: Not Implemented Implemented on Some Systems Implemented on All Systems Implemented & Automated on All Systems ","routeslip":"","__v":0}
52+{"_id":{"$oid":"5f3e339166cc3f0590a28a53"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979114585595","title":"AuditScripts-Critical-Security-Control-Manual-Assessment-Tool-v7.0_JOEY_v2.xls","filename":"/drive/CRA/AuditScripts-Critical-Security-Control-Manual-Assessment-Tool-v7.0_JOEY_v2.xls","category":"","author":"System","deyt":{"$date":"2019-03-18T04:11:36Z"},"size":745984,"content":"Critical Security Controls Initial Assessment Tool (v7.0b),,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, Instructions - Read me first.,,,,,,,,,,,,,,, \"The purpose for this tool is to provide organizations with a simple tool for performing an initial assessment of their information assurance maturity level based on the controls defined by the Critical Security Controls and the Council on Cybersecurity. Any questions about how this tool works or suggestions can be directed to info@auditscripts.com. In order to use this tool, the assessor must only complete the answers to the drop down menu questions lists on the pages labeled CSC #1 - CSC #20. By choosing a drop down choice for each critical control, the assessment tool will automatically generate scores and maturity level based on the answers to each question. Based on the answers to each question, the dashboard worksheet will automatically populate with the overall maturity level scores for the organization as a whole. These scores can therefore be used to measure the organization's progress and what percentage of the Critical Security Controls they are currently following. Ideally in the long term organizations would deploy tools that would automate the collection of this information, but in the meanwhile, this tool can be used to help start the process of manually assessing the organization's maturity level.\",,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, Field Definitions,,,,,,,,,,,,,,, ID,,,This is the ID number of the specific critical security control sub-control reference as included in the Critical Security Controls documentation.,,,,,,,,,,,, Critical Security Control Detail,,,This is the detail behind each specific sub-control as defined by the Critical Security Controls documentation.,,,,,,,,,,,, EOF Function,,,\"This standards for \"\"Executive Order Framework (EOF)\"\" function. These functions were defined by NIST in the EOF and act as control characteristics.\",,,,,,,,,,,, Sensor or Baseline,,,This is the type of technical system or baseline that we believe is necessary in order to implement the specific sub control.,,,,,,,,,,,, Policy Approved,,,This question determines whether the organization currently has a policy defined that indicates that they should be implementing the defined sub control.,,,,,,,,,,,, Control Implemented,,,This question determines whether or not the organization currently has implemented this sub control and to what degree the control has been implemented.,,,,,,,,,,,, Control Automated,,,This question determines whether or not the organization currently has automated the implementation of this sub control and to what degree the control has been automated.,,,,,,,,,,,, Control Reported to Business,,,This question determines whether or not the organization is reporting this sub control to business representatives and to what degree the control has been reported.,,,,,,,,,,,, ,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.,,,,,,,,,,,,,,, Critical Security Controls Initial Assessment Tool (v7.0b),,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,CSC #1,56% Maturity level:,Description:,Score:,,,,,,,,,,,,,,,CSC #2,58% Level One,Policies Complete,1.89,,,,,,,,,,,,,,,CSC #3,83% Level Two,Controls 1-5 Implemented,1.18,,,,,,,,,,,,,,,CSC #4,67% Level Three,All Controls Implemented,1.54,,,,,,,,,,,,,,,CSC #5,75% Level Four,All Controls Automated,1.31,,,,,,,,,,,,,,,CSC #6,75% Level Five,All Controls Reported,1.44,,,,,,,,,,,,,,,CSC #7,67% ,,,,,,,,,,,,,,,,,CSC #8,67% ,Maturity Rating*:,7.35,,,,,,,,,,,,,,,CSC #9,83% ,*Rating is on a 0-5 scale.,,,,,,,,,,,,,,,,CSC #10,83% ,,,,,,,,,,,,,,,,,CSC #11,75% ,,,,,,,,,,,,,,,,,CSC #12,75% ,,,,,,,,,,,,,,,,,CSC #13,75% ,,,,,,,,,,,,,,,,,CSC #14,75% ,,,,,,,,,,,,,,,,,CSC #15,75% ,,,,,,,,,,,,,,,,,CSC #16,75% ,,,,,,,,,,,,,,,,,CSC #17,75% ,,,,,,,,,,,,,,,,,CSC #18,75% ,,,,,,,,,,,,,,,,,CSC #19,75% ,,,,,,,,,,,,,,,,,CSC #20,50% ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, Critical Security Control #1: Inventory and Control of Hardware Assets,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,Risk Addressed:,56%,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,Risk Accepted:,44%,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ID,Critical Security Control Detail,NIST CSF,Sensor or Baseline,Policy Defined,Control Implemented,Control Automated or Technically Enforced,Control Reported to Business,,,,,,,,NIST CF,DO NOT CHANGE THESE VALUES 1.1,Utilize an active discovery tool to identify devices connected to the organization's network and update the hardware asset inve","routeslip":"","__v":0}
53+{"_id":{"$oid":"5f3e339166cc3f0590a28a54"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979114585603","title":"AuditScripts-Critical-Security-Control-Manual-Assessment-Tool-v7.0_Joey.xls","filename":"/drive/CRA/AuditScripts-Critical-Security-Control-Manual-Assessment-Tool-v7.0_Joey.xls","category":"","author":"System","deyt":{"$date":"2019-02-27T01:24:50Z"},"size":735744,"content":"Critical Security Controls Initial Assessment Tool (v7.0b),,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, Instructions - Read me first.,,,,,,,,,,,,,,, \"The purpose for this tool is to provide organizations with a simple tool for performing an initial assessment of their information assurance maturity level based on the controls defined by the Critical Security Controls and the Council on Cybersecurity. Any questions about how this tool works or suggestions can be directed to info@auditscripts.com. In order to use this tool, the assessor must only complete the answers to the drop down menu questions lists on the pages labeled CSC #1 - CSC #20. By choosing a drop down choice for each critical control, the assessment tool will automatically generate scores and maturity level based on the answers to each question. Based on the answers to each question, the dashboard worksheet will automatically populate with the overall maturity level scores for the organization as a whole. These scores can therefore be used to measure the organization's progress and what percentage of the Critical Security Controls they are currently following. Ideally in the long term organizations would deploy tools that would automate the collection of this information, but in the meanwhile, this tool can be used to help start the process of manually assessing the organization's maturity level.\",,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, Field Definitions,,,,,,,,,,,,,,, ID,,,This is the ID number of the specific critical security control sub-control reference as included in the Critical Security Controls documentation.,,,,,,,,,,,, Critical Security Control Detail,,,This is the detail behind each specific sub-control as defined by the Critical Security Controls documentation.,,,,,,,,,,,, EOF Function,,,\"This standards for \"\"Executive Order Framework (EOF)\"\" function. These functions were defined by NIST in the EOF and act as control characteristics.\",,,,,,,,,,,, Sensor or Baseline,,,This is the type of technical system or baseline that we believe is necessary in order to implement the specific sub control.,,,,,,,,,,,, Policy Approved,,,This question determines whether the organization currently has a policy defined that indicates that they should be implementing the defined sub control.,,,,,,,,,,,, Control Implemented,,,This question determines whether or not the organization currently has implemented this sub control and to what degree the control has been implemented.,,,,,,,,,,,, Control Automated,,,This question determines whether or not the organization currently has automated the implementation of this sub control and to what degree the control has been automated.,,,,,,,,,,,, Control Reported to Business,,,This question determines whether or not the organization is reporting this sub control to business representatives and to what degree the control has been reported.,,,,,,,,,,,, ,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.,,,,,,,,,,,,,,, Critical Security Controls Initial Assessment Tool (v7.0b),,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,CSC #1,25% Maturity level:,Description:,Score:,,,,,,,,,,,,,,,CSC #2,38% Level One,Policies Complete,0.98,,,,,,,,,,,,,,,CSC #3,71% Level Two,Controls 1-5 Implemented,0.59,,,,,,,,,,,,,,,CSC #4,75% Level Three,All Controls Implemented,0.75,,,,,,,,,,,,,,,CSC #5,75% Level Four,All Controls Automated,0.50,,,,,,,,,,,,,,,CSC #6,75% Level Five,All Controls Reported,0.75,,,,,,,,,,,,,,,CSC #7,75% ,,,,,,,,,,,,,,,,,CSC #8,75% ,Maturity Rating*:,3.57,,,,,,,,,,,,,,,CSC #9,75% ,*Rating is on a 0-5 scale.,,,,,,,,,,,,,,,,CSC #10,75% ,,,,,,,,,,,,,,,,,CSC #11,75% ,,,,,,,,,,,,,,,,,CSC #12,75% ,,,,,,,,,,,,,,,,,CSC #13,75% ,,,,,,,,,,,,,,,,,CSC #14,75% ,,,,,,,,,,,,,,,,,CSC #15,70% ,,,,,,,,,,,,,,,,,CSC #16,75% ,,,,,,,,,,,,,,,,,CSC #17,75% ,,,,,,,,,,,,,,,,,CSC #18,75% ,,,,,,,,,,,,,,,,,CSC #19,75% ,,,,,,,,,,,,,,,,,CSC #20,100% ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, Critical Security Control #1: Inventory and Control of Hardware Assets,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,Risk Addressed:,57%,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,Risk Accepted:,43%,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ID,Critical Security Control Detail,NIST CSF,Sensor or Baseline,Policy Defined,Control Implemented,Control Automated or Technically Enforced,Control Reported to Business,,,,,,,,NIST CF,DO NOT CHANGE THESE VALUES 1.1,Utilize an active discovery tool to identify devices connected to the organization's network and update the hardware asset inv","routeslip":"","__v":0}
54+{"_id":{"$oid":"5f3e339166cc3f0590a28a55"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979114585608","title":"AuditScripts-Critical-Security-Control-Manual-Assessment-Tool-v7.0b.xlsx","filename":"/drive/CRA/AuditScripts-Critical-Security-Control-Manual-Assessment-Tool-v7.0b.xlsx","category":"","author":"System","deyt":{"$date":"2019-02-22T07:28:56Z"},"size":331308,"content":"Critical Security Controls Initial Assessment Tool (v7.0b),,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, Instructions - Read me first.,,,,,,,,,,,,,,, \"The purpose for this tool is to provide organizations with a simple tool for performing an initial assessment of their information assurance maturity level based on the controls defined by the Critical Security Controls and the Council on Cybersecurity. Any questions about how this tool works or suggestions can be directed to info@auditscripts.com. In order to use this tool, the assessor must only complete the answers to the drop down menu questions lists on the pages labeled CSC #1 - CSC #20. By choosing a drop down choice for each critical control, the assessment tool will automatically generate scores and maturity level based on the answers to each question. Based on the answers to each question, the dashboard worksheet will automatically populate with the overall maturity level scores for the organization as a whole. These scores can therefore be used to measure the organization's progress and what percentage of the Critical Security Controls they are currently following. Ideally in the long term organizations would deploy tools that would automate the collection of this information, but in the meanwhile, this tool can be used to help start the process of manually assessing the organization's maturity level.\",,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, Field Definitions,,,,,,,,,,,,,,, ID,,,This is the ID number of the specific critical security control sub-control reference as included in the Critical Security Controls documentation.,,,,,,,,,,,, Critical Security Control Detail,,,This is the detail behind each specific sub-control as defined by the Critical Security Controls documentation.,,,,,,,,,,,, EOF Function,,,\"This standards for \"\"Executive Order Framework (EOF)\"\" function. These functions were defined by NIST in the EOF and act as control characteristics.\",,,,,,,,,,,, Sensor or Baseline,,,This is the type of technical system or baseline that we believe is necessary in order to implement the specific sub control.,,,,,,,,,,,, Policy Approved,,,This question determines whether the organization currently has a policy defined that indicates that they should be implementing the defined sub control.,,,,,,,,,,,, Control Implemented,,,This question determines whether or not the organization currently has implemented this sub control and to what degree the control has been implemented.,,,,,,,,,,,, Control Automated,,,This question determines whether or not the organization currently has automated the implementation of this sub control and to what degree the control has been automated.,,,,,,,,,,,, Control Reported to Business,,,This question determines whether or not the organization is reporting this sub control to business representatives and to what degree the control has been reported.,,,,,,,,,,,, ,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.,,,,,,,,,,,,,,, Critical Security Controls Initial Assessment Tool (v7.0b),,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,CSC #1,0% Maturity level:,Description:,Score:,,,,,,,,,,,,,,,CSC #2,0% Level One,Policies Complete,0.00,,,,,,,,,,,,,,,CSC #3,0% Level Two,Controls 1-5 Implemented,0.00,,,,,,,,,,,,,,,CSC #4,0% Level Three,All Controls Implemented,0.00,,,,,,,,,,,,,,,CSC #5,0% Level Four,All Controls Automated,0.00,,,,,,,,,,,,,,,CSC #6,0% Level Five,All Controls Reported,0.00,,,,,,,,,,,,,,,CSC #7,0% ,,,,,,,,,,,,,,,,,CSC #8,0% ,Maturity Rating*:,0.00,,,,,,,,,,,,,,,CSC #9,0% ,*Rating is on a 0-5 scale.,,,,,,,,,,,,,,,,CSC #10,0% ,,,,,,,,,,,,,,,,,CSC #11,0% ,,,,,,,,,,,,,,,,,CSC #12,0% ,,,,,,,,,,,,,,,,,CSC #13,0% ,,,,,,,,,,,,,,,,,CSC #14,0% ,,,,,,,,,,,,,,,,,CSC #15,0% ,,,,,,,,,,,,,,,,,CSC #16,0% ,,,,,,,,,,,,,,,,,CSC #17,0% ,,,,,,,,,,,,,,,,,CSC #18,0% ,,,,,,,,,,,,,,,,,CSC #19,0% ,,,,,,,,,,,,,,,,,CSC #20,0% ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, Critical Security Control #1: Inventory and Control of Hardware Assets,,,,,,,,,,,,,, ,,,,,,,,,,,,,, ,,,,,,,,,,,,,, ,,,,,,,,,,,,,, ,,Risk Addressed:,0%,,,,,,,,,,, ,,,,,,,,,,,,,, ,,Risk Accepted:,100%,,,,,,,,,,, ,,,,,,,,,,,,,, ,,,,,,,,,,,,,, ,,,,,,,,,,,,,, ,,,,,,,,,,,,,, ,,,,,,,,,,,,,, ,,,,,,,,,,,,,, ,,,,,,,,,,,,,, ,,,,,,,,,,,,,, ,,,,,,,,,,,,,, ,,,,,,,,,,,,,, ,,,,,,,,,,,,,, ,,,,,,,,,,,,,, ID,Critical Security Control Detail,NIST CSF,Sensor or Baseline,Policy Defined,Control Implemented,Control Automated or Technically Enforced,Control Reported to Business,,,,,,, 1.1,Utilize an active discovery tool to identify devices connected to the organization's network and update the hardware asset inventory.,Identify,Active Device Discovery System,No Policy,Not Implemented,Not Automated,Not Re","routeslip":"","__v":0}
55+{"_id":{"$oid":"5f3e339166cc3f0590a28a56"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979114585600","title":"AuditScripts-Critical-Security-Control-Master-Mappings-v7.0d.xlsx","filename":"/drive/CRA/AuditScripts-Critical-Security-Control-Master-Mappings-v7.0d.xlsx","category":"","author":"System","deyt":{"$date":"2019-02-22T07:28:56Z"},"size":651862,"content":",Critical Security Controls,Master Mappings Tool (v7.0c),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, Critical Security Control,NIST 800-53 rev4,NIST CSF v1.0,NIST CSF v1.1,NIST 800-82 rev2,NIST SMB Guide,DHS CDM Program,ISO 27002:2013,ISO 27002:2005,IEC 62443-3-3:2013,NIST 800-171,NSA MNP,Australian Essential Eight,Australian Top 35,NSA Top 10,Canadian CSE Top 10,GCHQ 10 Steps,UK Cyber Essentials,UK ICO Protecting Data,PCI DSS 3.2,PCI DSS 3.1,PCI DSS 3.0,HIPAA,FFIEC Information Security Booklet (2016),FFIEC Examiners Handbook,FFIEC Cybersecurity Assessment Tool (CAT),COBIT 5,AICPA SOC 2 & SOC3 TSPC,AICPA's GAPP,IRS Pub1075,SWIFT,SG MAS TRM,Saudi AMA,NERC CIP v7,NERC CIP v6,NERC CIP v5,NERC CIP v4,NERC CIP v3,Cloud Security Alliance,SEC OCIE for AWS,FY15 FISMA Metrics,ITIL 2011 KPIs,NV Gaming MICS v7 2015,MA - CoM 201 CMR 17.00,NY - NYCRR 500,Victorian PDSF v1.0,ANSSI - 40 Measures Critical Security Control #1: Inventory of Authorized and Unauthorized Devices,\"CA-7: Continuous Monitoring CM-8: Information System Component Inventory IA-3: Device Identification and Authentication SA-4: Acquisition Process SC-17: Public Key Infrastructure Certificates SI-4: Information System Monitoring PM-5: Information System Inventory\",\"ID.AM-1 ID.AM-3 ID.AM-4 PR.DS-3\",\"ID.AM-1 ID.AM-3 ID.AM-4 PR.DS-3\",\"6.2.16 6.2.17\",4.0d,HWAM: Hardware Asset Management,\"A.8.1.1 A.9.1.2 A.13.1.1\",\"A.7.1.1 A.10.6.1 - A.10.6.2 A.11.4.6\",\"SR 1.2 SR 2.3 SR 7.8\",,\"Map Your Network Baseline Management Document Your Network Personal Electronic Device Management Network Access Control Log Management\",,,,,,,Inappropriate locations for processing data,2.4,2.4,2.4,\"164.310(b): Workstation Use - R 164.310(c): Workstation Security - R\",II.C.5,\"Host Security User Equipment Security (Workstation, Laptop, Handheld)\",\"Domain 3: Cybersecurity Controls - Preventative Controls Domain 3: Cybersecurity Controls - Detective Controls\",\"APO13: Manage Security DSS05: Manage Security Services BAI09: Manage Assets\",,\"7.2.2 8.2.1 8.2.2\",9.4.12,,6 - Acquisition and Development of Information Systems,3.3.3,\"CIP-002-5.1 R1 CIP-002-5.1 R2\",\"CIP-002-5.1 R1 CIP-002-5.1 R2\",\"CIP-002-5.1 R1 CIP-002-5.1 R2\",\"CIP-002-4 R1 CIP-002-4 R2 CIP-002-4 R3 CIP-003-4 R5 CIP-004-4 R4 CIP-005-4 R2 CIP-006-4 R3\",\"CIP-002-3 R1 CIP-002-3 R2 CIP-002-3 R3 CIP-002-3 R4 CIP-003-3 R5 CIP-004-3 R4 CIP-005-3 R2 CIP-006-3 R3\",\"DCS-01 MOS-09 MOS-15\",,\"1: System Inventory 2: Continuous Monitoring\",Information Security Management,,,,,\"1 34\" Critical Security Control #2: Inventory of Authorized and Unauthorized Software,\"CA-7: Continuous Monitoring CM-2: Baseline Configuration CM-8: Information System Component Inventory CM-10: Software Usage Restrictions CM-11: User-Installed Software SA-4: Acquisition Process SC-18: Mobile Code SC-34: Non-Modifiable Executable Programs SI-4: Information System Monitoring PM-5: Information System Inventory\",\"ID.AM-2 PR.DS-6\",\"ID.AM-2 PR.DS-6\",\"6.2.16 6.2.17\",,\"HWAM: Hardware Asset Management SWAM: Software Asset Management\",\"A.12.5.1 A.12.6.2\",,SR 1.2,\"3.4.8 3.4.9\",\"Baseline Management Executable Content Restrictions Configuration and Change Management\",1,\"1 14 17\",Application Whitelisting,\"8 10\",,,Decommissioning of software or services,2.4,2.4,2.4,\"164.310(b): Workstation Use - R 164.310(c): Workstation Security - R\",,\"Host Security User Equipment Security (Workstation, Laptop, Handheld)\",\"Domain 3: Cybersecurity Controls - Preventative Controls Domain 3: Cybersecurity Controls - Detective Controls\",\"APO13: Manage Security DSS05: Manage Security Services\",,\"7.2.2 8.2.1\",9.4.12,1.1-opt,6 - Acquisition and Development of Information Systems,3.3.3,CIP-010-3 R1,CIP-010-2 R1,CIP-010-1 R1,,,\"CCC-04 MOS-3 MOS-04 MOS-15\",,\"1: System Inventory 2: Continuous Monitoring\",Information Security Management,,VI-02,,,\"16 17 18 20 23\" Critical Security Control #3: Continuous Vulnerability Assessment and Remediation,\"CA-2: Security Assessments CA-7: Continuous Monitoring RA-5: Vulnerability Scanning SC-34: Non-Modifiable Executable Programs SI-4: Information System Monitoring SI-7: Software, Firmware, and Information Integrity\",\"ID.RA-1 ID.RA-2 PR.IP-12 DE.CM-8 RS.MI-3\",\"ID.RA-1 ID.RA-2 PR.IP-12 DE.CM-8 RS.AN-5 RS.MI-3\",\"6.2.16 6.2.17\",3.2c,VUL: Vulnerability Management,\"A.12.6.1 A.14.2.8\",\"A.12.6.1 A.13.1.2 A.15.2.2\",,\"3.11.2 3.11.3 3.12.2 3.14.1\",\"Patch Management Log Management Configuration and Change Management\",\"2 6\",2-3,Take Advantage of Software Improvements,\"2 8\",,Patch Management,Software Updates,\"6.1 6.2 11.2\",\"6.1 6.2 11.2\",\"6.1 6.2 11.2\",\"164.310(b): Workstation Use - R 164.310(c): Workstation Security - R\",,\"Host Security User Equipment Security (Workstation, Laptop, Handheld)\",\"Domain 3: Cybersecurity Controls - Preventative Controls Domain 3: Cybersecurity Controls - Detective Controls\",\"APO13: Manage Security DSS05: Manage Security Services\",CC 6.1,\"7.2.2 8.2.1\",9.3.4,\"2.2 2.7a\",9 - Operational Infrastructure Security Manage","routeslip":"","__v":0}
56+{"_id":{"$oid":"5f3e339166cc3f0590a28a57"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979114585610","title":"CRA_PN.xlsx","filename":"/drive/CRA/CRA_PN.xlsx","category":"","author":"System","deyt":{"$date":"2019-02-18T08:38:19.857Z"},"size":29019,"content":"Security Controls,Hazards,Probability,Severity,Risk Level,Control Measures,Residual Probability,Residual Severity,Residual ,,,,,,,, ,,,,,,,,Risk Level 1. Inventory of Authorized and Unauthorized Devices,2. Presence of ,,,,,,, ,Unauthorized Devices,Likely,Critical,H,q Conduct inventory of existing devices ,Unlike ly,Negligible,L ,,,,,,,, ,1. Non-utilization of Passive and Active Discovery Tool (ex: colasoft),,,,q Report newly acquired devices ,,, ,2. No up-to-date inventory of all technology assets,,,,q Include in the inventory all non-organic devices that connects PN ICT infrastructure,,, ,3. No DHCP logging on all DHCP servers,,,,,,, ,,,,,,,, ,,,,,q Submit monthly regular update or when there is changes,,, 2. Inventory of Authorized and Unauthorized Software,3. Incomplete inventory of Authorized and,Likely,Critical,H,q Conduct inventory of existing software ,Unlikely,Negligible,L ,Unauthorized Software,,,,,,, ,,,,,q Report newly acquired software ,,, ,,,,,q Include in the inventory all non-organic software that connects PN ICT infrastructure,,, ,,,,,q Submit monthly regular update or when there is changes,,, ,,,,,q Submit inventory of any pirated OS and applications,,, \"3. Secure Configurations for Hardware and Software on Mobile Devices, Laptop, Workstations, and Servers\",4. Unsecured Configuration of,,,,,,, ,End-User Devices,Likely,CATASTROPHIC,EH,q Formulate and create a secure configuration for desktops and laptops,Unlikely,Negligible,L ,,,,,,,, ,,,,,q Formulate and create a secure configuration for mobile devices,,, ,,,,,q Implement secure configuration to all devices,,, 4. Continuous Vulnerability Assessment and Remediation,5. No continuous Vulnerability,,,,,,, ,Assessment & Remediation,Seldom,Marginal,L,q Conduct research of new vulnerabilities discovered and published,Unlikely,Negligible,L ,,,,,,,, ,,,,,q Conduct testing of new exploits to new vulnerabilities discovered and published,,, ,,,,,q Conduct necessary remediation to counter new vulnerabilities discovered and published ,,, ,,,,,,,, 5. Malware Defenses,9. Lack of malware Defense,Seldom,Marginal,L,q Conduct information security awareness,Unlikely,Negligible,L ,,,,,,,, ,,,,,q Conduct research of new Malware discovered and published,,, ,,,,,,,, ,,,,,q Conduct research on how to mitigate the Malware discovered,,, ,,,,,,,, ,,,,,q Install internet security and IPS,,, ,,,,,,,, ,,,,,q Install and implement Deep freeze to MS Windows system,,, ,,,,,,,, ,,,,,q Ensure back-up of files offline,,, 6. Application Software Security,19. No application Software Security,,,,,,, ,,Unlikely,Negligible,L,q ,Unlikely,Negligible,L ,,,,,,,, ,,,,,,,, 7. Wireless Device Control,16. Lack of wireless Access Control,,,,,,, ,,Seldom,Critical,L,\"q Audit all wireless access points, wireless routers, and all wireless devices (organic and non-organic)\",Unlikely,Negligible,L ,,,,,,,, ,,,,,q Create a secure wireless configuration,,, ,,,,,,,, ,,,,,q Implement PKI Server,,, ,,,,,,,, ,,,,,q Implement Radius server,,, 8. Data Recovery Capability ,,,,,,,, ,11. Limited data Recovery Capability,Occasional,Critical,H,q Conduct inventory of available hardware and software tools,Unlikely,Negligible,L ,,,,,,,, ,,,,,q Identify required hardware and software tools,,, ,,,,,,,, ,,,,,q Submit required hardware and software tools,,, ,,,,,,,, ,,,,,q Train personnel to use hardware and software tools,,, 9. Security Skills Assessment and Appropriate Training to Fill Gaps,,,,,,,, ,18. Limited security Skills Assessment and,Seldom,Marginal,H,q ,Unlikely,Negligible,L ,Appropriate Training,,,,,,, ,,,,,,,, ,,,,,,,, \"10. Secure Configurations for Network Devices such as Firewalls, Router, and Switches\",12. Lack of secure Configuration of,,,,,,, ,Network Devices,Likely,Critical,H,q Formulate and create a secure configuration for all network devices,Unlikely,Negligible,L ,,,,,,,, ,,,,,q Implement secure configuration to all devices,,, \"11. Limited and Control of Networks Ports, Protocols, and Services\",10. Lack of limitation & Control of Network,,,,,,, ,\"Ports, Protocols, and Service\",Occasional,Catastrophic,M,q Create and formulate policy to identify network access of end user thru role-based,Unlikely,Negligible,L ,,,,,,,, ,\"Ensure that only ports, protocols, and services with validated business needs are running on each system.\",,,,,,, ,,,,,,,, ,\"Apply host-based firewalls or port filtering tools on end systems, with a default-deny rule that drops all traffic except those services and ports that are explicitly allowed.\",,,,,,, ,\"Perform automated port scans on a regular basis against all key servers and compared to a known effective baseline. If a change that is not listed on the organization's approved baseline is discovered, an alert should be generated and reviewed.\",,,,,,, ,,,,,,,, ,Keep all services up to date and uninstall and remove any unnecessary components from the system.,,,,q Implement network access thru role-based,,, ,\"Verify any server that is visible from the Internet or an untrusted ne","routeslip":"","__v":0}
57+{"_id":{"$oid":"5f3e339166cc3f0590a28a58"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979114585610","title":"CRA.xlsx","filename":"/drive/CRA/CRA.xlsx","category":"","author":"System","deyt":{"$date":"2019-02-13T03:07:24Z"},"size":20182,"content":"Security Controls,Hazards,Probability,Severity,Risk Level,Control Measures,Residual Probability,Residual Severity,Residual ,,,,,,,, ,,,,,,,,Risk Level 1. Inventory of Authorized and Unauthorized Devices,2. Presence of ,,,,,,, ,Unauthorized Devices,Likely,Critical,H,q Conduct inventory of existing devices ,Unlike ly,Negligible,L ,,,,,,,, ,1. Non-utilization of Passive and Active Discovery Tool (ex: colasoft),,,,q Report newly acquired devices ,,, ,2. No up-to-date inventory of all technology assets,,,,q Include in the inventory all non-organic devices that connects PN ICT infrastructure,,, ,3. No DHCP logging on all DHCP servers,,,,,,, ,,,,,,,, ,,,,,q Submit monthly regular update or when there is changes,,, 2. Inventory of Authorized and Unauthorized Software,3. Incomplete inventory of Authorized and,Likely,Critical,H,q Conduct inventory of existing software ,Unlikely,Negligible,L ,Unauthorized Software,,,,,,, ,,,,,q Report newly acquired software ,,, ,,,,,q Include in the inventory all non-organic software that connects PN ICT infrastructure,,, ,,,,,q Submit monthly regular update or when there is changes,,, ,,,,,q Submit inventory of any pirated OS and applications,,, \"3. Secure Configurations for Hardware and Software on Mobile Devices, Laptop, Workstations, and Servers\",4. Unsecured Configuration of,,,,,,, ,End-User Devices,Likely,CATASTROPHIC,EH,q Formulate and create a secure configuration for desktops and laptops,Unlikely,Negligible,L ,,,,,,,, ,,,,,q Formulate and create a secure configuration for mobile devices,,, ,,,,,q Implement secure configuration to all devices,,, 4. Continuous Vulnerability Assessment and Remediation,5. No continuous Vulnerability,,,,,,, ,Assessment & Remediation,Seldom,Marginal,L,q Conduct research of new vulnerabilities discovered and published,Unlikely,Negligible,L ,,,,,,,, ,,,,,q Conduct testing of new exploits to new vulnerabilities discovered and published,,, ,,,,,q Conduct necessary remediation to counter new vulnerabilities discovered and published ,,, ,,,,,,,, 5. Malware Defenses,9. Lack of malware Defense,Seldom,Marginal,L,q Conduct information security awareness,Unlikely,Negligible,L ,,,,,,,, ,,,,,q Conduct research of new Malware discovered and published,,, ,,,,,,,, ,,,,,q Conduct research on how to mitigate the Malware discovered,,, ,,,,,,,, ,,,,,q Install internet security and IPS,,, ,,,,,,,, ,,,,,q Install and implement Deep freeze to MS Windows system,,, ,,,,,,,, ,,,,,q Ensure back-up of files offline,,, 6. Application Software Security,19. No application Software Security,,,,,,, ,,Unlikely,Negligible,L,q ,Unlikely,Negligible,L ,,,,,,,, ,,,,,,,, 7. Wireless Device Control,16. Lack of wireless Access Control,,,,,,, ,,Seldom,Critical,L,\"q Audit all wireless access points, wireless routers, and all wireless devices (organic and non-organic)\",Unlikely,Negligible,L ,,,,,,,, ,,,,,q Create a secure wireless configuration,,, ,,,,,,,, ,,,,,q Implement PKI Server,,, ,,,,,,,, ,,,,,q Implement Radius server,,, 8. Data Recovery Capability ,,,,,,,, ,11. Limited data Recovery Capability,Occasional,Critical,H,q Conduct inventory of available hardware and software tools,Unlikely,Negligible,L ,,,,,,,, ,,,,,q Identify required hardware and software tools,,, ,,,,,,,, ,,,,,q Submit required hardware and software tools,,, ,,,,,,,, ,,,,,q Train personnel to use hardware and software tools,,, 9. Security Skills Assessment and Appropriate Training to Fill Gaps,,,,,,,, ,18. Limited security Skills Assessment and,Seldom,Marginal,H,q ,Unlikely,Negligible,L ,Appropriate Training,,,,,,, ,,,,,,,, ,,,,,,,, \"10. Secure Configurations for Network Devices such as Firewalls, Router, and Switches\",12. Lack of secure Configuration of,,,,,,, ,Network Devices,Likely,Critical,H,q Formulate and create a secure configuration for all network devices,Unlikely,Negligible,L ,,,,,,,, ,,,,,q Implement secure configuration to all devices,,, \"11. Limited and Control of Networks Ports, Protocols, and Services\",10. Lack of limitation & Control of Network,,,,,,, ,\"Ports, Protocols, and Service\",Occasional,Catastrophic,M,q Create and formulate policy to identify network access of end user thru role-based,Unlikely,Negligible,L ,,,,,,,, ,,,,,q Implement network access thru role-based,,, ,,,,,,,, ,,,,,q Create and formulate policy to sanction violators,,, ,,,,,,,, ,,,,,,,, 12. Controlled Use of Administrative Privileges,6. Uncontrolled Use of,,,,,,, ,Administrative Privileges,Frequent,Catastrophic,M,q Identify and designate personnel to act as a system administrator,Unlikely,Negligible,L ,,,,,,,, ,,,,,q Issuance of order as system administrator,,, ,,,,,q Create and formulate policy to restrict the access of systems to designated system administrator,,, ,,,,,,,, ,,,,,q Create and formulate policy to sanction violators,,, ,,,,,,,, 13. Boundary Defense,13. Lack of Boundary Defense,Likely,Catastrophic,M,q Identify PN camps that needs boundary defense,Unlikely,Negligible,L ,,,,,,,, ,,,,,q Determine and submit requirements ","routeslip":"","__v":0}
58+{"_id":{"$oid":"5f3e339166cc3f0590a28a59"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979114585642","title":"SANS Audit Checklist.xls","filename":"/drive/CRA/SANS Audit Checklist.xls","category":"","author":"System","deyt":{"$date":"2019-02-18T08:28:03.956Z"},"size":1706496,"content":"Critical Security Controls Initial Assessment Tool (v5.0b),,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, Instructions - Read me first.,,,,,,,,,,,,,,, \"The purpose for this tool is to provide organizations with a simple tool for performing an initial assessment of their information assurance maturity level based on the controls defined by the Critical Security Controls and the Council on Cybersecurity. Any questions about how this tool works or suggestions can be directed to info@auditscripts.com. In order to use this tool, the assessor must only complete the answers to the drop down menu questions lists on the pages labeled CSC #1 - CSC #20. By choosing a drop down choice for each critical control, the assessment tool will automatically generate scores and maturity level based on the answers to each question. Based on the answers to each question, the dashboard worksheet will automatically populate with the overall maturity level scores for the organization as a whole. These scores can therefore be used to measure the organization's progress and what percentage of the Critical Security Controls they are currently following. Ideally in the long term organizations would deploy tools that would automate the collection of this information, but in the meanwhile, this tool can be used to help start the process of manually assessing the organization's maturity level.\",,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, Field Definitions,,,,,,,,,,,,,,, ID,,,This is the ID number of the specific critical security control sub-control reference as included in the Critical Security Controls documentation.,,,,,,,,,,,, Category,,,This is the critical control category as defined by the Critical Security Controls documentation.,,,,,,,,,,,, Critical Security Control Detail,,,This is the detail behind each specific sub-control as defined by the Critical Security Controls documentation.,,,,,,,,,,,, EOF Function,,,\"This standards for \"\"Executive Order Framework (EOF)\"\" function. These functions were defined by NIST in the EOF and act as control characteristics.\",,,,,,,,,,,, Sensor or Baseline,,,This is the type of technical system or baseline that we believe is necessary in order to implement the specific sub control.,,,,,,,,,,,, Policy Approved,,,This question determines whether the organization currently has a policy defined that indicates that they should be implementing the defined sub control.,,,,,,,,,,,, Control Implemented,,,This question determines whether or not the organization currently has implemented this sub control and to what degree the control has been implemented.,,,,,,,,,,,, Control Automated,,,This question determines whether or not the organization currently has automated the implementation of this sub control and to what degree the control has been automated.,,,,,,,,,,,, Control Reported to Business,,,This question determines whether or not the organization is reporting this sub control to business representatives and to what degree the control has been reported.,,,,,,,,,,,, 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0 ,,,,,,,,,,,,,,,,,,, Maturity level:,Desription:,Score:,,,,,,,,,,,,,,,,, Level One,Policies Complete,0.00,,,,,,,,,,,,,,,,, Level Two,Controls 1-5 Implemented,0.00,,,,,,,,,,,,,,,,, Level Three,All Controls Implemented,0.00,,,,,,,,,,,,,,,,, Level Four,All Controls Automated,0.00,,,,,,,,,,,,,,,,, Level Five,All Controls Reported,0.00,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,Maturity Rating*:,0,,,,,,,,,,,,,,,,, ,*Rating is on a 0-5 scale.,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,, Critical Security Control #1: Inventory of Authorized and Unauthorized Devices,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, ID,Category,Critical Security Control Detail,NIST Core Framework,Sensor or Baseline,Policy Defined,Control Implemented,Control Automated,Control Reported to Business,,,,,,, 1.1,QW,Deploy an automated asset inventory discovery tool and use it to build a preliminary asset inventory of systems c","routeslip":"","__v":0}
59+{"_id":{"$oid":"5f3e339166cc3f0590a28a5a"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979115038326","title":"Network and IS.xlsx","filename":"/drive/N6C/Network and IS.xlsx","category":"","author":"System","deyt":{"$date":"2020-03-09T08:29:45.081Z"},"size":21370,"content":"USERS,PROVIDER,BANDWIDTH (MBPS),,Status ,,,, HNICTC,PLDT,10,30,Operating NICTS-Manila,PLDT,20,60,Operating NICTS –La Union,PLDT,2,20,Operating NICTS-Legazpi,PLDT,2,2,Operating NICTS- Palawan,PLDT,2,2,Operating NICTS-Zamboanga,PLDT,2,20,Operating NICTS- Davao,PLDT,2,20,Operating NICTS- Cebu,PLDT,2,20,Operating NICTS-Bonifacio,PLDT,4,20,Operating NICTU ZAMBALES,PLDT,2,2,Operating NICTU CAGAYAN,PLDT,2,2,Operating FORT SANTIAGO(NRC),PLDT,0.5,4,Operating \"MRIC,NISF\",PLDT,2,10,Operating CWS ZAMBOANGA,PLDT,2,4,Operating NICTU-Ulugan,PLDT,2,2,Operating USERS,Bandwidth (MBPS) ,PROVIDER,REMARKS HNICTC,60,IP CONVERGE,\"Operating(catered within Cavite area units ;NSSC,PHLFLT,FMRF,NCBDE and other tenant units of Cavite\" ,4,I-GATE PREMIUM,Operating(use only by PNC2 Internet) CNSSC,4,BIZ DSL ENTREPRENEUR,Operating(exclusive for CNSSC use only)/offline BNS,8,I-GATE ,Operating NICTS-LaUnion,5,BIZ DSL SMALL BIZ JR,Operating NICTS Palawan,2,DSL SERVICE,Operating NICTS Zamboanga,4,BIZ DSL ENTREPRENEUR ,Operating NICTS Davao,4,DSL SERVICE,Operating NICTS Cebu,2,BIZ DSL SMALL BIZ JR,Operating Information Systems,Software Development (%),End-User Encoding (%) IPMS,100,100 IPMS-Payroll,100,0 CEBIS,100,30 PN GSIS,60,0 IPMS-MEDICS,100,70 IPMS-Reservist,100,50 PRISM (Procurement),100,100 NORS (Operation),0,0 LMIS (OPTAR),0,0 PALMS (Logistics),80,0 Online Recruitment,100,0 PN SEMIS,100,80 ","routeslip":"","__v":0}
60+{"_id":{"$oid":"5f3e339166cc3f0590a28a5b"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15921215655260","title":"Eclipse IDE.pdf","filename":"/drive/N6C/Eclipse IDE.pdf","category":"","author":"System","deyt":{"$date":"2019-08-07T05:47:06.069Z"},"size":462145,"content":"Explore the English language on a new scale using AI-powered English language navigator. Setting up Eclipse: Java's popular IDE Summary This tutorial will help you to install JDK (Java Development Kit), setup Eclipse IDE (Integrated development environment) and get started with Java. Keywords: IDE, Eclipse, JDK Downloads First of all you have to download some stuff from the Internet: 1. Download the latest JDK from: http://java.sun.com/javase/downloads/index.jsp 2. Download Eclipse IDE for Java Developers from: http://www.eclipse.org/downloads/ Installation Run JDK installer and follow instructions. After you installed the JDK, unpack eclipse archive somewhere on a disk and run eclipse.exe. Get started with Eclipse Select a workspace If you did previous steps right, you should see the following: You are asked to select a workspace directory, where all of your further projects would be stored. You may leave the default folder or choose another one. It's important to remember this path for future. After you choose the workspace location, press ok and wait a little, while Eclipse is loading. Creating a project Choose File New Java Project from menu. In the \"New Java Project\" window type \"HelloWorld\" in the project name edit box. Then press Finish button. Click with the right button on the HelloWorld project in package explorer. Choose New Class: Name it \"HelloWorld\" and set checker box to create main method stub. Then press Finish button. Type: System.out.println(\"Hello World! I am new to Java.\"); in the main method's body and run HelloWorld with run button: You will see the result in a console window: Your first Java application is ready! We will discuss it in detail in the next article. If you would like to get known more about SEO, site building, webhosting and everything else concerned with running own wesites, we'd recommend you to visit SEO blog. There you find many useful tutorials and tips on various SEO relevant topics. To start your own website check this: how to set up a website. Partners Ads","routeslip":"","__v":0}
61+{"_id":{"$oid":"5f3e339166cc3f0590a28a5c"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979114555158","title":"Chapter 4 - 09Apr2020.docx.eric.pdf","filename":"/drive/Chapter 4 - 09Apr2020.docx.eric.pdf","category":"","author":"System","deyt":{"$date":"2020-06-15T13:22:14.808Z"},"size":9292226,"content":"Chapter 4 RESULTS AND DISCUSSION This chapter presents the final output of the system and the result of the evaluation. Project description, project structure, and the capabilities and limitations are briefly discussed to elucidate the finished project. The result of the evaluation and its interpretation was also presented in this chapter. Project Description The Cryptographic IM (CIM) system is an instant messaging application that allows data communication among peers. It provides essential features for office collaboration such as one-to-one chat, group chat, file transfer, and others. Multi-layered encryption is integrated into the CIM to provide greater security. Advanced Encryption Standard (AES) and the Hidden in Plain Sight (HIPS) algorithm encrypts the data as it traverses across the network. The system was developed in modules or components making it agile in any type of deployment. Meaning, the CIM can be deployed even without the other modules if it is not required for a particular deployment. There are three (3) modules developed, the base, file transfer, and the encryption module. The base component provides the platform for the two (2) components and other future components to be integrated into. These future components can also be a third-party DLL, API, or SDK. 1592227317969 48 Project Structure The CIM was developed using the Microsoft Visual C# 2017. It runs on both MS Windows 7 and Windows 10 platform and requires dot.Net 4.6 framework. Microsoft Access database engine was included during the installation to allow local storage of user lists and other settings. The figure below shows the final structure of the system. Figure 10. Final Structure of the CIM The CIM is composed of Three (3) modules or components, namely: 1. Base Component – This is the most important component of the CIM. It provides the platform in which other components are integrated into. It comprised the forms, references, properties, libraries, and the main program needed to run the system. The following are the forms created for the base component: a. Login Form – it provides the interface needed to authenticate the user to the CIM server. The password entered by the user is automatically encrypted upon clicking the login button. Components/Modules/Classes CIM Base Component Forms File Transfer Module Encryption Module Chat Form Login Form File Transfer Form Group Chat Form 49 Figure 11. Login Form of the CIM b. Main Window Form – this is the main window that displays after a successful login. Groups and users are populated in the tree view. The green user icon indicates an online user while the gray icon indicates an offline user. Figure 12. Main Window of the CIM after a Successful Login c. Chat Form – this form allows the user to interact with other peers in the CIM through chat or text-based conversation. The chat communication is encrypted by default using AES 256-bit encryption with passkey 50 generated by the system. The user has the option to manually assign a key for a more private conversation. All system generated keys are changed weekly and stored on the server. This allows the organization to decode the previous conversation during an internal investigation as the need arises. Having keys manually entered denies the possibility of having someone to decode the conversation other than the two (2) communicating peers. Figure 13. One-to-One Chat d. Group Chat Form – this allows users to broadcast text conversation among members in the room. Like any similar room chat, any users can join the room and the moderator has the privilege to kick any members he or she chooses. Similar encryption is applied in this window. 51 Figure 14. Group Chat Form e. File Transfer Form – this form requires File Transfer module/class to function. It allows transmission of documents, images, audio, video, applications, and other files from one user to another. When applying encryption to the file, encryption module/class is called. The user has the option to use the HIPS for multi-layered encryption of the file. Figure 15. File Transfer Form 52 2. Encryption Component/ Module – this is the component that provides AES encryption and HIPS hiding feature to the CIM. This module can be deployed separately through Dynamic Link Library (DLL) and can be integrated to any applications. The figure below shows the resulting files after encrypted with AES and embedded in an image file (.cim file extension). Figure 16. CIM Automatic Encryption and Decryption a. AES Encryption – AES as explained in chapter two is an open standard algorithm which can be freely acquired and integrated into an application for strong and robust encryption. The CIM imports the AES library provided in the Microsoft .NET API and wrote specific functions applicable to the system. These four (4) functions are Encrypt String, Decrypt String, Encrypt File, and Decrypt File. The figure on the next page shows the class library for encryption. 53 Figure 17. Encryption Class","routeslip":"","__v":0}
62+{"_id":{"$oid":"5f3e339166cc3f0590a28a5d"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979114555135","title":"Chapter 3 - 09Apr2020.docx.sam.pdf.sam.pdf","filename":"/drive/Chapter 3 - 09Apr2020.docx.sam.pdf.sam.pdf","category":"","author":"System","deyt":{"$date":"2020-07-07T12:54:34.719Z"},"size":10536813,"content":"Information Systems Updates Conference: 29 August 2019 Agenda: Updates on Procurement Monitoring System 1. Invite PS3 and PS6 of AFP PS to be involved in the Procurement System next week. 2. Sub-phases for the PHASE 1 (275 working days) are: a. Sub Phase 1 – Competitive Bidding (95 working days) b. Sub Phase 2 – Alternative mode of procurement c. Sub Phase 3 – File Uploading 3. Submit documentary requirements to COA prior NTP. 4. Phase 2 – implement PKI and Bar coding 5. Phase 3 Cloud based, data analytics, and notification service 6. For modification: a. Delete option is deleted b. Monitoring number of dates, warning to user for the number of dates. c. Progress or milestone payment (this maybe irrelevant because of the \"remark\" option) d. Growth repair 7. Procurement service only encodes contract number and not controls number. 8. Project Control number will be the UPR number. End user will encode the UPS number. 9. Add contract number for PS. drop down \"mode of procurement – Competitive bidding and alternative mode\", Display \"NOA and supplier\" if alternative mode of procurement. 10. Separate interface for internal end users (FOIC monitoring) and public users (supplier). 11. Remove \"remarks\" in public viewing status only. 12. Develop Flowchart for the end users appreciation. Next week. 13. Workshop next week for PRISM. 14. Conference Meeting on 03 September 2019 at 1500H. Agenda: Updates on NRC MIS 1. Start encoding of data (build up database) while developing the other requirements of NRC. 2. Define project objectives and rationale. 3. Develop the entire NRCMIS project in phases. 4. Target date of completion - 10 September 2019. 5. Deployment- 11 September. 6. Users training 12 September. 1594126460911 28 Operational Concept and Dataflow Figure 2 from the previous page illustrates the fundamental structure of the system and flow of data from an end-user's perspective. Client X initiates a chat conversation with Client Y using the CIM client software. During the chat conversation, the system automatically encrypts the text message prior sending it to the IM Relay Server. The server now searches for the intended recipient from its list of client sockets. When the recipient's socket is available, the server transmits the encrypted text message to Client Y (recipient) through its socket. The server manages all clients' sockets. It handles authentication of all incoming clients prior acceptance of the socket. IM Relay Server maintains a minimal database using MS SQL Server, SQL Express, or MS Access for accounts and activity logs. As soon as the text message arrived at Client Y (recipient), the software then decrypts the text using the system-generated key as the default. Unreadable message or randomized characters indicates unmatched passkey. Both Client X (sender) and Client Y (recipient) must encode manually the correct or agreed passkey to decode their conversation. The manual encoding of a passkey is done to deny the system administrator or any authority from decoding the message during the conduct of any special investigation. System generated keys are stored in the server specifically for this purpose. It is strongly suggested that this manual key should be transmitted through another mode of transmission like SMS, Email, or voice call. A similar procedure can be done during sending and receiving files. Client X starts up the File Transfer window and browse for the file. By default, CIM uses Advanced Encryption Standard (AES) 256-bit to encrypt and decrypt text messages and files. The sender can choose to double encrypt the file by hiding it in an image file using 29 steganography or Hidden in Plain Sight (HIPS) algorithm. A checkbox or option button is provided for this feature. By checking both AES and HIPS, the system first encrypts the file using AES and hides the resulting file into an image. The CIM then transmits the image file to the IM relay server. The server searches for the intended recipient from its list of client sockets. When the recipient's socket is available, the server relays the file or message to Client Y (recipient). As soon as the encrypted file or image file arrived, the user can now browse for the file and choose to open it with the same application. The encrypted file is extracted from the image file using the HIPS function for file extraction. After the successful extraction, the CIM now tries to decrypt the extracted file using the system-generated key. If unsuccessful, it asks for the passkey which must be encoded by the receiving user to convert the encrypted file back to its original form. Manual encoding of passkey happens when the sender chooses to encode a different key other than the default system-generated key. Network Architecture To visualize its deployment from a technical perspective, the network diagram is drawn for this purpose. In figure 3 of the next page, the CIM primarily utilizes the Local Area Network (LAN) for inter-office instant messaging and collabor","routeslip":"","__v":0}
63+{"_id":{"$oid":"5f3e339166cc3f0590a28a5e"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979114555144","title":"Chapter 3 - 09Apr2020.docx.sam.pdf.sam.pdf.eric.pdf","filename":"/drive/Chapter 3 - 09Apr2020.docx.sam.pdf.sam.pdf.eric.pdf","category":"","author":"System","deyt":{"$date":"2020-07-07T12:56:26.852Z"},"size":10272392,"content":"Information Systems Updates Conference: 29 August 2019 Agenda: Updates on Procurement Monitoring System 1. Invite PS3 and PS6 of AFP PS to be involved in the Procurement System next week. 2. Sub-phases for the PHASE 1 (275 working days) are: a. Sub Phase 1 – Competitive Bidding (95 working days) b. Sub Phase 2 – Alternative mode of procurement c. Sub Phase 3 – File Uploading 3. Submit documentary requirements to COA prior NTP. 4. Phase 2 – implement PKI and Bar coding 5. Phase 3 Cloud based, data analytics, and notification service 6. For modification: a. Delete option is deleted b. Monitoring number of dates, warning to user for the number of dates. c. Progress or milestone payment (this maybe irrelevant because of the \"remark\" option) d. Growth repair 7. Procurement service only encodes contract number and not controls number. 8. Project Control number will be the UPR number. End user will encode the UPS number. 9. Add contract number for PS. drop down \"mode of procurement – Competitive bidding and alternative mode\", Display \"NOA and supplier\" if alternative mode of procurement. 10. Separate interface for internal end users (FOIC monitoring) and public users (supplier). 11. Remove \"remarks\" in public viewing status only. 12. Develop Flowchart for the end users appreciation. Next week. 13. Workshop next week for PRISM. 14. Conference Meeting on 03 September 2019 at 1500H. Agenda: Updates on NRC MIS 1. Start encoding of data (build up database) while developing the other requirements of NRC. 2. Define project objectives and rationale. 3. Develop the entire NRCMIS project in phases. 4. Target date of completion - 10 September 2019. 5. Deployment- 11 September. 6. Users training 12 September. 1594126460911 28 Operational Concept and Dataflow Figure 2 from the previous page illustrates the fundamental structure of the system and flow of data from an end-user's perspective. Client X initiates a chat conversation with Client Y using the CIM client software. During the chat conversation, the system automatically encrypts the text message prior sending it to the IM Relay Server. The server now searches for the intended recipient from its list of client sockets. When the recipient's socket is available, the server transmits the encrypted text message to Client Y (recipient) through its socket. The server manages all clients' sockets. It handles authentication of all incoming clients prior acceptance of the socket. IM Relay Server maintains a minimal database using MS SQL Server, SQL Express, or MS Access for accounts and activity logs. As soon as the text message arrived at Client Y (recipient), the software then decrypts the text using the system-generated key as the default. Unreadable message or randomized characters indicates unmatched passkey. Both Client X (sender) and Client Y (recipient) must encode manually the correct or agreed passkey to decode their conversation. The manual encoding of a passkey is done to deny the system administrator or any authority from decoding the message during the conduct of any special investigation. System generated keys are stored in the server specifically for this purpose. It is strongly suggested that this manual key should be transmitted through another mode of transmission like SMS, Email, or voice call. A similar procedure can be done during sending and receiving files. Client X starts up the File Transfer window and browse for the file. By default, CIM uses Advanced Encryption Standard (AES) 256-bit to encrypt and decrypt text messages and files. The sender can choose to double encrypt the file by hiding it in an image file using 29 steganography or Hidden in Plain Sight (HIPS) algorithm. A checkbox or option button is provided for this feature. By checking both AES and HIPS, the system first encrypts the file using AES and hides the resulting file into an image. The CIM then transmits the image file to the IM relay server. The server searches for the intended recipient from its list of client sockets. When the recipient's socket is available, the server relays the file or message to Client Y (recipient). As soon as the encrypted file or image file arrived, the user can now browse for the file and choose to open it with the same application. The encrypted file is extracted from the image file using the HIPS function for file extraction. After the successful extraction, the CIM now tries to decrypt the extracted file using the system-generated key. If unsuccessful, it asks for the passkey which must be encoded by the receiving user to convert the encrypted file back to its original form. Manual encoding of passkey happens when the sender chooses to encode a different key other than the default system-generated key. Network Architecture To visualize its deployment from a technical perspective, the network diagram is drawn for this purpose. In figure 3 of the next page, the CIM primarily utilizes the Local Area Network (LAN) for inter-office instant messaging and collabor","routeslip":"","__v":0}
64+{"_id":{"$oid":"5f3e339166cc3f0590a28a5f"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979114555144","title":"Chapter 3 - 09Apr2020.docx.sam.pdf.sam.pdf.eric.pdf","filename":"/drive/Chapter 3 - 09Apr2020.docx.sam.pdf.sam.pdf.eric.pdf","category":"","author":"System","deyt":{"$date":"2020-07-07T12:56:26.852Z"},"size":10272392,"content":"Information Systems Updates Conference: 29 August 2019 Agenda: Updates on Procurement Monitoring System 1. Invite PS3 and PS6 of AFP PS to be involved in the Procurement System next week. 2. Sub-phases for the PHASE 1 (275 working days) are: a. Sub Phase 1 – Competitive Bidding (95 working days) b. Sub Phase 2 – Alternative mode of procurement c. Sub Phase 3 – File Uploading 3. Submit documentary requirements to COA prior NTP. 4. Phase 2 – implement PKI and Bar coding 5. Phase 3 Cloud based, data analytics, and notification service 6. For modification: a. Delete option is deleted b. Monitoring number of dates, warning to user for the number of dates. c. Progress or milestone payment (this maybe irrelevant because of the \"remark\" option) d. Growth repair 7. Procurement service only encodes contract number and not controls number. 8. Project Control number will be the UPR number. End user will encode the UPS number. 9. Add contract number for PS. drop down \"mode of procurement – Competitive bidding and alternative mode\", Display \"NOA and supplier\" if alternative mode of procurement. 10. Separate interface for internal end users (FOIC monitoring) and public users (supplier). 11. Remove \"remarks\" in public viewing status only. 12. Develop Flowchart for the end users appreciation. Next week. 13. Workshop next week for PRISM. 14. Conference Meeting on 03 September 2019 at 1500H. Agenda: Updates on NRC MIS 1. Start encoding of data (build up database) while developing the other requirements of NRC. 2. Define project objectives and rationale. 3. Develop the entire NRCMIS project in phases. 4. Target date of completion - 10 September 2019. 5. Deployment- 11 September. 6. Users training 12 September. 1594126460911 28 Operational Concept and Dataflow Figure 2 from the previous page illustrates the fundamental structure of the system and flow of data from an end-user's perspective. Client X initiates a chat conversation with Client Y using the CIM client software. During the chat conversation, the system automatically encrypts the text message prior sending it to the IM Relay Server. The server now searches for the intended recipient from its list of client sockets. When the recipient's socket is available, the server transmits the encrypted text message to Client Y (recipient) through its socket. The server manages all clients' sockets. It handles authentication of all incoming clients prior acceptance of the socket. IM Relay Server maintains a minimal database using MS SQL Server, SQL Express, or MS Access for accounts and activity logs. As soon as the text message arrived at Client Y (recipient), the software then decrypts the text using the system-generated key as the default. Unreadable message or randomized characters indicates unmatched passkey. Both Client X (sender) and Client Y (recipient) must encode manually the correct or agreed passkey to decode their conversation. The manual encoding of a passkey is done to deny the system administrator or any authority from decoding the message during the conduct of any special investigation. System generated keys are stored in the server specifically for this purpose. It is strongly suggested that this manual key should be transmitted through another mode of transmission like SMS, Email, or voice call. A similar procedure can be done during sending and receiving files. Client X starts up the File Transfer window and browse for the file. By default, CIM uses Advanced Encryption Standard (AES) 256-bit to encrypt and decrypt text messages and files. The sender can choose to double encrypt the file by hiding it in an image file using 29 steganography or Hidden in Plain Sight (HIPS) algorithm. A checkbox or option button is provided for this feature. By checking both AES and HIPS, the system first encrypts the file using AES and hides the resulting file into an image. The CIM then transmits the image file to the IM relay server. The server searches for the intended recipient from its list of client sockets. When the recipient's socket is available, the server relays the file or message to Client Y (recipient). As soon as the encrypted file or image file arrived, the user can now browse for the file and choose to open it with the same application. The encrypted file is extracted from the image file using the HIPS function for file extraction. After the successful extraction, the CIM now tries to decrypt the extracted file using the system-generated key. If unsuccessful, it asks for the passkey which must be encoded by the receiving user to convert the encrypted file back to its original form. Manual encoding of passkey happens when the sender chooses to encode a different key other than the default system-generated key. Network Architecture To visualize its deployment from a technical perspective, the network diagram is drawn for this purpose. In figure 3 of the next page, the CIM primarily utilizes the Local Area Network (LAN) for inter-office instant messaging and collabor","routeslip":"","__v":0}
65+{"_id":{"$oid":"5f3e339166cc3f0590a28a60"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979114555012","title":"Chapter 3 - 09Apr2020.docx.sam.pdf","filename":"/drive/Chapter 3 - 09Apr2020.docx.sam.pdf","category":"","author":"System","deyt":{"$date":"2020-07-07T12:53:14.204Z"},"size":10537637,"content":"Information Systems Updates Conference: 29 August 2019 Agenda: Updates on Procurement Monitoring System 1. Invite PS3 and PS6 of AFP PS to be involved in the Procurement System next week. 2. Sub-phases for the PHASE 1 (275 working days) are: a. Sub Phase 1 – Competitive Bidding (95 working days) b. Sub Phase 2 – Alternative mode of procurement c. Sub Phase 3 – File Uploading 3. Submit documentary requirements to COA prior NTP. 4. Phase 2 – implement PKI and Bar coding 5. Phase 3 Cloud based, data analytics, and notification service 6. For modification: a. Delete option is deleted b. Monitoring number of dates, warning to user for the number of dates. c. Progress or milestone payment (this maybe irrelevant because of the \"remark\" option) d. Growth repair 7. Procurement service only encodes contract number and not controls number. 8. Project Control number will be the UPR number. End user will encode the UPS number. 9. Add contract number for PS. drop down \"mode of procurement – Competitive bidding and alternative mode\", Display \"NOA and supplier\" if alternative mode of procurement. 10. Separate interface for internal end users (FOIC monitoring) and public users (supplier). 11. Remove \"remarks\" in public viewing status only. 12. Develop Flowchart for the end users appreciation. Next week. 13. Workshop next week for PRISM. 14. Conference Meeting on 03 September 2019 at 1500H. Agenda: Updates on NRC MIS 1. Start encoding of data (build up database) while developing the other requirements of NRC. 2. Define project objectives and rationale. 3. Develop the entire NRCMIS project in phases. 4. Target date of completion - 10 September 2019. 5. Deployment- 11 September. 6. Users training 12 September. 28 Operational Concept and Dataflow Figure 2 from the previous page illustrates the fundamental structure of the system and flow of data from an end-user's perspective. Client X initiates a chat conversation with Client Y using the CIM client software. During the chat conversation, the system automatically encrypts the text message prior sending it to the IM Relay Server. The server now searches for the intended recipient from its list of client sockets. When the recipient's socket is available, the server transmits the encrypted text message to Client Y (recipient) through its socket. The server manages all clients' sockets. It handles authentication of all incoming clients prior acceptance of the socket. IM Relay Server maintains a minimal database using MS SQL Server, SQL Express, or MS Access for accounts and activity logs. As soon as the text message arrived at Client Y (recipient), the software then decrypts the text using the system-generated key as the default. Unreadable message or randomized characters indicates unmatched passkey. Both Client X (sender) and Client Y (recipient) must encode manually the correct or agreed passkey to decode their conversation. The manual encoding of a passkey is done to deny the system administrator or any authority from decoding the message during the conduct of any special investigation. System generated keys are stored in the server specifically for this purpose. It is strongly suggested that this manual key should be transmitted through another mode of transmission like SMS, Email, or voice call. A similar procedure can be done during sending and receiving files. Client X starts up the File Transfer window and browse for the file. By default, CIM uses Advanced Encryption Standard (AES) 256-bit to encrypt and decrypt text messages and files. The sender can choose to double encrypt the file by hiding it in an image file using 29 steganography or Hidden in Plain Sight (HIPS) algorithm. A checkbox or option button is provided for this feature. By checking both AES and HIPS, the system first encrypts the file using AES and hides the resulting file into an image. The CIM then transmits the image file to the IM relay server. The server searches for the intended recipient from its list of client sockets. When the recipient's socket is available, the server relays the file or message to Client Y (recipient). As soon as the encrypted file or image file arrived, the user can now browse for the file and choose to open it with the same application. The encrypted file is extracted from the image file using the HIPS function for file extraction. After the successful extraction, the CIM now tries to decrypt the extracted file using the system-generated key. If unsuccessful, it asks for the passkey which must be encoded by the receiving user to convert the encrypted file back to its original form. Manual encoding of passkey happens when the sender chooses to encode a different key other than the default system-generated key. Network Architecture To visualize its deployment from a technical perspective, the network diagram is drawn for this purpose. In figure 3 of the next page, the CIM primarily utilizes the Local Area Network (LAN) for inter-office instant messaging and collaboration. Client ","routeslip":"","__v":0}
66+{"_id":{"$oid":"5f3e339166cc3f0590a28a61"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979114555000","title":"Chapter 2 - 09Apr2020.docx.rodel.pdf","filename":"/drive/Chapter 2 - 09Apr2020.docx.rodel.pdf","category":"","author":"System","deyt":{"$date":"2020-07-19T08:45:52.913Z"},"size":3473216,"content":"Chapter 2 CONCEPTUAL FRAMEWORK This chapter presents the review of previous literatures and studies related to Instant Messaging applications. It explores the earlier developments, previous research, and existing technologies leading to the development of a prototype cryptographic IM (CIM). It includes the operational definition of terms used, and the conceptual framework to visually synthesize all materials and techniques in achieving the desired objective. Review of Related Literature and Studies Historical Development of Instant Messaging (IM) The advent of Instant Messenger like Facebook Messenger, Skype, WhatsApp, Telegram, and other popular IM revolutionizes the way people communicate with each other. But its impressive features would not be possible without the earlier breakthrough of their predecessors. Desjardin (2016), in his article \"The Evolution of Instant Messaging\", narrates the written accounts that brought the IM and how it grows prominence in the new era. Instant Messaging became known in the 1990's but decades ago Massachusetts Institute of Technology (MIT) already demonstrated an information sharing program called Compatible Time-Sharing System (CTSS). In 1988, Jarkko Oikarinen developed the first chat system that allows sending messages to users through their computers (Oikarinen, 1988). His Internet Relay Chat (IRC) paved the way for other IM players like AOL IM, ICQ, and Microsoft IRC to battle for share in the IM market. Yahoo messenger 1595148339648 7 dominates in 1998 with its intuitive designs and feature-rich IM environment. Engel (2014) recounts how IM grow prominence in the 2000s. This was the golden age of instant messenger. MSN Messenger introduced the concept of sharing photos and included the PC-to-PC and PC-to-phone audio capabilities. Skype Messenger peaked in popularity in 2003 as it showcased Audio and Video chat capabilities. Facebook chat was first introduced in 2008 and accelerated its popularity in 2014 when it decouples from the Facebook App. Application of IM Military Institution The US military has long been using IM for its military operations. In fact, Cummings (2005, p. 654) stated: \"It was the primary means of communication between navy ships during Operation Iraqi Freedom in 2003\". In his journal \"The Need for Command and Control Instant Message Adaptive Interfaces: Lessons Learned from Tactical Tomahawk Human-in-the-Loop Simulations\" Cummings affirms the obvious advantage in real-time communication embodied in IM. It allows rapid response to inquiries, multiple conversations with various units, and access to previous conversations and orders. In a thesis presentation entitled \"Applicability of Instant Messaging in the Military Command and Control Systems\"; Vermaja (n.d.) explains that IM can offer many advantages but security issues in implementing it is a problem. Furthermore, commercial off-the-shelf (COTS) IM does not satisfy wholly the needs of a Command and Control (C2) communication. Customized applications are needed to make the 8 communication easy and practical. Tailor-fit applications with specific platforms are needed in order to build automated systems. Businesses Various studies were already conducted on the maturity of IM to be used for business communication. Results clarify how businessmen and their clients choose this technology for daily transactions and communication. It was learned that people, generally, uses IM for a variety of substantive business purposes, and their peers include a diversity of co-workers, clients, managers, and other business personalities (Muller, Raven, Kogan, Millen, & Carey, 2003). Gotrunk (2017), a US company that offers secure and reliable VOIP services, shares their experience in IM. According to them, businesses are now beginning to embrace IM for their office communication. IM is virtually real-time communication like a telephone call. It is a text-based conversation like email but in an instant. It proves advantageous for collaboration among employees from different locations. In fact, some employees even use it for private communication within and outside the office. Schools People of college age constitute a significant and considerable number or population among IM users. Flanagin (2005), in his study, found out that IM has become a central communication tool within the college population. IM is being used for a variety of personal needs and school requirements and utilized it heavily relative to other forms of communication like email and telephone. Moreover, evidence suggests that college students are satisfied with simultaneously processing multiple conversations and that IM might displace email in many consequential ways. 9 Security Issues of IM The efficiency and usability of this application come with a major drawback on security. Hackers and cybersecurity professionals found several vulnerabilities with this system. These problems make most organizations to re-think implementing and adapting IM. ","routeslip":"","__v":0}
67+{"_id":{"$oid":"5f3e339166cc3f0590a28a62"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15921215442712","title":"Chapter 1 - 09Apr2020.docx.rodel.pdf","filename":"/drive/Chapter 1 - 09Apr2020.docx.rodel.pdf","category":"","author":"System","deyt":{"$date":"2020-06-12T08:40:28.923Z"},"size":474746,"content":"Chapter 1 `INTRODUCTION Background of the Study Data exchange or data communication is a key process of providing accurate and timely information to senior leaders, top management, and decision makers. It involves the use of email, instant messaging, video conference, chat, online forums, and other applications that transmit data from sender to receiver. Many organizations and modern companies prefer to use instant messaging rather than email for simpler and more user- friendly collaboration among staff and management. It also exchanges data almost at an instant, allowing two-way communication in near real-time. Instant messaging applications like Facebook messenger, SKYPE, and Yahoo Messenger provide easy, fast, and cost-effective means of text, voice, and video communication. It has become the most preferred application to communicate with peers, families, and among professionals from various industries and sectors. Businesses are now beginning to embrace IM for their office communication. Although it is less formal than a face to face meeting, it can bridge the gap of needing to collaborate and communicate with each other. Private companies, schools, organizations, and government agencies use IM to support or provide redundancy with their other existing mode of communication. The military recognizes the necessity to develop or acquire a secure, reliable, and near real-time data communication tool for effective exchange of information and to provide the high-command a means to collate information needed for decision-making. In 1591951189703 2 today's network-centric operation, Instant Messaging (IM) is an essential information communication tool for rapid delivery of messages and reports, and for situational awareness. The US military has long been using IM for its military operations. In fact, Cummings (2004, p. 654) stated that \"it was the primary means of communication between navy ships during Operation Iraqi Freedom in 2003\". The Philippine Navy (PN), a branch of service in the Armed Forces of the Philippines (AFP), sought to acquire similar tool but is constrained with limited resources and lack of communication infrastructure to securely extend its network to mobile units thereby utilizing the un- secure Internet for its data communication. The PN, with its prevailing need for a secure data communication like an instant messaging, started to adopt several free and open-source IM but unsatisfied with the minimal encryption it provides. Text messages can be intercepted, decoded, and read in clear text as it travels across the network from sender to receiver. The pervasiveness of these applications makes it vulnerable from various attacks especially sniffing and hijacking. Some vendors, however, promise end-to-end or asynchronous encryption with their expensive commercial IM. They may either use open-standard advanced encryption protocols or they are using closed and proprietary protocols. The benefit it provides may surpass that of the free versions, however, the vendor obscures any vulnerabilities of this application from the end-users and it will not be long until a sophisticated hacker can crack its encryption protocol through a purchase of similar application. Among the popular IMs available online are unencrypted by default such as Facebook Messenger, Pidgin, Google Allo, and Viber. IMs are designed with usability 3 rather than security in mind. Almost all freeware IM software does not have encryption capabilities. Few news articles can be found as an evidence of this vulnerability, many IM vendors bargain this flaw as leverage for the users to purchase the licensed version. Eavesdropping and sniffing IM conversation is common to most hackers and cybersecurity professionals especially if they are within the Local Area Network (LAN). Data security is of utmost importance in any organization whether private or government sector. The effect of confidential messages being sniffed, leaked, or compromised can be devastating to any individuals, businesses or institutions such as the Armed Forces. Quality of software should be measured not just by the functionality and performance but also the security it guarantees. It has to assure the confidentiality, integrity, authenticity, and availability of the data it processes. Thus, adoption of an encryption mechanism is imperative to secure the data at-rest or in-transit. The growing importance of security for an IM or for any type of application cannot be overemphasized. All communication application (i.e Instant Messenger) must be integrated with an encryption algorithm that is proven unbreakable and resistant to any mathematical cracking techniques. With an encryption component present in an IM, users are assured of an optimum level of security the software provides. Data hiding or Steganography has been used to hide secret messages into an image. While it is commonly used as a standalone application, it has never been implemented into an IM. Integrating ","routeslip":"","__v":0}
68+{"_id":{"$oid":"5f3e339c66cc3f0590a28a63"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119534208","title":"AuditScripts-Critical-Security-Control-Manual-Assessment-Tool-v7.0_JOEY_v2.xls","filename":"/drive/CRA/AFP CRA/AuditScripts-Critical-Security-Control-Manual-Assessment-Tool-v7.0_JOEY_v2.xls","category":"","author":"System","deyt":{"$date":"2019-03-18T04:11:36Z"},"size":745984,"content":"Critical Security Controls Initial Assessment Tool (v7.0b),,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, Instructions - Read me first.,,,,,,,,,,,,,,, \"The purpose for this tool is to provide organizations with a simple tool for performing an initial assessment of their information assurance maturity level based on the controls defined by the Critical Security Controls and the Council on Cybersecurity. Any questions about how this tool works or suggestions can be directed to info@auditscripts.com. In order to use this tool, the assessor must only complete the answers to the drop down menu questions lists on the pages labeled CSC #1 - CSC #20. By choosing a drop down choice for each critical control, the assessment tool will automatically generate scores and maturity level based on the answers to each question. Based on the answers to each question, the dashboard worksheet will automatically populate with the overall maturity level scores for the organization as a whole. These scores can therefore be used to measure the organization's progress and what percentage of the Critical Security Controls they are currently following. Ideally in the long term organizations would deploy tools that would automate the collection of this information, but in the meanwhile, this tool can be used to help start the process of manually assessing the organization's maturity level.\",,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, Field Definitions,,,,,,,,,,,,,,, ID,,,This is the ID number of the specific critical security control sub-control reference as included in the Critical Security Controls documentation.,,,,,,,,,,,, Critical Security Control Detail,,,This is the detail behind each specific sub-control as defined by the Critical Security Controls documentation.,,,,,,,,,,,, EOF Function,,,\"This standards for \"\"Executive Order Framework (EOF)\"\" function. These functions were defined by NIST in the EOF and act as control characteristics.\",,,,,,,,,,,, Sensor or Baseline,,,This is the type of technical system or baseline that we believe is necessary in order to implement the specific sub control.,,,,,,,,,,,, Policy Approved,,,This question determines whether the organization currently has a policy defined that indicates that they should be implementing the defined sub control.,,,,,,,,,,,, Control Implemented,,,This question determines whether or not the organization currently has implemented this sub control and to what degree the control has been implemented.,,,,,,,,,,,, Control Automated,,,This question determines whether or not the organization currently has automated the implementation of this sub control and to what degree the control has been automated.,,,,,,,,,,,, Control Reported to Business,,,This question determines whether or not the organization is reporting this sub control to business representatives and to what degree the control has been reported.,,,,,,,,,,,, ,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.,,,,,,,,,,,,,,, Critical Security Controls Initial Assessment Tool (v7.0b),,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,CSC #1,56% Maturity level:,Description:,Score:,,,,,,,,,,,,,,,CSC #2,58% Level One,Policies Complete,1.89,,,,,,,,,,,,,,,CSC #3,83% Level Two,Controls 1-5 Implemented,1.18,,,,,,,,,,,,,,,CSC #4,67% Level Three,All Controls Implemented,1.54,,,,,,,,,,,,,,,CSC #5,75% Level Four,All Controls Automated,1.31,,,,,,,,,,,,,,,CSC #6,75% Level Five,All Controls Reported,1.44,,,,,,,,,,,,,,,CSC #7,67% ,,,,,,,,,,,,,,,,,CSC #8,67% ,Maturity Rating*:,7.35,,,,,,,,,,,,,,,CSC #9,83% ,*Rating is on a 0-5 scale.,,,,,,,,,,,,,,,,CSC #10,83% ,,,,,,,,,,,,,,,,,CSC #11,75% ,,,,,,,,,,,,,,,,,CSC #12,75% ,,,,,,,,,,,,,,,,,CSC #13,75% ,,,,,,,,,,,,,,,,,CSC #14,75% ,,,,,,,,,,,,,,,,,CSC #15,75% ,,,,,,,,,,,,,,,,,CSC #16,75% ,,,,,,,,,,,,,,,,,CSC #17,75% ,,,,,,,,,,,,,,,,,CSC #18,75% ,,,,,,,,,,,,,,,,,CSC #19,75% ,,,,,,,,,,,,,,,,,CSC #20,50% ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, Critical Security Control #1: Inventory and Control of Hardware Assets,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,Risk Addressed:,56%,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,Risk Accepted:,44%,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ID,Critical Security Control Detail,NIST CSF,Sensor or Baseline,Policy Defined,Control Implemented,Control Automated or Technically Enforced,Control Reported to Business,,,,,,,,NIST CF,DO NOT CHANGE THESE VALUES 1.1,Utilize an active discovery tool to identify devices connected to the organization's network and update the hardware asset inve","routeslip":"","__v":0}
69+{"_id":{"$oid":"5f3e339c66cc3f0590a28a64"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119534205","title":"AuditScripts-Critical-Security-Control-Manual-Assessment-Tool-v7.0_DALIOAN.xlsx","filename":"/drive/CRA/AFP CRA/AuditScripts-Critical-Security-Control-Manual-Assessment-Tool-v7.0_DALIOAN.xlsx","category":"","author":"System","deyt":{"$date":"2019-03-15T04:36:20Z"},"size":286613,"content":"Critical Security Controls Initial Assessment Tool (v7.0b),,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, Instructions - Read me first.,,,,,,,,,,,,,,, \"The purpose for this tool is to provide organizations with a simple tool for performing an initial assessment of their information assurance maturity level based on the controls defined by the Critical Security Controls and the Council on Cybersecurity. Any questions about how this tool works or suggestions can be directed to info@auditscripts.com. In order to use this tool, the assessor must only complete the answers to the drop down menu questions lists on the pages labeled CSC #1 - CSC #20. By choosing a drop down choice for each critical control, the assessment tool will automatically generate scores and maturity level based on the answers to each question. Based on the answers to each question, the dashboard worksheet will automatically populate with the overall maturity level scores for the organization as a whole. These scores can therefore be used to measure the organization's progress and what percentage of the Critical Security Controls they are currently following. Ideally in the long term organizations would deploy tools that would automate the collection of this information, but in the meanwhile, this tool can be used to help start the process of manually assessing the organization's maturity level.\",,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, Field Definitions,,,,,,,,,,,,,,, ID,,,This is the ID number of the specific critical security control sub-control reference as included in the Critical Security Controls documentation.,,,,,,,,,,,, Critical Security Control Detail,,,This is the detail behind each specific sub-control as defined by the Critical Security Controls documentation.,,,,,,,,,,,, EOF Function,,,\"This standards for \"\"Executive Order Framework (EOF)\"\" function. These functions were defined by NIST in the EOF and act as control characteristics.\",,,,,,,,,,,, Sensor or Baseline,,,This is the type of technical system or baseline that we believe is necessary in order to implement the specific sub control.,,,,,,,,,,,, Policy Approved,,,This question determines whether the organization currently has a policy defined that indicates that they should be implementing the defined sub control.,,,,,,,,,,,, Control Implemented,,,This question determines whether or not the organization currently has implemented this sub control and to what degree the control has been implemented.,,,,,,,,,,,, Control Automated,,,This question determines whether or not the organization currently has automated the implementation of this sub control and to what degree the control has been automated.,,,,,,,,,,,, Control Reported to Business,,,This question determines whether or not the organization is reporting this sub control to business representatives and to what degree the control has been reported.,,,,,,,,,,,, ,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.,,,,,,,,,,,,,,, Critical Security Controls Initial Assessment Tool (v7.0b),,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,CSC #1,25% Maturity level:,Description:,Score:,,,,,,,,,,,,,,,CSC #2,25% Level One,Policies Complete,0.95,,,,,,,,,,,,,,,CSC #3,50% Level Two,Controls 1-5 Implemented,0.48,,,,,,,,,,,,,,,CSC #4,75% Level Three,All Controls Implemented,0.77,,,,,,,,,,,,,,,CSC #5,75% Level Four,All Controls Automated,0.50,,,,,,,,,,,,,,,CSC #6,75% Level Five,All Controls Reported,0.72,,,,,,,,,,,,,,,CSC #7,75% ,,,,,,,,,,,,,,,,,CSC #8,75% ,Maturity Rating*:,3.41,,,,,,,,,,,,,,,CSC #9,75% ,*Rating is on a 0-5 scale.,,,,,,,,,,,,,,,,CSC #10,75% ,,,,,,,,,,,,,,,,,CSC #11,75% ,,,,,,,,,,,,,,,,,CSC #12,75% ,,,,,,,,,,,,,,,,,CSC #13,75% ,,,,,,,,,,,,,,,,,CSC #14,75% ,,,,,,,,,,,,,,,,,CSC #15,75% ,,,,,,,,,,,,,,,,,CSC #16,75% ,,,,,,,,,,,,,,,,,CSC #17,75% ,,,,,,,,,,,,,,,,,CSC #18,75% ,,,,,,,,,,,,,,,,,CSC #19,75% ,,,,,,,,,,,,,,,,,CSC #20,100% ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, Critical Security Control #1: Inventory and Control of Hardware Assets,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,Risk Addressed:,44%,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,Risk Accepted:,56%,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ID,Critical Security Control Detail,NIST CSF,Sensor or Baseline,Policy Defined,Control Implemented,Control Automated or Technically Enforced,Control Reported to Business,,,,,,,,NIST CF,DO NOT CHANGE THESE VALUES 1.1,Utilize an active discovery tool to identify devices connected to the organization's network and update the hardware asset inv","routeslip":"","__v":0}
70+{"_id":{"$oid":"5f3e339d66cc3f0590a28a65"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119534208","title":"AuditScripts-Critical-Security-Control-Manual-Assessment-Tool-v7.0_JOEY_v2.xls","filename":"/drive/CRA/AFP CRA/AuditScripts-Critical-Security-Control-Manual-Assessment-Tool-v7.0_JOEY_v2.xls","category":"","author":"System","deyt":{"$date":"2019-03-18T04:11:36Z"},"size":745984,"content":"Critical Security Controls Initial Assessment Tool (v7.0b),,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, Instructions - Read me first.,,,,,,,,,,,,,,, \"The purpose for this tool is to provide organizations with a simple tool for performing an initial assessment of their information assurance maturity level based on the controls defined by the Critical Security Controls and the Council on Cybersecurity. Any questions about how this tool works or suggestions can be directed to info@auditscripts.com. In order to use this tool, the assessor must only complete the answers to the drop down menu questions lists on the pages labeled CSC #1 - CSC #20. By choosing a drop down choice for each critical control, the assessment tool will automatically generate scores and maturity level based on the answers to each question. Based on the answers to each question, the dashboard worksheet will automatically populate with the overall maturity level scores for the organization as a whole. These scores can therefore be used to measure the organization's progress and what percentage of the Critical Security Controls they are currently following. Ideally in the long term organizations would deploy tools that would automate the collection of this information, but in the meanwhile, this tool can be used to help start the process of manually assessing the organization's maturity level.\",,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, Field Definitions,,,,,,,,,,,,,,, ID,,,This is the ID number of the specific critical security control sub-control reference as included in the Critical Security Controls documentation.,,,,,,,,,,,, Critical Security Control Detail,,,This is the detail behind each specific sub-control as defined by the Critical Security Controls documentation.,,,,,,,,,,,, EOF Function,,,\"This standards for \"\"Executive Order Framework (EOF)\"\" function. These functions were defined by NIST in the EOF and act as control characteristics.\",,,,,,,,,,,, Sensor or Baseline,,,This is the type of technical system or baseline that we believe is necessary in order to implement the specific sub control.,,,,,,,,,,,, Policy Approved,,,This question determines whether the organization currently has a policy defined that indicates that they should be implementing the defined sub control.,,,,,,,,,,,, Control Implemented,,,This question determines whether or not the organization currently has implemented this sub control and to what degree the control has been implemented.,,,,,,,,,,,, Control Automated,,,This question determines whether or not the organization currently has automated the implementation of this sub control and to what degree the control has been automated.,,,,,,,,,,,, Control Reported to Business,,,This question determines whether or not the organization is reporting this sub control to business representatives and to what degree the control has been reported.,,,,,,,,,,,, ,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.,,,,,,,,,,,,,,, Critical Security Controls Initial Assessment Tool (v7.0b),,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,CSC #1,56% Maturity level:,Description:,Score:,,,,,,,,,,,,,,,CSC #2,58% Level One,Policies Complete,1.89,,,,,,,,,,,,,,,CSC #3,83% Level Two,Controls 1-5 Implemented,1.18,,,,,,,,,,,,,,,CSC #4,67% Level Three,All Controls Implemented,1.54,,,,,,,,,,,,,,,CSC #5,75% Level Four,All Controls Automated,1.31,,,,,,,,,,,,,,,CSC #6,75% Level Five,All Controls Reported,1.44,,,,,,,,,,,,,,,CSC #7,67% ,,,,,,,,,,,,,,,,,CSC #8,67% ,Maturity Rating*:,7.35,,,,,,,,,,,,,,,CSC #9,83% ,*Rating is on a 0-5 scale.,,,,,,,,,,,,,,,,CSC #10,83% ,,,,,,,,,,,,,,,,,CSC #11,75% ,,,,,,,,,,,,,,,,,CSC #12,75% ,,,,,,,,,,,,,,,,,CSC #13,75% ,,,,,,,,,,,,,,,,,CSC #14,75% ,,,,,,,,,,,,,,,,,CSC #15,75% ,,,,,,,,,,,,,,,,,CSC #16,75% ,,,,,,,,,,,,,,,,,CSC #17,75% ,,,,,,,,,,,,,,,,,CSC #18,75% ,,,,,,,,,,,,,,,,,CSC #19,75% ,,,,,,,,,,,,,,,,,CSC #20,50% ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, Critical Security Control #1: Inventory and Control of Hardware Assets,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,Risk Addressed:,56%,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,Risk Accepted:,44%,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ID,Critical Security Control Detail,NIST CSF,Sensor or Baseline,Policy Defined,Control Implemented,Control Automated or Technically Enforced,Control Reported to Business,,,,,,,,NIST CF,DO NOT CHANGE THESE VALUES 1.1,Utilize an active discovery tool to identify devices connected to the organization's network and update the hardware asset inve","routeslip":"","__v":0}
71+{"_id":{"$oid":"5f3e339d66cc3f0590a28a66"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119534201","title":"AuditScripts-Critical-Security-Control-Manual-Assessment-Tool-v7.0_JOEY_v2.xls","filename":"/drive/CRA/PAF/AuditScripts-Critical-Security-Control-Manual-Assessment-Tool-v7.0_JOEY_v2.xls","category":"","author":"System","deyt":{"$date":"2019-03-18T04:11:36Z"},"size":745984,"content":"Critical Security Controls Initial Assessment Tool (v7.0b),,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, Instructions - Read me first.,,,,,,,,,,,,,,, \"The purpose for this tool is to provide organizations with a simple tool for performing an initial assessment of their information assurance maturity level based on the controls defined by the Critical Security Controls and the Council on Cybersecurity. Any questions about how this tool works or suggestions can be directed to info@auditscripts.com. In order to use this tool, the assessor must only complete the answers to the drop down menu questions lists on the pages labeled CSC #1 - CSC #20. By choosing a drop down choice for each critical control, the assessment tool will automatically generate scores and maturity level based on the answers to each question. Based on the answers to each question, the dashboard worksheet will automatically populate with the overall maturity level scores for the organization as a whole. These scores can therefore be used to measure the organization's progress and what percentage of the Critical Security Controls they are currently following. Ideally in the long term organizations would deploy tools that would automate the collection of this information, but in the meanwhile, this tool can be used to help start the process of manually assessing the organization's maturity level.\",,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, Field Definitions,,,,,,,,,,,,,,, ID,,,This is the ID number of the specific critical security control sub-control reference as included in the Critical Security Controls documentation.,,,,,,,,,,,, Critical Security Control Detail,,,This is the detail behind each specific sub-control as defined by the Critical Security Controls documentation.,,,,,,,,,,,, EOF Function,,,\"This standards for \"\"Executive Order Framework (EOF)\"\" function. These functions were defined by NIST in the EOF and act as control characteristics.\",,,,,,,,,,,, Sensor or Baseline,,,This is the type of technical system or baseline that we believe is necessary in order to implement the specific sub control.,,,,,,,,,,,, Policy Approved,,,This question determines whether the organization currently has a policy defined that indicates that they should be implementing the defined sub control.,,,,,,,,,,,, Control Implemented,,,This question determines whether or not the organization currently has implemented this sub control and to what degree the control has been implemented.,,,,,,,,,,,, Control Automated,,,This question determines whether or not the organization currently has automated the implementation of this sub control and to what degree the control has been automated.,,,,,,,,,,,, Control Reported to Business,,,This question determines whether or not the organization is reporting this sub control to business representatives and to what degree the control has been reported.,,,,,,,,,,,, ,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.,,,,,,,,,,,,,,, Critical Security Controls Initial Assessment Tool (v7.0b),,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,CSC #1,56% Maturity level:,Description:,Score:,,,,,,,,,,,,,,,CSC #2,58% Level One,Policies Complete,1.89,,,,,,,,,,,,,,,CSC #3,83% Level Two,Controls 1-5 Implemented,1.18,,,,,,,,,,,,,,,CSC #4,67% Level Three,All Controls Implemented,1.54,,,,,,,,,,,,,,,CSC #5,75% Level Four,All Controls Automated,1.31,,,,,,,,,,,,,,,CSC #6,75% Level Five,All Controls Reported,1.44,,,,,,,,,,,,,,,CSC #7,67% ,,,,,,,,,,,,,,,,,CSC #8,67% ,Maturity Rating*:,7.35,,,,,,,,,,,,,,,CSC #9,83% ,*Rating is on a 0-5 scale.,,,,,,,,,,,,,,,,CSC #10,83% ,,,,,,,,,,,,,,,,,CSC #11,75% ,,,,,,,,,,,,,,,,,CSC #12,75% ,,,,,,,,,,,,,,,,,CSC #13,75% ,,,,,,,,,,,,,,,,,CSC #14,75% ,,,,,,,,,,,,,,,,,CSC #15,75% ,,,,,,,,,,,,,,,,,CSC #16,75% ,,,,,,,,,,,,,,,,,CSC #17,75% ,,,,,,,,,,,,,,,,,CSC #18,75% ,,,,,,,,,,,,,,,,,CSC #19,75% ,,,,,,,,,,,,,,,,,CSC #20,50% ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, Critical Security Control #1: Inventory and Control of Hardware Assets,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,Risk Addressed:,56%,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,Risk Accepted:,44%,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ID,Critical Security Control Detail,NIST CSF,Sensor or Baseline,Policy Defined,Control Implemented,Control Automated or Technically Enforced,Control Reported to Business,,,,,,,,NIST CF,DO NOT CHANGE THESE VALUES 1.1,Utilize an active discovery tool to identify devices connected to the organization's network and update the hardware asset inve","routeslip":"","__v":0}
72+{"_id":{"$oid":"5f3e339d66cc3f0590a28a67"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119534211","title":"AuditScripts-Critical-Security-Control-Manual-Assessment-Tool-v7.0_Joey.xls","filename":"/drive/CRA/CRA_OJ6/AuditScripts-Critical-Security-Control-Manual-Assessment-Tool-v7.0_Joey.xls","category":"","author":"System","deyt":{"$date":"2019-03-07T03:30:44Z"},"size":708096,"content":"Critical Security Controls Initial Assessment Tool (v7.0b),,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, Instructions - Read me first.,,,,,,,,,,,,,,, \"The purpose for this tool is to provide organizations with a simple tool for performing an initial assessment of their information assurance maturity level based on the controls defined by the Critical Security Controls and the Council on Cybersecurity. Any questions about how this tool works or suggestions can be directed to info@auditscripts.com. In order to use this tool, the assessor must only complete the answers to the drop down menu questions lists on the pages labeled CSC #1 - CSC #20. By choosing a drop down choice for each critical control, the assessment tool will automatically generate scores and maturity level based on the answers to each question. Based on the answers to each question, the dashboard worksheet will automatically populate with the overall maturity level scores for the organization as a whole. These scores can therefore be used to measure the organization's progress and what percentage of the Critical Security Controls they are currently following. Ideally in the long term organizations would deploy tools that would automate the collection of this information, but in the meanwhile, this tool can be used to help start the process of manually assessing the organization's maturity level.\",,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, Field Definitions,,,,,,,,,,,,,,, ID,,,This is the ID number of the specific critical security control sub-control reference as included in the Critical Security Controls documentation.,,,,,,,,,,,, Critical Security Control Detail,,,This is the detail behind each specific sub-control as defined by the Critical Security Controls documentation.,,,,,,,,,,,, EOF Function,,,\"This standards for \"\"Executive Order Framework (EOF)\"\" function. These functions were defined by NIST in the EOF and act as control characteristics.\",,,,,,,,,,,, Sensor or Baseline,,,This is the type of technical system or baseline that we believe is necessary in order to implement the specific sub control.,,,,,,,,,,,, Policy Approved,,,This question determines whether the organization currently has a policy defined that indicates that they should be implementing the defined sub control.,,,,,,,,,,,, Control Implemented,,,This question determines whether or not the organization currently has implemented this sub control and to what degree the control has been implemented.,,,,,,,,,,,, Control Automated,,,This question determines whether or not the organization currently has automated the implementation of this sub control and to what degree the control has been automated.,,,,,,,,,,,, Control Reported to Business,,,This question determines whether or not the organization is reporting this sub control to business representatives and to what degree the control has been reported.,,,,,,,,,,,, ,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.,,,,,,,,,,,,,,, Critical Security Controls Initial Assessment Tool (v7.0b),,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,CSC #1,25% Maturity level:,Description:,Score:,,,,,,,,,,,,,,,CSC #2,38% Level One,Policies Complete,0.89,,,,,,,,,,,,,,,CSC #3,71% Level Two,Controls 1-5 Implemented,0.50,,,,,,,,,,,,,,,CSC #4,44% Level Three,All Controls Implemented,0.71,,,,,,,,,,,,,,,CSC #5,75% Level Four,All Controls Automated,0.45,,,,,,,,,,,,,,,CSC #6,75% Level Five,All Controls Reported,0.66,,,,,,,,,,,,,,,CSC #7,75% ,,,,,,,,,,,,,,,,,CSC #8,75% ,Maturity Rating*:,3.21,,,,,,,,,,,,,,,CSC #9,75% ,*Rating is on a 0-5 scale.,,,,,,,,,,,,,,,,CSC #10,75% ,,,,,,,,,,,,,,,,,CSC #11,75% ,,,,,,,,,,,,,,,,,CSC #12,75% ,,,,,,,,,,,,,,,,,CSC #13,75% ,,,,,,,,,,,,,,,,,CSC #14,28% ,,,,,,,,,,,,,,,,,CSC #15,70% ,,,,,,,,,,,,,,,,,CSC #16,75% ,,,,,,,,,,,,,,,,,CSC #17,72% ,,,,,,,,,,,,,,,,,CSC #18,75% ,,,,,,,,,,,,,,,,,CSC #19,75% ,,,,,,,,,,,,,,,,,CSC #20,100% ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, Critical Security Control #1: Inventory and Control of Hardware Assets,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,Risk Addressed:,57%,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,Risk Accepted:,43%,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ID,Critical Security Control Detail,NIST CSF,Sensor or Baseline,Policy Defined,Control Implemented,Control Automated or Technically Enforced,Control Reported to Business,,,,,,,,NIST CF,DO NOT CHANGE THESE VALUES 1.1,Utilize an active discovery tool to identify devices connected to the organization's network and update the hardware asset inv","routeslip":"","__v":0}
73+{"_id":{"$oid":"5f3e339d66cc3f0590a28a68"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119534213","title":"Summary.xlsx","filename":"/drive/CRA/CRA_OJ6/Summary.xlsx","category":"","author":"System","deyt":{"$date":"2019-03-07T07:18:38Z"},"size":18252,"content":"Nr,Hazard (Lack of Critical Security Controls),Risk Level,Value, Probability (%),Probability (Description),Severity 1, Incomplete inventory of Authorized and Unauthorized Devices,High,3,66,Occasional,Critical 2,Incomplete inventory of Authorized and Unauthorized Software,High,3,61,Likely,Critical 3, No continuous Vulnerability Assessment & Remediation,Extremely High,4,82,Frequent,Critical 4, Uncontrolled Use of Administrative Privileges,Extremely High,4,78,Likely,Catastrophic 5,Unsecured Configuration of End-User Devices,Extremely High,4,90,Frequent,Catastrophic 6,\" Lack of Maintenance, Monitoring, and Analysis of Audit Logs\",Moderate,2,60,Occasional,Marginal 7, Lack of Email and Web Browser Protections,High,3,78,Likely,Critical 8, Lack of Malware Defense,High,3,48,Occasional,Critical 9,\" Lack of Limitation & Control of Network Ports, Protocols, and Service\",High,3,48,Likely,Critical 10,Limited Data Recovery Capability,Extremely High,4,81,Frequent,Critical 11, Lack of Secure Configuration of Network Devices,High,3,48,Occasional,Critical 12, Lack of Boundary Defense,High,3,41,Likely,Critical 13, Lack of Data Protection,Extremely High,4,72,Likely,Catastrophic 14, Lack of Controlled Access Based on Need to Know,High,3,65,Likely,Critical 15,Lack of Wireless Access Control,High,3,54,Occasional,Critical 16,Lack of Account Monitoring and Control,Medium,2,57,Seldom,Critical 17,Limited Security Skills Assessment and Appropriate Training,Low,1,28,Seldom,Marginal 18,No Application Software Security,Medium,2,27,Seldom,Critical 19,Limited Incident Response and Management,High,3,47,Occasional,Critical 20,Limited Penetration Tests and Red Team Exercises,High,3,95,Frequent,Marginal ,Total,High,3,61.3,Likely, ","routeslip":"","__v":0}
74+{"_id":{"$oid":"5f3e339d66cc3f0590a28a69"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119534221","title":"j6 network inventory as of 04 Mar 2019.xlsx","filename":"/drive/CRA/CRA_OJ6/j6 network inventory as of 04 Mar 2019.xlsx","category":"","author":"System","deyt":{"$date":"2019-03-05T08:05:48Z"},"size":21294,"content":"OJ6 Network Inventory,,,,,,,,,,,,, As of 01 March 2019,,,,,,,,,,,,, NAME,TYPE,DESCRIPTION,LOCATION,USER,USERNAME,MAC ADDRESS,OPERATING SYSTEM,PROCESSOR,MEMORY,USED HD SPACE (GB),TOTAL HD SPACE (GB),IP_ADDRESS,Remarks OJ6D6629W7,DESKTOP,OFFICE,SJ6,Tsg Rogelyn E Mojado,MOJADORE,,,,,,,10.1.6.161, OJ6-DC,DESKTOP,OFFICE,SERVER RM,Administrator,Administrator,,,,,,,10.1.6.247,File Server OJ6WIFIMG,DESKTOP,OFFICE,SERVER RM,Wi-Fi Manager,Administrator,,,,,,,192.168.6.102,Internet Only OJ6D6828WXE,DESKTOP,OFFICE,P3BD,Ms Elizabeth R Zamora,ZAMORAER,,,,,,,10.1.6.157, OJ6L6829W8N,LAPTOP,BYOD,P3BD,Tsg Francisco M Pasia,PASIAFM,,,,,,,10.1.6.152, OJ6D6829WX2,DESKTOP,OFFICE,P3BD,Ssg Gilbert S Padua,PADUAGS,,,,,,,10.1.6.153, OJ6D3101WX,DESKTOP,OFFICE,MSGCTR,LOCAL ADMIN,VISAYASMM,,,,,,,10.1.6.120, OJ6D3328W7,DESKTOP,OFFICE,MSGCTR,DUTY EP,DUTYEP,,,,,,,10.1.6.151, OJ6ISMD4038-1,DESKTOP,OFFICE,ISMD,YN2 Rodolfo M Lustina Jr,ISMD_Internet,5C-F3-70-03-8F-95,Windows 10 Pro,,8 GB,51.06,930,10.1.6.211,NEW INSTALLED OJ6D4038WXH,DESKTOP,OFFICE,ISMD,Mr Stephen Hicy B Dueñas,DUEÑASSHB,,,,,,,10.1.6.152,NEW INSTALLED OJ6D6710WXI,DESKTOP,OFFICE,EWD,Mr John Patrick V Azcueta,AZCUETAJPV,,,,,,,10.1.6.187, OJ6D6410WXN,DESKTOP,OFFICE,EWD,Mr Henry James L Abila,ABILAHJL,,,,,,,10.1.6.142, OJ6D6810WX3,DESKTOP,OFFICE,CNIMD,CNMD Personnel,SEID,,,,,,,10.1.6.12,Internet Only OJ6D6810WXJ,DESKTOP,OFFICE,CNIMD,Mr Jayve G Melindo,MELINDOJG,,,,,,,10.1.6.186,NEW INSTALLED OJ6D6810WX2,DESKTOP,OFFICE,CNIMD,Mr Ariel B Llobrera,LLOBRERAAB,,,,,,,10.1.6.188, OJ6D6810WX4,DESKTOP,OFFICE,CNIMD,COL ROLEEN M DEL PRADO,DELPRADORM,,,,,,,10.1.6.213,NEW INSTALLED OJ6_PMO_01,DESKTOP,OFFICE,CDD,Ms Shiela S Maravillas,MARAVILLASSS,,,,,,,10.1.6.173, OJ6D6476WX1,DESKTOP,OFFICE,CDD,Mr John David S Briones,BRIONESJDAS,,,,,,,10.1.6.171, OJ6D6210WXP1,DESKTOP,OFFICE,CD,CD CE,CMD2,,,,,,,10.1.6.122, OJ6D6210WXP,DESKTOP,OFFICE,CD,CD CE,CMD1,,,,,,,10.1.6.123, OJ6D6310W72,DESKTOP,OFFICE,C2SD,Ssg Michael A Perez,PEREZMA,,,,,,,10.1.6.132, OJ6D6310WXT,DESKTOP,OFFICE,C2SD,C2SD CE,C3SOD,,,,,,,10.1.6.112, OJ6D6310WX1,DESKTOP,OFFICE,C2SD,Ssg Jaime S Banaag Jr,BANAAGJS,,,,,,,10.1.6.138, OJ6D6510WX,DESKTOP,OFFICE,AJ6/EX-O,Cpl Ma Richelle A Descargar,OFILASPL,,,,,,,10.1.6.162, OJ6D6110W7K,DESKTOP,OFFICE,ADMIN,Msg Edmundo M Manalo,ZAMORAJMR,,,,,,,10.1.6.22,OLD LOCAL OJ6D6110W7S,DESKTOP,OFFICE,ADMIN,Ms. Marilyn Visaya,VISAYASMM,,,,,,,10.1.6.139, OJ6D6110W7R,DESKTOP,OFFICE,ADMIN,Sgt Dennis M Sumagui,SUMAGUIDM,,,,,,,10.1.6.114, OJ6D6110WXF,DESKTOP,OFFICE,ADMIN,Tsg Amelia S Pitero,PITEROAS,,,,,,,10.1.6.134, OJ6D6110W7A,DESKTOP,OFFICE,ADMIN,Mr. Policarpio S Martonito,MARTONITOPS,,,,,,,10.1.6.116, OJ6D6110WXC,DESKTOP,OFFICE,ADMIN,Tsg Blitz U Villanueva,ILAGANAC,,,,,,,10.1.6.26,NEW LOCAL OJ6D6110WXE,DESKTOP,OFFICE,ADMIN,Ms. Rizza R Delgado,DELGADORR,,,,,,,10.1.6.117,NEW LOCAL OJ6L6110W7N,LAPTOP,OFFICE,ADMIN,LCDR REY B BITALAC,BITALACRB,,,,,,,10.1.6.125, ,,,,,,,,,,,,, ,,,,,,,,,,,,, ,,,,,,,,,,,,, ,,,,,,,,,,,,, ,,,,,,,,,,,,, ,,,,,,,,,,,,, ,,,,,,,,,,,,, Prepared By:,,,Noted By:,,,,,,,,,Approved By:, ,,,,,,,,,,,,, ,,,,,,,,,,,,, ,,,,,,,,,,,,, ,,,,,,,,,,,,, \"Jayve G Melindo, CE\",,,JOEY M CALLUENG,,,,,,,,,REY B BITALAC, \"System Administrator, OJ6\",,,Lieutenant PN,,,,,,,,,Lieutenant Commander PN, \"CNMD, OJ6\",,,\"Systems Administration Officer, OJ6\",,,,,,,,,\"Chief, PDAD, OJ6\", ,,,,,,,,,,,,, ,,,,,,,,,,,,, ,,,,,,,,,,,,, ,,,,,,,,,,,,, ,,,,,,,,,,,,, ,,,,,,,,,,,,, ,,,,,,,,,,,,, ,,,,,,,,,,,,, ,,,,,,,,,,,,, ,,,,,,,,,,,,, ,,,,,,,,,,,,, ,,,,,,,,,,,,, LOCATION,HARDWARE,,Views Cagnet Portal,,Connected to Internet,,Hardware Specification,,,, ,,,,,,,,,Operating System,, ,,,,,,,,,,, ,,,,,,,,RAM/,,,Not Licensed ,Desktop Name,Laptop Name,Y,N,Y,N,Processor,System Type,OS Installed,Licensed, ,,,,,,,,,,, J6,,,,,,,,,,, AJ6,,,,,,,,,,, AJ6,,,,,,,,,,, EX-O,,,,,,,,,,, \"Sec, J6\",,,,,,,,,,, Sec AJ6/EX-O,,,,,,,,,,, Conference Room,,,,,,,,,,, ,,,,,,,,,,, CNIMD,,,,,,,,,,, ,,,,,,,,,,, ,,,,,,,,,,, EWD,,,,,,,,,,, ,,,,,,,,,,, ,,,,,,,,,,, CD,,,,,,,,,,, ,,,,,,,,,,, ,,,,,,,,,,, ADMIN,,,,,,,,,,, ,,,,,,,,,,, ,,,,,,,,,,, ,,,,,,,,,,, ,,,,,,,,,,, ,,,,,,,,,,, ,,,,,,,,,,, ,,,,,,,,,,, P3BD,,,,,,,,,,, ,,,,,,,,,,, ,,,,,,,,,,, ,,,,,,,,,,, ,,,,,,,,,,, ,,,,,,,,,,, ,,,,,,,,,,, C2SD,,,,,,,,,,, ,,,,,,,,,,, ,,,,,,,,,,, ,,,,,,,,,,, CDD,,,,,,,,,,, ,,,,,,,,,,, ,,,,,,,,,,, Programs Installed,,,,,,,,,, PDAD,P3BD,C2SD,CDD,ISMD,CNMD,CD,EWD,EXO,AJ6,J6 ","routeslip":"","__v":0}
75+{"_id":{"$oid":"5f3e339d66cc3f0590a28a6a"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119534656","title":"AuditScripts-Critical-Security-Control-Manual-Assessment-Tool-v7.0_Joey.xls","filename":"/drive/CRA/OJ6/AuditScripts-Critical-Security-Control-Manual-Assessment-Tool-v7.0_Joey.xls","category":"","author":"System","deyt":{"$date":"2019-02-27T01:24:50Z"},"size":735744,"content":"Critical Security Controls Initial Assessment Tool (v7.0b),,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, Instructions - Read me first.,,,,,,,,,,,,,,, \"The purpose for this tool is to provide organizations with a simple tool for performing an initial assessment of their information assurance maturity level based on the controls defined by the Critical Security Controls and the Council on Cybersecurity. Any questions about how this tool works or suggestions can be directed to info@auditscripts.com. In order to use this tool, the assessor must only complete the answers to the drop down menu questions lists on the pages labeled CSC #1 - CSC #20. By choosing a drop down choice for each critical control, the assessment tool will automatically generate scores and maturity level based on the answers to each question. Based on the answers to each question, the dashboard worksheet will automatically populate with the overall maturity level scores for the organization as a whole. These scores can therefore be used to measure the organization's progress and what percentage of the Critical Security Controls they are currently following. Ideally in the long term organizations would deploy tools that would automate the collection of this information, but in the meanwhile, this tool can be used to help start the process of manually assessing the organization's maturity level.\",,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, Field Definitions,,,,,,,,,,,,,,, ID,,,This is the ID number of the specific critical security control sub-control reference as included in the Critical Security Controls documentation.,,,,,,,,,,,, Critical Security Control Detail,,,This is the detail behind each specific sub-control as defined by the Critical Security Controls documentation.,,,,,,,,,,,, EOF Function,,,\"This standards for \"\"Executive Order Framework (EOF)\"\" function. These functions were defined by NIST in the EOF and act as control characteristics.\",,,,,,,,,,,, Sensor or Baseline,,,This is the type of technical system or baseline that we believe is necessary in order to implement the specific sub control.,,,,,,,,,,,, Policy Approved,,,This question determines whether the organization currently has a policy defined that indicates that they should be implementing the defined sub control.,,,,,,,,,,,, Control Implemented,,,This question determines whether or not the organization currently has implemented this sub control and to what degree the control has been implemented.,,,,,,,,,,,, Control Automated,,,This question determines whether or not the organization currently has automated the implementation of this sub control and to what degree the control has been automated.,,,,,,,,,,,, Control Reported to Business,,,This question determines whether or not the organization is reporting this sub control to business representatives and to what degree the control has been reported.,,,,,,,,,,,, ,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.,,,,,,,,,,,,,,, Critical Security Controls Initial Assessment Tool (v7.0b),,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,CSC #1,25% Maturity level:,Description:,Score:,,,,,,,,,,,,,,,CSC #2,38% Level One,Policies Complete,0.98,,,,,,,,,,,,,,,CSC #3,71% Level Two,Controls 1-5 Implemented,0.59,,,,,,,,,,,,,,,CSC #4,75% Level Three,All Controls Implemented,0.75,,,,,,,,,,,,,,,CSC #5,75% Level Four,All Controls Automated,0.50,,,,,,,,,,,,,,,CSC #6,75% Level Five,All Controls Reported,0.75,,,,,,,,,,,,,,,CSC #7,75% ,,,,,,,,,,,,,,,,,CSC #8,75% ,Maturity Rating*:,3.57,,,,,,,,,,,,,,,CSC #9,75% ,*Rating is on a 0-5 scale.,,,,,,,,,,,,,,,,CSC #10,75% ,,,,,,,,,,,,,,,,,CSC #11,75% ,,,,,,,,,,,,,,,,,CSC #12,75% ,,,,,,,,,,,,,,,,,CSC #13,75% ,,,,,,,,,,,,,,,,,CSC #14,75% ,,,,,,,,,,,,,,,,,CSC #15,70% ,,,,,,,,,,,,,,,,,CSC #16,75% ,,,,,,,,,,,,,,,,,CSC #17,75% ,,,,,,,,,,,,,,,,,CSC #18,75% ,,,,,,,,,,,,,,,,,CSC #19,75% ,,,,,,,,,,,,,,,,,CSC #20,100% ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, Critical Security Control #1: Inventory and Control of Hardware Assets,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,Risk Addressed:,57%,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,Risk Accepted:,43%,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ID,Critical Security Control Detail,NIST CSF,Sensor or Baseline,Policy Defined,Control Implemented,Control Automated or Technically Enforced,Control Reported to Business,,,,,,,,NIST CF,DO NOT CHANGE THESE VALUES 1.1,Utilize an active discovery tool to identify devices connected to the organization's network and update the hardware asset inv","routeslip":"","__v":0}
76+{"_id":{"$oid":"5f3e339d66cc3f0590a28a6b"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119534656","title":"AuditScripts-Critical-Security-Control-Manual-Assessment-Tool-v7.0_Joey.xls","filename":"/drive/CRA/OJ6/AuditScripts-Critical-Security-Control-Manual-Assessment-Tool-v7.0_Joey.xls","category":"","author":"System","deyt":{"$date":"2019-02-27T01:24:50Z"},"size":735744,"content":"Critical Security Controls Initial Assessment Tool (v7.0b),,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, Instructions - Read me first.,,,,,,,,,,,,,,, \"The purpose for this tool is to provide organizations with a simple tool for performing an initial assessment of their information assurance maturity level based on the controls defined by the Critical Security Controls and the Council on Cybersecurity. Any questions about how this tool works or suggestions can be directed to info@auditscripts.com. In order to use this tool, the assessor must only complete the answers to the drop down menu questions lists on the pages labeled CSC #1 - CSC #20. By choosing a drop down choice for each critical control, the assessment tool will automatically generate scores and maturity level based on the answers to each question. Based on the answers to each question, the dashboard worksheet will automatically populate with the overall maturity level scores for the organization as a whole. These scores can therefore be used to measure the organization's progress and what percentage of the Critical Security Controls they are currently following. Ideally in the long term organizations would deploy tools that would automate the collection of this information, but in the meanwhile, this tool can be used to help start the process of manually assessing the organization's maturity level.\",,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, Field Definitions,,,,,,,,,,,,,,, ID,,,This is the ID number of the specific critical security control sub-control reference as included in the Critical Security Controls documentation.,,,,,,,,,,,, Critical Security Control Detail,,,This is the detail behind each specific sub-control as defined by the Critical Security Controls documentation.,,,,,,,,,,,, EOF Function,,,\"This standards for \"\"Executive Order Framework (EOF)\"\" function. These functions were defined by NIST in the EOF and act as control characteristics.\",,,,,,,,,,,, Sensor or Baseline,,,This is the type of technical system or baseline that we believe is necessary in order to implement the specific sub control.,,,,,,,,,,,, Policy Approved,,,This question determines whether the organization currently has a policy defined that indicates that they should be implementing the defined sub control.,,,,,,,,,,,, Control Implemented,,,This question determines whether or not the organization currently has implemented this sub control and to what degree the control has been implemented.,,,,,,,,,,,, Control Automated,,,This question determines whether or not the organization currently has automated the implementation of this sub control and to what degree the control has been automated.,,,,,,,,,,,, Control Reported to Business,,,This question determines whether or not the organization is reporting this sub control to business representatives and to what degree the control has been reported.,,,,,,,,,,,, ,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,, This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.,,,,,,,,,,,,,,, Critical Security Controls Initial Assessment Tool (v7.0b),,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,CSC #1,25% Maturity level:,Description:,Score:,,,,,,,,,,,,,,,CSC #2,38% Level One,Policies Complete,0.98,,,,,,,,,,,,,,,CSC #3,71% Level Two,Controls 1-5 Implemented,0.59,,,,,,,,,,,,,,,CSC #4,75% Level Three,All Controls Implemented,0.75,,,,,,,,,,,,,,,CSC #5,75% Level Four,All Controls Automated,0.50,,,,,,,,,,,,,,,CSC #6,75% Level Five,All Controls Reported,0.75,,,,,,,,,,,,,,,CSC #7,75% ,,,,,,,,,,,,,,,,,CSC #8,75% ,Maturity Rating*:,3.57,,,,,,,,,,,,,,,CSC #9,75% ,*Rating is on a 0-5 scale.,,,,,,,,,,,,,,,,CSC #10,75% ,,,,,,,,,,,,,,,,,CSC #11,75% ,,,,,,,,,,,,,,,,,CSC #12,75% ,,,,,,,,,,,,,,,,,CSC #13,75% ,,,,,,,,,,,,,,,,,CSC #14,75% ,,,,,,,,,,,,,,,,,CSC #15,70% ,,,,,,,,,,,,,,,,,CSC #16,75% ,,,,,,,,,,,,,,,,,CSC #17,75% ,,,,,,,,,,,,,,,,,CSC #18,75% ,,,,,,,,,,,,,,,,,CSC #19,75% ,,,,,,,,,,,,,,,,,CSC #20,100% ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,, Critical Security Control #1: Inventory and Control of Hardware Assets,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,Risk Addressed:,57%,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,Risk Accepted:,43%,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,, ID,Critical Security Control Detail,NIST CSF,Sensor or Baseline,Policy Defined,Control Implemented,Control Automated or Technically Enforced,Control Reported to Business,,,,,,,,NIST CF,DO NOT CHANGE THESE VALUES 1.1,Utilize an active discovery tool to identify devices connected to the organization's network and update the hardware asset inv","routeslip":"","__v":0}
77+{"_id":{"$oid":"5f3e339d66cc3f0590a28a6c"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119534693","title":"Network and IS.xlsx","filename":"/drive/N6C/Signature/Network and IS.xlsx","category":"","author":"System","deyt":{"$date":"2020-03-09T08:29:45.081Z"},"size":21370,"content":"USERS,PROVIDER,BANDWIDTH (MBPS),,Status ,,,, HNICTC,PLDT,10,30,Operating NICTS-Manila,PLDT,20,60,Operating NICTS –La Union,PLDT,2,20,Operating NICTS-Legazpi,PLDT,2,2,Operating NICTS- Palawan,PLDT,2,2,Operating NICTS-Zamboanga,PLDT,2,20,Operating NICTS- Davao,PLDT,2,20,Operating NICTS- Cebu,PLDT,2,20,Operating NICTS-Bonifacio,PLDT,4,20,Operating NICTU ZAMBALES,PLDT,2,2,Operating NICTU CAGAYAN,PLDT,2,2,Operating FORT SANTIAGO(NRC),PLDT,0.5,4,Operating \"MRIC,NISF\",PLDT,2,10,Operating CWS ZAMBOANGA,PLDT,2,4,Operating NICTU-Ulugan,PLDT,2,2,Operating USERS,Bandwidth (MBPS) ,PROVIDER,REMARKS HNICTC,60,IP CONVERGE,\"Operating(catered within Cavite area units ;NSSC,PHLFLT,FMRF,NCBDE and other tenant units of Cavite\" ,4,I-GATE PREMIUM,Operating(use only by PNC2 Internet) CNSSC,4,BIZ DSL ENTREPRENEUR,Operating(exclusive for CNSSC use only)/offline BNS,8,I-GATE ,Operating NICTS-LaUnion,5,BIZ DSL SMALL BIZ JR,Operating NICTS Palawan,2,DSL SERVICE,Operating NICTS Zamboanga,4,BIZ DSL ENTREPRENEUR ,Operating NICTS Davao,4,DSL SERVICE,Operating NICTS Cebu,2,BIZ DSL SMALL BIZ JR,Operating Information Systems,Software Development (%),End-User Encoding (%) IPMS,100,100 IPMS-Payroll,100,0 CEBIS,100,30 PN GSIS,60,0 IPMS-MEDICS,100,70 IPMS-Reservist,100,50 PRISM (Procurement),100,100 NORS (Operation),0,0 LMIS (OPTAR),0,0 PALMS (Logistics),80,0 Online Recruitment,100,0 PN SEMIS,100,80 ","routeslip":"","__v":0}
78+{"_id":{"$oid":"5f3e339d66cc3f0590a28a6f"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15921358249871","title":"Network and IS.pdf","filename":"/drive/N6C/Signature/Network and IS.pdf","category":"","author":"System","deyt":{"$date":"2020-03-20T08:03:01.933Z"},"size":251179,"content":"USERS Status HNICTC 30 Operating NICTS-Manila 60 Operating NICTS –La Union 20 Operating NICTS-Legazpi 2 Operating NICTS- Palawan 2 Operating NICTS-Zamboanga 20 Operating NICTS- Davao 20 Operating NICTS- Cebu 20 Operating NICTS-Bonifacio 20 Operating NICTU ZAMBALES 2 Operating NICTU CAGAYAN 2 Operating FORT SANTIAGO(NRC) 4 Operating MRIC,NISF 10 Operating CWS ZAMBOANGA 4 Operating NICTU-Ulugan 2 Operating HNICTC NICTS-Manila NICTS –La Union NICTS-Legazpi NICTS- Palawan NICTS-Zamboanga NICTS- Davao NICTS- Cebu NICTS-Bonifacio NICTU ZAMBALES NICTU CAGAYAN FORT SANTIAGO(NRC) MRIC,NISF CWS ZAMBOANGA NICTU-Ulugan 0 10 20 3 20 2 2 20 20 20 20 2 2 4 10 4 2 NICTC Manila Union egazpi awan oanga Davao Cebu facio ALES AYAN NRC) NISF NGA ugan 0 10 20 30 40 50 60 30 60 20 2 2 20 20 20 20 2 2 4 10 4 2 USERS Bandwidth (MBPS) PROVIDER REMARKS HNICTC 60 IP CONVERGE Operating(catered within Cavite area units ;NSSC,PHL 4 I-GATE PREMIU Operating(use only by PNC2 Internet) CNSSC 4 BIZ DSL ENTREP Operating(exclusive for CNSSC use only)/offline BNS 8 I-GATE Operating NICTS-LaUnion 5 BIZ DSL SMALL BI Operating NICTS Palawan 2 DSL SERVICE Operating NICTS Zamboanga 4 BIZ DSL ENTREP Operating NICTS Davao 4 DSL SERVICE Operating NICTS Cebu 2 BIZ DSL SMALL BI Operating te area units ;NSSC,PHLFLT,FMRF,NCBDE and other tenant units of Cavite C use only)/offline HNICTC CNSSC BNS NICTS-LaUnion NICTS Palawan NICTS Zamboanga NICTS Davao NICTS Cebu 0 10 20 30 40 50 60 60 4 4 8 5 2 4 4 2 Bandwidth (MBPS) Information Systems Software Development (%) End-User Encoding (%) IPMS 100 100 IPMS-Payroll 100 0 CEBIS 100 30 PN GSIS 60 0 IPMS-MEDICS 100 70 IPMS-Reservist 100 50 PRISM (Procurement) 100 100 NORS (Operation) 0 0 LMIS (OPTAR) 0 0 PALMS (Logistics) 80 0 Online Recruitment 100 0 PN SEMIS 100 80 IPM S IPM S-Payroll 0 20 40 60 80 100 120 140 160 180 200 100 10 100 0 IPM S IPM S-Payroll CEBIS PN GSIS IPM S-M EDICS IPM S-Reservist PRISM (Procurem ent) NORS (Operation) LM IS (OPTAR) PALM S(Logistics) OnlineRecruitm ent PN SEM IS 0 20 40 60 80 100 120 140 160 180 200 100 100 100 60 100 100 100 0 0 80 100 100 100 0 30 0 70 50 100 0 0 0 0 80 Software Development (%) End-User Encoding (%) PN SEM IS 100 80","routeslip":"","__v":0}
79+{"_id":{"$oid":"5f3e339d66cc3f0590a28a71"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15921218568257","title":"PN SOP Privilege and Accounts Management .docx.mario.pdf.mario.pdf","filename":"/drive/CRA/Policy Compliance CRA/PN SOP Privilege and Accounts Management .docx.mario.pdf.mario.pdf","category":"","author":"System","deyt":{"$date":"2020-04-28T08:49:38.852Z"},"size":354320,"content":"PUNONG HIMPILAN HUKBONG DAGAT NG PILIPINAS (Headquarters Philippine Navy) Naval Station Jose Andrada 2335 Roxas Boulevard, Manila ON6/OTNA STANDARD OPERATING PROCEDURE NUMBER _________________________ ACCOUNTS AND PRIVILEGES MANAGEMENT 1. REFERENCES: a. AFP SOP Nr 04 dated 30 Jan 2019, Subject: AFP Cyber Risk Assessment. b. AFP Cyber Strategy. c. Circular nr 29 dated 06 December 2017, Subject: PN Cybersecurity Policy. d. 20 Critical Security Controls by SysAdmin, Audit, Network, Security (SANS) Institute. 2. PURPOSE: The purpose of this policy is to establish a standard for the administration of user accounts that facilitate access PN information systems. An account, at minimum, consists of a user ID and a password; supplying account information will usually grant access to some set of services and resources. This policy establishes standards for issuing accounts, creating password values, and managing accounts. a) SCOPE: This SOP is applicable to units 6's and CEIS units for the management of user accounts or access to shared information or network devices. b) DEFINITION OF TERMS: a. Asset - is any data, device, or other component of the environment that supports information-related activities. Assets generally include hardware (e.g. servers and switches), software (e.g. mission critical applications and support systems) and confidential information. b. Cybersecurity -deliberate synergy of technologies, processes, and practices to protect information and the networks, computer systems and appliances, and programs used to collect, process, store, and transport that information from attack, damage and unauthorized access. c. Cybersecurity Posture – refers to the overall cybersecurity strength of an PN. It expresses the relative security of the IT estate and its vulnerability to outside threats. d. Risk Assessment – is a process of identifying, estimating, and prioritizing risks of PNal assets and operations. It involves evaluating hazards, and developing plans to remove or minimize the level of risk. e. Security Controls - refers to technical, physical, and administrative safeguards to detect cyber threats, minimize risks, and protect from cyber attacks. c) POLICIES: a. Account Administration Accounts that access electronic computing and information resources require prudent oversight. The following security precautions should be part of account management: 1) Issuance of Accounts a) The PN shall issue a unique account to each individual authorized to access that networked computing and information resource. b) When establishing accounts, standard security principles of \"least required access\" to perform a function must always be used, where administratively feasible. For example, a root or administrative privileged account must not be used when a non-privileged account will do. c) Passwords for new accounts should NOT be emailed to remote users UNLESS the email is encrypted. d) The date when the account was issued should be recorded in an audit log or captured electronically. 2) Management of Accounts a) All accounts shall be reviewed at least annually to ensure that access and account privileges are commensurate with job function, need-to- know, and employment status. b) All guest accounts with access to PN network shall contain an expiration date of one year or the work completion date, whichever occurs first. c) Require multi-factor authentication for all user accounts, on all systems, whether managed onsite or by a third-party provider. 3) Account Monitoring a) Maintain an inventory of each of the PN's authentication systems, including those located onsite or at a remote service provider. b) Maintain an inventory of all accounts organized by authentication system. d) Ensure that all accounts have an expiration date that is monitored and enforced. e) Configure access for all accounts through as few centralized points of authentication as possible, including network, security, and cloud systems. c) Establish and follow an automated process for revoking system access by disabling accounts immediately upon termination or change of responsibilities PN personnel. Disabling these accounts, instead of deleting accounts, allows preservation of audit trails. d) Automatically disable dormant accounts after a set period of inactivity. e) Monitor attempts to access deactivated accounts through audit logging. f) Alert when users deviate from normal login behavior, such as time-of-day, workstation location and duration. g) Automatically lock workstation sessions after a standard period of inactivity 4) Administration of Password a) The identity of users must be authenticated before providing them with ID and password details. In addition, it is required that stricter levels of authentication (such as face-to-face) be used for those accounts with privileged access. b) Whenever possible, passkeys should be used to authenticate a user when resetting a password or activating a guest account, and should comply with the abo","routeslip":"","__v":0}
80+{"_id":{"$oid":"5f3e339d66cc3f0590a28a6e"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15921358249877","title":"Eclipse IDE.pdf","filename":"/drive/N6C/Signature/Eclipse IDE.pdf","category":"","author":"System","deyt":{"$date":"2019-08-07T05:47:06.069Z"},"size":462145,"content":"Explore the English language on a new scale using AI-powered English language navigator. Setting up Eclipse: Java's popular IDE Summary This tutorial will help you to install JDK (Java Development Kit), setup Eclipse IDE (Integrated development environment) and get started with Java. Keywords: IDE, Eclipse, JDK Downloads First of all you have to download some stuff from the Internet: 1. Download the latest JDK from: http://java.sun.com/javase/downloads/index.jsp 2. Download Eclipse IDE for Java Developers from: http://www.eclipse.org/downloads/ Installation Run JDK installer and follow instructions. After you installed the JDK, unpack eclipse archive somewhere on a disk and run eclipse.exe. Get started with Eclipse Select a workspace If you did previous steps right, you should see the following: You are asked to select a workspace directory, where all of your further projects would be stored. You may leave the default folder or choose another one. It's important to remember this path for future. After you choose the workspace location, press ok and wait a little, while Eclipse is loading. Creating a project Choose File New Java Project from menu. In the \"New Java Project\" window type \"HelloWorld\" in the project name edit box. Then press Finish button. Click with the right button on the HelloWorld project in package explorer. Choose New Class: Name it \"HelloWorld\" and set checker box to create main method stub. Then press Finish button. Type: System.out.println(\"Hello World! I am new to Java.\"); in the main method's body and run HelloWorld with run button: You will see the result in a console window: Your first Java application is ready! We will discuss it in detail in the next article. If you would like to get known more about SEO, site building, webhosting and everything else concerned with running own wesites, we'd recommend you to visit SEO blog. There you find many useful tutorials and tips on various SEO relevant topics. To start your own website check this: how to set up a website. Partners Ads","routeslip":"","__v":0}
81+{"_id":{"$oid":"5f3e339d66cc3f0590a28a70"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15921358453024","title":"Eclipse IDE.pdf","filename":"/drive/CRA/OJ6/Eclipse IDE.pdf","category":"","author":"System","deyt":{"$date":"2019-08-07T05:47:06.069Z"},"size":462145,"content":"Explore the English language on a new scale using AI-powered English language navigator. Setting up Eclipse: Java's popular IDE Summary This tutorial will help you to install JDK (Java Development Kit), setup Eclipse IDE (Integrated development environment) and get started with Java. Keywords: IDE, Eclipse, JDK Downloads First of all you have to download some stuff from the Internet: 1. Download the latest JDK from: http://java.sun.com/javase/downloads/index.jsp 2. Download Eclipse IDE for Java Developers from: http://www.eclipse.org/downloads/ Installation Run JDK installer and follow instructions. After you installed the JDK, unpack eclipse archive somewhere on a disk and run eclipse.exe. Get started with Eclipse Select a workspace If you did previous steps right, you should see the following: You are asked to select a workspace directory, where all of your further projects would be stored. You may leave the default folder or choose another one. It's important to remember this path for future. After you choose the workspace location, press ok and wait a little, while Eclipse is loading. Creating a project Choose File New Java Project from menu. In the \"New Java Project\" window type \"HelloWorld\" in the project name edit box. Then press Finish button. Click with the right button on the HelloWorld project in package explorer. Choose New Class: Name it \"HelloWorld\" and set checker box to create main method stub. Then press Finish button. Type: System.out.println(\"Hello World! I am new to Java.\"); in the main method's body and run HelloWorld with run button: You will see the result in a console window: Your first Java application is ready! We will discuss it in detail in the next article. If you would like to get known more about SEO, site building, webhosting and everything else concerned with running own wesites, we'd recommend you to visit SEO blog. There you find many useful tutorials and tips on various SEO relevant topics. To start your own website check this: how to set up a website. Partners Ads","routeslip":"","__v":0}
82+{"_id":{"$oid":"5f3e339d66cc3f0590a28a6d"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119534783","title":"Network and IS.xlsx","filename":"/drive/N6B/LOI/Network and IS.xlsx","category":"","author":"System","deyt":{"$date":"2020-03-09T08:29:45.081Z"},"size":21370,"content":"USERS,PROVIDER,BANDWIDTH (MBPS),,Status ,,,, HNICTC,PLDT,10,30,Operating NICTS-Manila,PLDT,20,60,Operating NICTS –La Union,PLDT,2,20,Operating NICTS-Legazpi,PLDT,2,2,Operating NICTS- Palawan,PLDT,2,2,Operating NICTS-Zamboanga,PLDT,2,20,Operating NICTS- Davao,PLDT,2,20,Operating NICTS- Cebu,PLDT,2,20,Operating NICTS-Bonifacio,PLDT,4,20,Operating NICTU ZAMBALES,PLDT,2,2,Operating NICTU CAGAYAN,PLDT,2,2,Operating FORT SANTIAGO(NRC),PLDT,0.5,4,Operating \"MRIC,NISF\",PLDT,2,10,Operating CWS ZAMBOANGA,PLDT,2,4,Operating NICTU-Ulugan,PLDT,2,2,Operating USERS,Bandwidth (MBPS) ,PROVIDER,REMARKS HNICTC,60,IP CONVERGE,\"Operating(catered within Cavite area units ;NSSC,PHLFLT,FMRF,NCBDE and other tenant units of Cavite\" ,4,I-GATE PREMIUM,Operating(use only by PNC2 Internet) CNSSC,4,BIZ DSL ENTREPRENEUR,Operating(exclusive for CNSSC use only)/offline BNS,8,I-GATE ,Operating NICTS-LaUnion,5,BIZ DSL SMALL BIZ JR,Operating NICTS Palawan,2,DSL SERVICE,Operating NICTS Zamboanga,4,BIZ DSL ENTREPRENEUR ,Operating NICTS Davao,4,DSL SERVICE,Operating NICTS Cebu,2,BIZ DSL SMALL BIZ JR,Operating Information Systems,Software Development (%),End-User Encoding (%) IPMS,100,100 IPMS-Payroll,100,0 CEBIS,100,30 PN GSIS,60,0 IPMS-MEDICS,100,70 IPMS-Reservist,100,50 PRISM (Procurement),100,100 NORS (Operation),0,0 LMIS (OPTAR),0,0 PALMS (Logistics),80,0 Online Recruitment,100,0 PN SEMIS,100,80 ","routeslip":"","__v":0}
83+{"_id":{"$oid":"5f3e339d66cc3f0590a28a73"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15921358352868","title":"Annex B CRA Parameters.docx.juan.pdf","filename":"/drive/CRA/AFP CRA/Annex B CRA Parameters.docx.juan.pdf","category":"","author":"System","deyt":{"$date":"2020-04-28T15:23:05.358Z"},"size":231201,"content":"ANNEX \"B\" to SOP Nr ____AFP Dated__________ Cybersecurity Risk Assessment (CRA) Template CRA Parameters Description Available Capability Gap Recommendation 1. Inventory of Authorized and Unauthorized Devices Reduce the ability of attackers to find and exploit unauthorized and unprotected systems: Use active monitoring and configuration management to maintain an up-to-date inventory of devices connected to the enterprise network, including servers, workstations, laptops, and remote devices. No inventory of authorized and unauthorized devices Program for Asset Management System such as MS Active Directory 2. Inventory of Authorized and Unauthorized Software Identify vulnerable or malicious software to mitigate or root out attacks: Devise a list of authorized software for each type of system, and deploy tools to track software installed (including type, version, and patches) and monitor for unauthorized or unnecessary software. 3. Secure Configurations for Hardware and Software on Mobile Devices, Laptop, Workstations, and Servers Prevent attackers from exploiting services and settings that allow easy access through networks and browsers: Build a secure image that is used for all new systems deployed to the enterprises, host these standard images on secure storage servers, regularly validate and update these configurations, and track system images in a configuration management system. 4. Continuous Vulnerability Assessment and Remediation Proactively identify and repair software vulnerabilities reported by security researchers or vendors: Regularly run automated vulnerability scanning tools against all systems and quickly remediate any vulnerabilities, which critical problems fixed within 48 hours. 5. Malware Defenses Block malicious code from tampering with system settings or contents, capturing sensitive data, or spreading: Use automated anti-virus and anti- 1588087378022 spyware to continuously monitor and protect workstations, servers, and mobile devices. Automatically update such anti-malware tools on all machines on a daily basis. Prevent network devices from using auto-run programs to access removable media. 6. Application Software Security Neutralize vulnerabilities in web-based and other applications software: Carefully test internally developed and third-party application software for security flaws, including coding errors and malware. Deploy web application firewalls that inspect all traffic, and explicitly check for errors in all users input (including by size and data type). 7. Wireless Device Control Protect the security perimeter against unauthorized wireless access. Allow wireless devices to connect to the network only if they match an authorized configuration and security profile and have a documented owner and defined business need. Ensure that all wireless access points are manageable using enterprise management tools. Configure scanning tools to detect wireless access points. 8. Data Recovery Capability Minimize the damage from an attack: Implement a trustworthy plan for removing all traces an attack. Automatically back up all information required to fully restore each system, including the operating system, application software, and data. Back up all systems at least weekly; back up sensitive systems more often. Regularly test the restoration process. 9. Security Skills Assessment and Appropriate Training to Fill Gaps Find knowledge gaps, and fill them with exercises and training: Develop security skills assessment program, map training against the skills required for each job, and use the results to allocate resources effectively to improve security practices. 10. Secure Configurations for Network Devices such as Firewalls, Router, and Switches Preclude electronic holes from forming at connection points with the Internet, other organizations, and internal networks segments: Compare firewall, router, and switch configurations against standards for each type of networks device. Ensure that any deviations from the standard configurations are documented and approved and that any temporary deviations are undone when the business need abates. 11. Limited and Control of Networks Ports, Protocols, and Services Allow remote access only to legitimate users and services: Apply host- based firewalls and port-filtering and scanning tools to block traffic that is not explicitly allowed. Properly configure web servers, mail servers, file and print services, and domain name system (DNS) servers to limit remote access. Disable automatic installation of unnecessary software components. Move servers inside the firewall unless remote access is required for business purposes. 12. Controlled Use of Administrative Privileges Protect and validate administrative accounts on desktops, laptops, and servers to prevent two common types of attack (1) enticing users to open a malicious e-mail, attachment, or file, or to visit a malicious website; and (2) cracking an administrative password and thereby gaining access to","routeslip":"","__v":0}
84+{"_id":{"$oid":"5f3e339d66cc3f0590a28a72"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15921218568256","title":"PN SOP Privilege and Accounts Management .docx.mario.pdf","filename":"/drive/CRA/Policy Compliance CRA/PN SOP Privilege and Accounts Management .docx.mario.pdf","category":"","author":"System","deyt":{"$date":"2020-04-28T08:47:22.563Z"},"size":349797,"content":"PUNONG HIMPILAN HUKBONG DAGAT NG PILIPINAS (Headquarters Philippine Navy) Naval Station Jose Andrada 2335 Roxas Boulevard, Manila ON6/OTNA STANDARD OPERATING PROCEDURE NUMBER _________________________ ACCOUNTS AND PRIVILEGES MANAGEMENT 1. REFERENCES: a. AFP SOP Nr 04 dated 30 Jan 2019, Subject: AFP Cyber Risk Assessment. b. AFP Cyber Strategy. c. Circular nr 29 dated 06 December 2017, Subject: PN Cybersecurity Policy. d. 20 Critical Security Controls by SysAdmin, Audit, Network, Security (SANS) Institute. 2. PURPOSE: The purpose of this policy is to establish a standard for the administration of user accounts that facilitate access PN information systems. An account, at minimum, consists of a user ID and a password; supplying account information will usually grant access to some set of services and resources. This policy establishes standards for issuing accounts, creating password values, and managing accounts. a) SCOPE: This SOP is applicable to units 6's and CEIS units for the management of user accounts or access to shared information or network devices. b) DEFINITION OF TERMS: a. Asset - is any data, device, or other component of the environment that supports information-related activities. Assets generally include hardware (e.g. servers and switches), software (e.g. mission critical applications and support systems) and confidential information. b. Cybersecurity -deliberate synergy of technologies, processes, and practices to protect information and the networks, computer systems and appliances, and programs used to collect, process, store, and transport that information from attack, damage and unauthorized access. c. Cybersecurity Posture – refers to the overall cybersecurity strength of an PN. It expresses the relative security of the IT estate and its vulnerability to outside threats. d. Risk Assessment – is a process of identifying, estimating, and prioritizing risks of PNal assets and operations. It involves evaluating hazards, and developing plans to remove or minimize the level of risk. e. Security Controls - refers to technical, physical, and administrative safeguards to detect cyber threats, minimize risks, and protect from cyber attacks. c) POLICIES: a. Account Administration Accounts that access electronic computing and information resources require prudent oversight. The following security precautions should be part of account management: 1) Issuance of Accounts a) The PN shall issue a unique account to each individual authorized to access that networked computing and information resource. b) When establishing accounts, standard security principles of \"least required access\" to perform a function must always be used, where administratively feasible. For example, a root or administrative privileged account must not be used when a non-privileged account will do. c) Passwords for new accounts should NOT be emailed to remote users UNLESS the email is encrypted. d) The date when the account was issued should be recorded in an audit log or captured electronically. 2) Management of Accounts a) All accounts shall be reviewed at least annually to ensure that access and account privileges are commensurate with job function, need-to- know, and employment status. b) All guest accounts with access to PN network shall contain an expiration date of one year or the work completion date, whichever occurs first. c) Require multi-factor authentication for all user accounts, on all systems, whether managed onsite or by a third-party provider. 3) Account Monitoring a) Maintain an inventory of each of the PN's authentication systems, including those located onsite or at a remote service provider. b) Maintain an inventory of all accounts organized by authentication system. d) Ensure that all accounts have an expiration date that is monitored and enforced. e) Configure access for all accounts through as few centralized points of authentication as possible, including network, security, and cloud systems. c) Establish and follow an automated process for revoking system access by disabling accounts immediately upon termination or change of responsibilities PN personnel. Disabling these accounts, instead of deleting accounts, allows preservation of audit trails. d) Automatically disable dormant accounts after a set period of inactivity. e) Monitor attempts to access deactivated accounts through audit logging. f) Alert when users deviate from normal login behavior, such as time-of-day, workstation location and duration. g) Automatically lock workstation sessions after a standard period of inactivity 4) Administration of Password a) The identity of users must be authenticated before providing them with ID and password details. In addition, it is required that stricter levels of authentication (such as face-to-face) be used for those accounts with privileged access. b) Whenever possible, passkeys should be used to authenticate a user when resetting a password or activating a guest account, and should comply with the abo","routeslip":"","__v":0}
85+{"_id":{"$oid":"5f3e339d66cc3f0590a28a74"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15921217262070","title":"Eclipse IDE.pdf","filename":"/drive/N6B/Naval Letter/Eclipse IDE.pdf","category":"","author":"System","deyt":{"$date":"2019-08-07T05:47:06.069Z"},"size":462145,"content":"Explore the English language on a new scale using AI-powered English language navigator. Setting up Eclipse: Java's popular IDE Summary This tutorial will help you to install JDK (Java Development Kit), setup Eclipse IDE (Integrated development environment) and get started with Java. Keywords: IDE, Eclipse, JDK Downloads First of all you have to download some stuff from the Internet: 1. Download the latest JDK from: http://java.sun.com/javase/downloads/index.jsp 2. Download Eclipse IDE for Java Developers from: http://www.eclipse.org/downloads/ Installation Run JDK installer and follow instructions. After you installed the JDK, unpack eclipse archive somewhere on a disk and run eclipse.exe. Get started with Eclipse Select a workspace If you did previous steps right, you should see the following: You are asked to select a workspace directory, where all of your further projects would be stored. You may leave the default folder or choose another one. It's important to remember this path for future. After you choose the workspace location, press ok and wait a little, while Eclipse is loading. Creating a project Choose File New Java Project from menu. In the \"New Java Project\" window type \"HelloWorld\" in the project name edit box. Then press Finish button. Click with the right button on the HelloWorld project in package explorer. Choose New Class: Name it \"HelloWorld\" and set checker box to create main method stub. Then press Finish button. Type: System.out.println(\"Hello World! I am new to Java.\"); in the main method's body and run HelloWorld with run button: You will see the result in a console window: Your first Java application is ready! We will discuss it in detail in the next article. If you would like to get known more about SEO, site building, webhosting and everything else concerned with running own wesites, we'd recommend you to visit SEO blog. There you find many useful tutorials and tips on various SEO relevant topics. To start your own website check this: how to set up a website. Partners Ads","routeslip":"","__v":0}
86+{"_id":{"$oid":"5f3e339d66cc3f0590a28a75"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15921216758601","title":"Eclipse IDE.pdf","filename":"/drive/N6B/Disposition Form/Eclipse IDE.pdf","category":"","author":"System","deyt":{"$date":"2019-08-07T05:47:06.069Z"},"size":462145,"content":"Explore the English language on a new scale using AI-powered English language navigator. Setting up Eclipse: Java's popular IDE Summary This tutorial will help you to install JDK (Java Development Kit), setup Eclipse IDE (Integrated development environment) and get started with Java. Keywords: IDE, Eclipse, JDK Downloads First of all you have to download some stuff from the Internet: 1. Download the latest JDK from: http://java.sun.com/javase/downloads/index.jsp 2. Download Eclipse IDE for Java Developers from: http://www.eclipse.org/downloads/ Installation Run JDK installer and follow instructions. After you installed the JDK, unpack eclipse archive somewhere on a disk and run eclipse.exe. Get started with Eclipse Select a workspace If you did previous steps right, you should see the following: You are asked to select a workspace directory, where all of your further projects would be stored. You may leave the default folder or choose another one. It's important to remember this path for future. After you choose the workspace location, press ok and wait a little, while Eclipse is loading. Creating a project Choose File New Java Project from menu. In the \"New Java Project\" window type \"HelloWorld\" in the project name edit box. Then press Finish button. Click with the right button on the HelloWorld project in package explorer. Choose New Class: Name it \"HelloWorld\" and set checker box to create main method stub. Then press Finish button. Type: System.out.println(\"Hello World! I am new to Java.\"); in the main method's body and run HelloWorld with run button: You will see the result in a console window: Your first Java application is ready! We will discuss it in detail in the next article. If you would like to get known more about SEO, site building, webhosting and everything else concerned with running own wesites, we'd recommend you to visit SEO blog. There you find many useful tutorials and tips on various SEO relevant topics. To start your own website check this: how to set up a website. Partners Ads","routeslip":"","__v":0}
87+{"_id":{"$oid":"5f3e339d66cc3f0590a28a76"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15921216758614","title":"xEclipse Ide.pdf","filename":"/drive/N6B/Disposition Form/xEclipse Ide.pdf","category":"","author":"System","deyt":{"$date":"2019-08-07T05:47:06.069Z"},"size":462145,"content":"Explore the English language on a new scale using AI-powered English language navigator. Setting up Eclipse: Java's popular IDE Summary This tutorial will help you to install JDK (Java Development Kit), setup Eclipse IDE (Integrated development environment) and get started with Java. Keywords: IDE, Eclipse, JDK Downloads First of all you have to download some stuff from the Internet: 1. Download the latest JDK from: http://java.sun.com/javase/downloads/index.jsp 2. Download Eclipse IDE for Java Developers from: http://www.eclipse.org/downloads/ Installation Run JDK installer and follow instructions. After you installed the JDK, unpack eclipse archive somewhere on a disk and run eclipse.exe. Get started with Eclipse Select a workspace If you did previous steps right, you should see the following: You are asked to select a workspace directory, where all of your further projects would be stored. You may leave the default folder or choose another one. It's important to remember this path for future. After you choose the workspace location, press ok and wait a little, while Eclipse is loading. Creating a project Choose File New Java Project from menu. In the \"New Java Project\" window type \"HelloWorld\" in the project name edit box. Then press Finish button. Click with the right button on the HelloWorld project in package explorer. Choose New Class: Name it \"HelloWorld\" and set checker box to create main method stub. Then press Finish button. Type: System.out.println(\"Hello World! I am new to Java.\"); in the main method's body and run HelloWorld with run button: You will see the result in a console window: Your first Java application is ready! We will discuss it in detail in the next article. If you would like to get known more about SEO, site building, webhosting and everything else concerned with running own wesites, we'd recommend you to visit SEO blog. There you find many useful tutorials and tips on various SEO relevant topics. To start your own website check this: how to set up a website. Partners Ads","routeslip":"","__v":0}
88+{"_id":{"$oid":"5f3e339e66cc3f0590a28a77"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15921217061322","title":"new Eclipse IDE.pdf","filename":"/drive/N6B/Military Letter/new Eclipse IDE.pdf","category":"","author":"System","deyt":{"$date":"2019-08-07T05:47:06.069Z"},"size":462145,"content":"Explore the English language on a new scale using AI-powered English language navigator. Setting up Eclipse: Java's popular IDE Summary This tutorial will help you to install JDK (Java Development Kit), setup Eclipse IDE (Integrated development environment) and get started with Java. Keywords: IDE, Eclipse, JDK Downloads First of all you have to download some stuff from the Internet: 1. Download the latest JDK from: http://java.sun.com/javase/downloads/index.jsp 2. Download Eclipse IDE for Java Developers from: http://www.eclipse.org/downloads/ Installation Run JDK installer and follow instructions. After you installed the JDK, unpack eclipse archive somewhere on a disk and run eclipse.exe. Get started with Eclipse Select a workspace If you did previous steps right, you should see the following: You are asked to select a workspace directory, where all of your further projects would be stored. You may leave the default folder or choose another one. It's important to remember this path for future. After you choose the workspace location, press ok and wait a little, while Eclipse is loading. Creating a project Choose File New Java Project from menu. In the \"New Java Project\" window type \"HelloWorld\" in the project name edit box. Then press Finish button. Click with the right button on the HelloWorld project in package explorer. Choose New Class: Name it \"HelloWorld\" and set checker box to create main method stub. Then press Finish button. Type: System.out.println(\"Hello World! I am new to Java.\"); in the main method's body and run HelloWorld with run button: You will see the result in a console window: Your first Java application is ready! We will discuss it in detail in the next article. If you would like to get known more about SEO, site building, webhosting and everything else concerned with running own wesites, we'd recommend you to visit SEO blog. There you find many useful tutorials and tips on various SEO relevant topics. To start your own website check this: how to set up a website. Partners Ads","routeslip":"","__v":0}
89+{"_id":{"$oid":"5f3e339e66cc3f0590a28a78"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15921216758608","title":"new Eclipse IDE.pdf","filename":"/drive/N6B/Disposition Form/new Eclipse IDE.pdf","category":"","author":"System","deyt":{"$date":"2019-08-07T05:47:06.069Z"},"size":462145,"content":"Explore the English language on a new scale using AI-powered English language navigator. Setting up Eclipse: Java's popular IDE Summary This tutorial will help you to install JDK (Java Development Kit), setup Eclipse IDE (Integrated development environment) and get started with Java. Keywords: IDE, Eclipse, JDK Downloads First of all you have to download some stuff from the Internet: 1. Download the latest JDK from: http://java.sun.com/javase/downloads/index.jsp 2. Download Eclipse IDE for Java Developers from: http://www.eclipse.org/downloads/ Installation Run JDK installer and follow instructions. After you installed the JDK, unpack eclipse archive somewhere on a disk and run eclipse.exe. Get started with Eclipse Select a workspace If you did previous steps right, you should see the following: You are asked to select a workspace directory, where all of your further projects would be stored. You may leave the default folder or choose another one. It's important to remember this path for future. After you choose the workspace location, press ok and wait a little, while Eclipse is loading. Creating a project Choose File New Java Project from menu. In the \"New Java Project\" window type \"HelloWorld\" in the project name edit box. Then press Finish button. Click with the right button on the HelloWorld project in package explorer. Choose New Class: Name it \"HelloWorld\" and set checker box to create main method stub. Then press Finish button. Type: System.out.println(\"Hello World! I am new to Java.\"); in the main method's body and run HelloWorld with run button: You will see the result in a console window: Your first Java application is ready! We will discuss it in detail in the next article. If you would like to get known more about SEO, site building, webhosting and everything else concerned with running own wesites, we'd recommend you to visit SEO blog. There you find many useful tutorials and tips on various SEO relevant topics. To start your own website check this: how to set up a website. Partners Ads","routeslip":"","__v":0}
90+{"_id":{"$oid":"5f3e339f66cc3f0590a28a79"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119534777","title":"corrupt.doc","filename":"/drive/N6C/Signature/corrupt.doc","category":"","author":"System","deyt":{"$date":"2020-03-13T03:38:43.183Z"},"size":14922,"content":"No Content. File Corrupted","routeslip":"","__v":0}
91+{"_id":{"$oid":"5f3e339f66cc3f0590a28a7a"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119534843","title":"Attachment (TEMPLATE) (1).doc","filename":"/drive/N6B/Military Letter/Attachment (TEMPLATE) (1).doc","category":"","author":"System","deyt":{"$date":"2020-07-19T09:38:52.146Z"},"size":167095,"content":"No Content. File Corrupted","routeslip":"","__v":0}
92+{"_id":{"$oid":"5f3e33a366cc3f0590a28a7b"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15921217362633","title":"new Eclipse IDE.pdf","filename":"/drive/N6B/SOP/new Eclipse IDE.pdf","category":"SOP","author":"System","deyt":{"$date":"2019-08-07T05:47:06.069Z"},"size":462145,"content":"Explore the English language on a new scale using AI-powered English language navigator. Setting up Eclipse: Java's popular IDE Summary This tutorial will help you to install JDK (Java Development Kit), setup Eclipse IDE (Integrated development environment) and get started with Java. Keywords: IDE, Eclipse, JDK Downloads First of all you have to download some stuff from the Internet: 1. Download the latest JDK from: http://java.sun.com/javase/downloads/index.jsp 2. Download Eclipse IDE for Java Developers from: http://www.eclipse.org/downloads/ Installation Run JDK installer and follow instructions. After you installed the JDK, unpack eclipse archive somewhere on a disk and run eclipse.exe. Get started with Eclipse Select a workspace If you did previous steps right, you should see the following: You are asked to select a workspace directory, where all of your further projects would be stored. You may leave the default folder or choose another one. It's important to remember this path for future. After you choose the workspace location, press ok and wait a little, while Eclipse is loading. Creating a project Choose File New Java Project from menu. In the \"New Java Project\" window type \"HelloWorld\" in the project name edit box. Then press Finish button. Click with the right button on the HelloWorld project in package explorer. Choose New Class: Name it \"HelloWorld\" and set checker box to create main method stub. Then press Finish button. Type: System.out.println(\"Hello World! I am new to Java.\"); in the main method's body and run HelloWorld with run button: You will see the result in a console window: Your first Java application is ready! We will discuss it in detail in the next article. If you would like to get known more about SEO, site building, webhosting and everything else concerned with running own wesites, we'd recommend you to visit SEO blog. There you find many useful tutorials and tips on various SEO relevant topics. To start your own website check this: how to set up a website. Partners Ads","routeslip":"","__v":0}
93+{"_id":{"$oid":"5f3e33a466cc3f0590a28a7c"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15921217362635","title":"ISSP-Template.pdf","filename":"/drive/N6B/SOP/ISSP-Template.pdf","category":"SOP","author":"System","deyt":{"$date":"2020-02-09T06:40:33.475Z"},"size":1327679,"content":"INFORMATION SYSTEMS STRATEGIC PLAN 2018-2020 Page 1 of 19 PART I. ORGANIZATIONAL PROFILE A. DEPARTMENT/AGENCY VISION / MISSION STATEMENT A.1. Mandate Legal Basis The Department of Information and Communications Technology (DICT) was created through Republic Act No. 10844 \"An Act Creating the Department of Information and Communications Technology, Defining its Powers and Functions, Appropriating Funds Therefore and for Other Purposes\" which was issued on 23 May 2016. Functions A.2. Vision Statement \"An innovative, safe and happy nation that thrives through and is enabled by Information and Communications Technology\" A.3. Mission Statement \"DICT of the People, DICT for the People\". The DICT commits to: Provide every Filipino access to vital ICT infostructure and services; Ensure sustainable growth of Philippine ICT-enabled industries resulting to creation of more jobs; Establish a one digitized government, one nation; Support the National Government in fully achieving its goals; and Make the DICT as the enabler, innovator, achiever, and leader in pushing the country's development and transition towards a world-class digital economy. A.4. Major Final Outputs MFO 1 : Government-wide ICT Policy Services MFO 2 : Technical Advisory Services MFO 3 : ICT Training Services Fill-in Instructions: A.1 - State the legal basis for the creation of the organization and should likewise describe the major functions as indicated/mandated in the legal basis. A.2 - State the wishful projection of the organization into the future; a statement of what your organization wants to become; an intuitive picture of an end state. A.3 - State the organization's scope and operations that assert its basic purpose, specify its principal products/services that set it apart/distinguish it from others. A.4 - Enumerate the MFOs as prescribed in the Organizational Performance Indicator Framework(OPIF). An MFO is a good or service that a department/agency is mandated to deliver to external clients through the implementation of programs, activities and projects. Emphasis should be on the MFOs that are aligned with the Philippine Development Plan's Key Result Areas and the critical indicators and results presented in the PDP Results Matrices. INFORMATION SYSTEMS STRATEGIC PLAN 2018-2020 Page 2 of 19 PART I. ORGANIZATIONAL PROFILE B. DEPARTMENT/AGENCY PROFILE B.1. Name of Designated IS Planner Plantilla Position Organizational Unit E-mail Address Contact Number/s B.2. Current Annual ICT Budget Other Sources of Funds B.3. Organizational Structure Total No. of Employees No. of Regional/Extension Offices (if any) No. of Provincial Offices (if any) No. of Other Offices (e.g. District, Field, etc.) Fill-in Instructions: Provide all data being asked in Part I B.1 to B.3. For those preparing a department-wide ISSP, proceed to Part I Table B-1 page 3. B.1 - Please refer to page ii-c no. 17 for the definition of IS Planner. B.2 - Indicate the Total Annual ICT Budget for the current fiscal year. Other possible sources of funds should be indicated separately. B.3 - Indicate the total number of employees including those on part-time or full-time basis, regular, contractual and casual employees and those assigned to regional/extension, provincial and other offices. Indicate the number of regional offices, provincial offices and other offices, if any. INFORMATION SYSTEMS STRATEGIC PLAN 2018-2020 Page 3 of 19 PART I. ORGANIZATIONAL PROFILE TABLE B-1 (FOR DEPARTMENT-WIDE ORGANIZATIONS ONLY) ORGANIZATIONAL UNIT1 NAME OF AGENCY HEAD2 DESIGNATED IS PLANNER3 NUMBER CURRENT NAME3a PLANTILLA POSITION3b E-MAIL ADDRESS3c CONTACT NUMBER3d OF EMPLOYEES4 ANNUAL ICT BUDGET5 Fill-in Instructions: For each organizational unit: 1 - List all bureaus, attached agencies, and regional/extension/field/provincial offices (if any) under the control and supervision of the department. 2 - Indicate the complete name of the agency head. 3 - Indicate the complete name of the IS Planner of each unit, their respective plantilla position, e-mail address/es and contact number/s. 4 - Indicate the total number of employees to include part-time or full-time basis, regular, contractual and casual employees. 5 - State the Total Annual ICT Budget (as reported per GAA) for the current fiscal year. INFORMATION SYSTEMS STRATEGIC PLAN 2018-2020 Page 4 of 19 PART I. ORGANIZATIONAL PROFILE C. THE DEPARTMENT/AGENCY AND ITS ENVIRONMENT (FUNCTIONAL INTERFACE CHART) Fill-in Instructions: C. Illustrate the agency and its linkages with its clientele, stakeholders, beneficiaries and other organizations/institutions whether in government, private or non-government institutions that greatly help/contribute in the attainment of the agency's MFOs. Refer to Annex A-1 for sample diagram. INFORMATION SYSTEMS STRATEGIC PLAN 2018-2020 Page 5 of 19 PART I. ORGANIZATIONAL PROFILE D. PRESENT ICT SITUATION (STRATEGIC CHALLENGES) Fill-in Instructions: D. Briefly describe in narrative form the current level of computerization of","routeslip":"","__v":0}
94+{"_id":{"$oid":"5f3e33a466cc3f0590a28a7d"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15921217362636","title":"old Eclipse IDE.pdf","filename":"/drive/N6B/SOP/old Eclipse IDE.pdf","category":"SOP","author":"System","deyt":{"$date":"2019-08-07T05:47:06.069Z"},"size":462145,"content":"Explore the English language on a new scale using AI-powered English language navigator. Setting up Eclipse: Java's popular IDE Summary This tutorial will help you to install JDK (Java Development Kit), setup Eclipse IDE (Integrated development environment) and get started with Java. Keywords: IDE, Eclipse, JDK Downloads First of all you have to download some stuff from the Internet: 1. Download the latest JDK from: http://java.sun.com/javase/downloads/index.jsp 2. Download Eclipse IDE for Java Developers from: http://www.eclipse.org/downloads/ Installation Run JDK installer and follow instructions. After you installed the JDK, unpack eclipse archive somewhere on a disk and run eclipse.exe. Get started with Eclipse Select a workspace If you did previous steps right, you should see the following: You are asked to select a workspace directory, where all of your further projects would be stored. You may leave the default folder or choose another one. It's important to remember this path for future. After you choose the workspace location, press ok and wait a little, while Eclipse is loading. Creating a project Choose File New Java Project from menu. In the \"New Java Project\" window type \"HelloWorld\" in the project name edit box. Then press Finish button. Click with the right button on the HelloWorld project in package explorer. Choose New Class: Name it \"HelloWorld\" and set checker box to create main method stub. Then press Finish button. Type: System.out.println(\"Hello World! I am new to Java.\"); in the main method's body and run HelloWorld with run button: You will see the result in a console window: Your first Java application is ready! We will discuss it in detail in the next article. If you would like to get known more about SEO, site building, webhosting and everything else concerned with running own wesites, we'd recommend you to visit SEO blog. There you find many useful tutorials and tips on various SEO relevant topics. To start your own website check this: how to set up a website. Partners Ads","routeslip":"","__v":0}
95+{"_id":{"$oid":"5f3e33a466cc3f0590a28a7e"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15921217362631","title":"SOP Nr 30 dtd 09 Dec 2011 - PN Website Management.pdf","filename":"/drive/N6B/SOP/SOP Nr 30 dtd 09 Dec 2011 - PN Website Management.pdf","category":"SOP","author":"System","deyt":{"$date":"2019-03-15T05:39:42.265Z"},"size":327743,"content":"O/N6/0/TNA RJ;.§IR!CIJ;.D PUNONGHIMPILAN HUKBONG DAGAT NG PILIPINAS (Headquarters Philippine Navy) AMB:EBLJR:LCM:efv:mglf-6416 Naval Station Jose V Andrada 2335 Pres. M. Roxas Boulevard, Manila 09 December 2011 STANDARD OPERATING PROCEDURE NUMBER ' . . 30 PN WEBSITE MANAGEMENT 1. REFERENCE§: a. Handbook on PN Web Management. b. SOP Nr 14 HPN dtd 08 April 2009, Subject: Utilization of PN IT'facilities 2. PURPOSE: This policy provides the guidelines and procedures ih the development, administration, utilization, sustainment and fur\\her enhancement of Philippine ~avy websites. 3. SCOPE: This publication covers the provisions for the administration, revision and updating of the information Eind <;:ontents of all websites managed by the PN. 4. DEFINITION: a. Administrator - the super user or root that has a special user account used for maintaining aridoj:>eriilifng acomputer system. b. Audit Trail or Audit Log - is a chronological sequence of audit records, each of which contains evidence directing pertaining to and resulting from the execution of a business process or system function. c. Stonten,. Management System (CMS) - is an application software developed for facilitating the maintenance of the content and not the design of a web· site. A \"blogging tool\" is an example of a Content Management System. d. cPANEL - a popular web-based administration tool used by the host providers, the PN in this particular case, to allow users (PN units) to configure their own websites using an easy-to-useinterface. e. Filip Transfer Protocol (FTP) - is rather predictably, a client-server protocol for transferring files. It is one WaY to download files, and the most common way to upload files to a server. An FTP cl,ient is a progrlim which can download files from, or uplq/ild files to, an FTP server. f. NetWork Administrator - is responsible for the maintenance of cbmputer hardware that c;omprises a computer network. This normally includes deployment, configuring, maintaining and monitoring active network equipment. g. Philippine Navy Websites - are sites published by organizational units that present or represent the PN's official\"academic, research andlor administrative programs, plans, andlor policies. Such pages are sponsored or sanctioned by the Command and are linked through the \"Cqntayts\" button of the official PN website. The physic/ill location or ownership of the web server(s) from which such pages are served does not alter their status as official pages.. RE§IR!'cIEQ (Page 1 of 10) Rg.§IR!CIgD SOP Nr 30 HPN dtd 09 Dec 11 cont'n: h. Web Admin - is C!lso the Web M@ster and Systems Administrator. i. Web Hosting - a hosting arrangement in which a web host (often an internet service provider) maintains clients' websites on its computers and provides related services. These services may include leaSing of hard diSk space, maintenance of hardware and software, provision of baCkup and security, content integrity, email boxes, and high speed internet connection. j. Web Master- is also the Web Admin and System Administrator; a person responsible for maintaining one or many websites. The duties of the web master may include ensuring that the web servers, hC!rdw;;lre and software are operating accurli!tely, designing the webSite, generating and revising web pages, replyi'lg to user comments, and examining the traffic through the site. Core responsjpilities of the web ma!1ter may include the regulation and management of access rights of different users of a websites as well as the appearance and setting up of website navigation. eontent placement can be part of a webmaster's responsibilities, while content creation may not be. Some webmasters of larger sites may also deal with heavy volumes 'of email, which are often questions related to the content on the websites or general compuh~r-relfited inquiries. . k. Web Page - pages containing specific information that comprises the website. I. Web Site - a collection of web pages or related websites that has a coherent purpose and is managed by one person or group. Aweb page is a unit of information delivered to a user in a format intended for display in a web browser or web appliance. m. Website Content Manager - in charge of faCilitating the maintenance of the content but not the deSign oriii web site. n. .Server - a computer that serves as the central repository of PN websites data that provides information requested by client computers installed in offices. o.SystemsAdministrator - is also the Web Master and Web Admin; a person that maintains and operates a computer system. Other duties may include scripting of light programming, prqjeqt management for systems-reli;lted projects, supervising or training computer operators, <lnd serves as consultant for computer prOblems beyond the knowledge of technical support staff. 5. POLICIES: a. The Command shall have the prerogative and control over the establishment of websiteswithin the PN. b. All official domain for all .PN websites shal","routeslip":"","__v":0}
96+{"_id":{"$oid":"5f3e33a466cc3f0590a28a7f"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15921217362641","title":"what ISSP-Template.pdf","filename":"/drive/N6B/SOP/what ISSP-Template.pdf","category":"SOP","author":"System","deyt":{"$date":"2020-02-09T06:40:33.475Z"},"size":1327679,"content":"INFORMATION SYSTEMS STRATEGIC PLAN 2018-2020 Page 1 of 19 PART I. ORGANIZATIONAL PROFILE A. DEPARTMENT/AGENCY VISION / MISSION STATEMENT A.1. Mandate Legal Basis The Department of Information and Communications Technology (DICT) was created through Republic Act No. 10844 \"An Act Creating the Department of Information and Communications Technology, Defining its Powers and Functions, Appropriating Funds Therefore and for Other Purposes\" which was issued on 23 May 2016. Functions A.2. Vision Statement \"An innovative, safe and happy nation that thrives through and is enabled by Information and Communications Technology\" A.3. Mission Statement \"DICT of the People, DICT for the People\". The DICT commits to: Provide every Filipino access to vital ICT infostructure and services; Ensure sustainable growth of Philippine ICT-enabled industries resulting to creation of more jobs; Establish a one digitized government, one nation; Support the National Government in fully achieving its goals; and Make the DICT as the enabler, innovator, achiever, and leader in pushing the country's development and transition towards a world-class digital economy. A.4. Major Final Outputs MFO 1 : Government-wide ICT Policy Services MFO 2 : Technical Advisory Services MFO 3 : ICT Training Services Fill-in Instructions: A.1 - State the legal basis for the creation of the organization and should likewise describe the major functions as indicated/mandated in the legal basis. A.2 - State the wishful projection of the organization into the future; a statement of what your organization wants to become; an intuitive picture of an end state. A.3 - State the organization's scope and operations that assert its basic purpose, specify its principal products/services that set it apart/distinguish it from others. A.4 - Enumerate the MFOs as prescribed in the Organizational Performance Indicator Framework(OPIF). An MFO is a good or service that a department/agency is mandated to deliver to external clients through the implementation of programs, activities and projects. Emphasis should be on the MFOs that are aligned with the Philippine Development Plan's Key Result Areas and the critical indicators and results presented in the PDP Results Matrices. INFORMATION SYSTEMS STRATEGIC PLAN 2018-2020 Page 2 of 19 PART I. ORGANIZATIONAL PROFILE B. DEPARTMENT/AGENCY PROFILE B.1. Name of Designated IS Planner Plantilla Position Organizational Unit E-mail Address Contact Number/s B.2. Current Annual ICT Budget Other Sources of Funds B.3. Organizational Structure Total No. of Employees No. of Regional/Extension Offices (if any) No. of Provincial Offices (if any) No. of Other Offices (e.g. District, Field, etc.) Fill-in Instructions: Provide all data being asked in Part I B.1 to B.3. For those preparing a department-wide ISSP, proceed to Part I Table B-1 page 3. B.1 - Please refer to page ii-c no. 17 for the definition of IS Planner. B.2 - Indicate the Total Annual ICT Budget for the current fiscal year. Other possible sources of funds should be indicated separately. B.3 - Indicate the total number of employees including those on part-time or full-time basis, regular, contractual and casual employees and those assigned to regional/extension, provincial and other offices. Indicate the number of regional offices, provincial offices and other offices, if any. INFORMATION SYSTEMS STRATEGIC PLAN 2018-2020 Page 3 of 19 PART I. ORGANIZATIONAL PROFILE TABLE B-1 (FOR DEPARTMENT-WIDE ORGANIZATIONS ONLY) ORGANIZATIONAL UNIT1 NAME OF AGENCY HEAD2 DESIGNATED IS PLANNER3 NUMBER CURRENT NAME3a PLANTILLA POSITION3b E-MAIL ADDRESS3c CONTACT NUMBER3d OF EMPLOYEES4 ANNUAL ICT BUDGET5 Fill-in Instructions: For each organizational unit: 1 - List all bureaus, attached agencies, and regional/extension/field/provincial offices (if any) under the control and supervision of the department. 2 - Indicate the complete name of the agency head. 3 - Indicate the complete name of the IS Planner of each unit, their respective plantilla position, e-mail address/es and contact number/s. 4 - Indicate the total number of employees to include part-time or full-time basis, regular, contractual and casual employees. 5 - State the Total Annual ICT Budget (as reported per GAA) for the current fiscal year. INFORMATION SYSTEMS STRATEGIC PLAN 2018-2020 Page 4 of 19 PART I. ORGANIZATIONAL PROFILE C. THE DEPARTMENT/AGENCY AND ITS ENVIRONMENT (FUNCTIONAL INTERFACE CHART) Fill-in Instructions: C. Illustrate the agency and its linkages with its clientele, stakeholders, beneficiaries and other organizations/institutions whether in government, private or non-government institutions that greatly help/contribute in the attainment of the agency's MFOs. Refer to Annex A-1 for sample diagram. INFORMATION SYSTEMS STRATEGIC PLAN 2018-2020 Page 5 of 19 PART I. ORGANIZATIONAL PROFILE D. PRESENT ICT SITUATION (STRATEGIC CHALLENGES) Fill-in Instructions: D. Briefly describe in narrative form the current level of computerization of","routeslip":"","__v":0}
97+{"_id":{"$oid":"5f3e33a466cc3f0590a28a80"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15921217362638","title":"Philippine Navy NICTS.pdf","filename":"/drive/N6B/SOP/Philippine Navy NICTS.pdf","category":"SOP","author":"System","deyt":{"$date":"2020-02-13T07:36:35.003Z"},"size":411979,"content":"09 January 2019 Nelson Maligro, ON6 Philippine Navy Via email: nelsonmaligro@gmail.com Dear Sir: Thank you for meeting with us last November 2018 to discuss your document management requirements. May we take this opportunity to summarize the Globodox DMS objectives discussed during the meeting: 1. To respond quickly to the search/retrieval of records. Globodox DMS provides several search methods including the retrieval of records by indices or by a document's content, very similar to how a search and retrieve is made in Yahoo or Google. 2. To demonstrate office efficiency. Retrieval of records can be by school name, by teacher's name such as last name, first name, middle name, locality, and other fields. FMWC would like to define. Globodox DMS provides simple and advance search functions. 3. To have a backup of records electronically. Electronic records (scanned civil registry images, Microsoft Office files, email, and other forms of electronic files) placed into Globodox DMS can be copied into external medias to serve as a backup of original paper and office records. 4. To maintain disaster recovery measures in times of fire, rain, and earthquakes. In case of disaster, Globodox DMS can utilize these external disks/CDs and recreate the server database for business continuity. Floro International Corporation Unit 717B, ACG Buding Shaw Boulevard, Wack Wack, Mandaluyong Phone 533-2584 Fax: 654-7215 email: floro@floro-intl.com www.floro-intl.com, www.digitizingdocuments.com 2000-001 5. To relieve employees from clerical activities such as searching, retrieving and printing. 6. To provide security of original documents. Paper documents do not need to be accessed, thereby minimizing loss or misfiled documents though the use of Globodox DMS. Moreover, minimizing the handling of paper documents minimizes the wear and tear caused by handling. 7. To provide transfer of technology to the employees of FMWC through training and implementation of the Globodox DMS system. We have also enclosed our proposal for your request of 10 full license and 9 viewing license for the Globodox Standard version. Please feel free to let us know of areas that need further clarification. Sincerely, Patricia Ann Floro Vice President, Business Systems Floro International Corporation I. Financial Summary Globodox Standard version Globodox Standard for ten (10) full concurrent license P 625,000.00 (@P62,500 per full license) Nine (9) view concurrent license P 195,000.00 (@P65,000 per 3 view) ------------------ P 820,000.00 Less Package Discount ( 210,000.00 ) ------------------ Total Globodox Standard Package for 10 full + 9 view P 610,000.00 Installation and Training (2 days) P 15,000.00 ========== Total Globodox Standard for 10 full + 9 view P 625,000.00 Concurrent license Globodox Notes: Globodox can have a variety of \"full\" user and \"view\" user license configuration. \"Full User license\" allows users to index (add), modify, delete, search, view, and print simultaneously. \"View only User License\" means the user can search, view, and print but cannot add, edit, or delete records. Server, Workstations & Networked Environment to be provided by Philippine Navy Proposed DMS software: Globodox DMS (Standard or Suite version) on centralized PC or Server with 10 full concurrent license and 9 view Proposed Setup Proposed Scanner Avision AD230 or Canon DR-C240 Financial Summary (continuation) B. Scanner Options Avision AD230 P 35,000.00 Fast, 40ppm /80ipm scanning in color, grayscale and monochrome (200 dpi) Fast, 30ppm / 60ipm scanning in color, grayscale and monochrome (300 dpi ) Max. document width up to 9.5 in. (242 mm) Robust 80-page automatic document feeder Hard and embossed card scanning up to 1.25 mm in thickness in portrait or landscape feeding Long page scanning up to 3000 mm (118\") Optical resolution: 600 dpi Daily duty cycle up to 6,000 sheets Canon DR-C240 P 47,000.00 Automatic Document Feeder Scanner with Card/Passport/folded document scanning 45 pages per minute (Bitonal/grayscale), 30 pages per minute (color) Scan width: 2.0 - 8.5\", length: 2.8\" – 14.0\"; long document up to 39.4\" Optical resolution: 600 dpi Daily duty cycle up to 4,000 scans Please refer to brochure of respective scanners for more details Prices includes: 1. Value Added Tax is inclusive on all prices and valid until 15 February 2019. 2. Delivery of CDs containing installation programs, e-manuals; 3. Training onsite (Metro Manila) is for up to 6 personnel. 4. Video training material on how to scan, index, search, etc. 5. Globodox license is perpetual and includes a one year software maintenance agreement (SMA) comprising of on-site or remote support, and software upgrades that may occur throughout the year. Extension of the SMA is optional and retroactive. 6. Limited Warranty of Avision and Canon products of one year excluding consumable parts such as scanner feed rollers and feed mechanisms. II. Globodox DMS Features A. Functionality Features of Globodox Standard Vers","routeslip":"","__v":0}
98+{"_id":{"$oid":"5f3e33b066cc3f0590a28a81"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677503","title":"Cyber Bulletin Nr 2020 14 - North Korea Attack.docx.txt","filename":"/drive/textML/DN6/Cyber Bulletin Nr 2020 14 - North Korea Attack.docx.txt","category":"","author":"System","deyt":{"$date":"2020-07-28T15:03:56.729Z"},"size":1494,"content":" PUNONGHIMPILAN HUKBONG DAGAT NG PILIPINAS (Headquarters Philippine Navy) Office of the AC of NS for C4lSR Systems, N6 Naval Station Jose Andrada 2335 Roxas Boulevard, Manila CYBERSECURITY BULLETIN: 2020-14 Web Skimming Magecart Attack Sourced from: https://www.zdnet.com/article/north-korean-hackers-Iinked-to-web-skimming- magecart—attacks—report—says/ - . -.-I. -. - - .'—.r._-_-+_- ' \"-3.5% '\"'I'L'I.\"'. North Korea's state-sponsored hacking crews are breaking into online stores to insert malicious code that can steal buyers' payment card details as they visit the checkout page and fill in payment forms. Attacks on online stores have been going on since May 2019, said Dutch cyber-security firm SanSec in a report published today. These types of attacks are named \"web skimming,\" \"e—skimming,\" or \"Magecart attack,\" with the last name coming from the name of the first group who engaged in such tactics. Web skimming attacks are simple in nature, although they require advanced technical skills from hackers to execute. The goal is for hackers to gain access to a web store's backend server, associated resources, or third-party widgets, where they can install and run malicious code on the store's frontend. The code loads only on the check out page, and silently logs payment card details as they're entered into checkout forms. This data is then exfiltrated to a remote server, from where hackers collect it and sell it on underground cybercrime markets. ","routeslip":"","__v":0}
99+{"_id":{"$oid":"5f3e33b066cc3f0590a28a82"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677504","title":"CRA Checklist_Answers.docx.txt","filename":"/drive/textML/Disposition Form/CRA Checklist_Answers.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-21T03:23:52.449Z"},"size":1398,"content":" CRA Checklist (for PN Only) Resource Person for the Vulnerability Management: Sgt Rigos Critical Security Controls Policies Tools Reports CSC 4 — Vulnerability Mgmt Sgt Esparagoza Utilize VA tools Implementation - Nessus Pro Weekly Conduct of Compare VA results and prioritize remediation Assigned to cyber group but during resolution it shared among person VA...generated report is submitted Resolved with the stakeholder/ programmer on the reports of the NESSUS and submitted to the ISO and ISNCO Software Update and Patch Mgmt Con gured WSUS System in the AD in the same server. CSC 8 - Data Recovery Sgt Gonzales Ensure all system data are Draft Policy to Backup and Reports on automatically and regularly backup backup Recovery conducted backup Software Backup as complete system Cloning or (imaging) imaging software CSC 14 — Monitoring and Audit of Logs Enable Logging and NTP Policy on Logs and NTP server and Reports on Network Network Monitoring check logs Monitoring as Review of Logs to identify IDS or any generated by the anomalies Network SIEM or IDS Monitoring Log collection and Deployment of SIEM SIEM CSC 18 — Incident Response and Mgmt Ensure incident response plan CERT Policy AAR on cyber incidents Devise a mechanism for the Policy pertaining to Trouble Ticketing Reports from the reporting of any anomalies reporting of System or Hotline end users ","routeslip":"","__v":0}
100+{"_id":{"$oid":"5f3e33ba66cc3f0590a28a83"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677537","title":"NOC DF.pdf.txt","filename":"/drive/textML/Disposition Form/NOC DF.pdf.txt","category":"","author":"System","deyt":{"$date":"2020-04-26T14:05:12.278Z"},"size":1421,"content":" EH8 IV}-I V Y.' FFOIGCIIFIQ rne CD63, OECUFIHQ OUT I\"'UIU!'E-3*\" DISPOSITION FORM SECURITY CLASSIFICATION (IF ANY) File Number: Subject: Conduct of 1ST Quarter Test Firing of Naval Gun NOCB-0120- DIS of PC118. TO: VCOM, PN FROM: CNS DATE: COMMENT NR: N6 /9156 men SUMMARY: 1. References: a. CPF Radio Message Cite F30-0120- 011. b. HPN SOP Nr 02 re Test Firing of Naval Guns dated 21 Jan 20 2. Per reference _a_, the Commander, Philippine Fleet (CPF) is requesting clearance for the conduct of 15* Quarter Test Firing of Naval Guns of BRP EMILIO LIWANAG (PC118) on dates and maritime areas indicated: TYPE OF COORDINATES VESSEL GUN DATE VICINITY Pt. A - Lat 05\" 24.000' N Long 124\" 55.000' E 40MM AA . Pt. 3- Lat 05° 24.000: N BRP EM\"\"O Gun 11-12 Mar V'° 18 NM SW \"ff Long 125* 10.000' E LIWANAG 2020 Baiut Island, Davao (PC118) Occidental Pt C_ Lat 05., 08000, N Long 125° 10.000' E Pt. D- Lat 05\" 08.000' N Long 124° 55.000' E 3. Per coordination made with CG8, PCG, the issuance and publication of Notice to All Mariners (NOTAM) requires seven (7) days prior to the scheduled test firing activity. RECOMMENDATIONS: 4. VCOM, PN approval on the following: a. Request of CPF for the conduct of 15' Quarter Test Firing of Naval Gun of PC118. b. Authority for DNOC to release the radio message addressed to the Commandant, PCG forthe issuance of NOTAM. (Enci) DELACRUZ ","routeslip":"","__v":0}
101+{"_id":{"$oid":"5f3e33ba66cc3f0590a28a84"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677520","title":"Itemized Expenditure of the File Server.docx.txt","filename":"/drive/textML/Disposition Form/Itemized Expenditure of the File Server.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-21T03:40:18.632Z"},"size":257,"content":" Itemized Expenditure of the File Server Items Amount DVD Recordable Disk 375.00 UTP Cable 5,400.00 Less UTP -500.00 Hard Disk (1TB x 2) 4,500.00 DLINK Gigabit switch (Metal case) 3,800.00 RJ45, Crimping tool, Mouse, USB disk 1,308.00 Total P 14,883.00 ","routeslip":"","__v":0}
102+{"_id":{"$oid":"5f3e33ba66cc3f0590a28a85"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677514","title":"CRA Checklist_Answers2.docx.txt","filename":"/drive/textML/Disposition Form/CRA Checklist_Answers2.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-21T04:08:57.625Z"},"size":1398,"content":" CRA Checklist (for PN Only) Resource Person for the Vulnerability Management: Sgt Rigos Critical Security Controls Policies Tools Reports CSC 4 — Vulnerability Mgmt Sgt Esparagoza Utilize VA tools Implementation - Nessus Pro Weekly Conduct of Compare VA results and prioritize remediation Assigned to cyber group but during resolution it shared among person VA...generated report is submitted Resolved with the stakeholder/ programmer on the reports of the NESSUS and submitted to the ISO and ISNCO Software Update and Patch Mgmt Con gured WSUS System in the AD in the same server. CSC 8 - Data Recovery Sgt Gonzales Ensure all system data are Draft Policy to Backup and Reports on automatically and regularly backup backup Recovery conducted backup Software Backup as complete system Cloning or (imaging) imaging software CSC 14 — Monitoring and Audit of Logs Enable Logging and NTP Policy on Logs and NTP server and Reports on Network Network Monitoring check logs Monitoring as Review of Logs to identify IDS or any generated by the anomalies Network SIEM or IDS Monitoring Log collection and Deployment of SIEM SIEM CSC 18 — Incident Response and Mgmt Ensure incident response plan CERT Policy AAR on cyber incidents Devise a mechanism for the Policy pertaining to Trouble Ticketing Reports from the reporting of any anomalies reporting of System or Hotline end users ","routeslip":"","__v":0}
103+{"_id":{"$oid":"5f3e33be66cc3f0590a28a86"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677544","title":"test-dis-1.docx.txt","filename":"/drive/textML/Disposition Form/test-dis-1.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-12T05:08:15.86Z"},"size":1194,"content":" Taal Vista Hotel Reservation Confirmation Dear Mr. Maligro, Thank you for choosing Taal Vista Hotel. We are pleased to confirm your reservation as detailed below. Reservation Details Con rmation Number Guest Name Arrival Date Departure Date Number of Nights Number of Guest Room Type Nightly Rate Guaranteed Method Breakfast Grand Total Check-in Time Check-out Time 1054480 Mr. Nelson Maligro 25 September 2019 27 September 2019 2 1 Adult 1 Premier King Lake Wing Bldg. Premier at PHP 8,9250.00 Room rates per night are inclusive of VAT, service charge, and local government tax. Your reservation is on a TENTATIVE status. **P\"ease deposit FULL payment on/before August 23, 2019 (until 4PM) . ** AUTO CANCEL IF UNSETTLED ON THE GIVEN OPTION DATE ** Payment is non refundable Bank Name: Any BANCO DE ORO branch Account Name: SM PRIME HOLDINGS INC — TAAL VISTA HOTEL Reference Number: F\"T0000007463 Account Number: 1500009073 A copy of the deposit slip must be sent thru email at reservations@taa\"vistahote\".com. Buffet Breakfast is included PHP 17,900.00 Total amount per stay are inclusive of VAT, service charge, and local government tax. 02:00 PM 12:00 NN ","routeslip":"","__v":0}
104+{"_id":{"$oid":"5f3e33be66cc3f0590a28a87"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677528","title":"Dear Mrs.docx.txt","filename":"/drive/textML/Disposition Form/Dear Mrs.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-21T04:11:54.041Z"},"size":1390,"content":" INTERNATIONAL RESEARCH CONFERENCE IN COMPUTING, ENGINEERING, EDUCATION AND EDUCATION TECHNOLOGY (IRCCEEE 2020) January 5*-10, 2iIi2iIi at LA PIAZZA HCITELAND CONVENTION CENTER, Imelda Reeea Ave,Lega2piCity,Pi1i\"ippinee [All presented and aeeepted papers will he published in SCOPUS indexed pr REFEREEDjdLIrna\"] Dear Mr. Nelson Maligro: Paper Title: Secured Instant Messaging Application using Hybrid Encryption Algorithm We are pleased to inform you that your paper has been accepted for ORAL PRESENTATION in INTERNATIONAL RESEARCH CONFERENCE IN COMPUTING, ENGINEERING, EDUCATION AND EDUCATION TECHNOLOGY (IRCCEEE 2020) which will be held on January 9-10, 2020 at LA PIAZZA HOTEL AND CONVENTION CENTER, Imelda Roces Ave, Legazpi City, Philippines. This email also served as notification for publication in Scopus-indexed journal. Please find reviewer's comments below for the basis of your revisions. Additional instruction will be given to you during the conference for the publication instruction. Please revise your paper according to reviewer's comments and make sure that the similarity index using turnitinlithenticate or any reliable plagiarism software will not exceed 15%. Please visit wvvw.irccee2020.com for more announcement and updates. We are looking forward to meeting you at the conference. Respectfully yours, Organizing and Technical Committee of IRCCEE 2019 ","routeslip":"","__v":0}
105+{"_id":{"$oid":"5f3e33bf66cc3f0590a28a88"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677545","title":"VLAN Routed.doc.txt","filename":"/drive/textML/Disposition Form/VLAN Routed.doc.txt","category":"","author":"System","deyt":{"$date":"2020-04-29T02:55:17.239Z"},"size":1583,"content":" Eile Edit Eiei.-.-' Histor-_..-' u::n::i:rnarl-.._s. lools elp Horne \" F-'hilippine Air Force X Wu:::u'-.-'-.-'za Snearning Engine -1 S X Log in I'-iessus Essentials Folnzrie X QNPEECIDZE — '-A-'er: Image M: X e II3u::.n:::ug\"e <- 0' 'Q G) 10.0. 1 I.' :_'.-'-:: 3 I -'.F-'a-: i'i:~:.r;-:;Ii \"' '3' '£1' E i\"i\\ ED 5 B X 0 Q5 5 E C:\\W\"i\\\"DOWS\\systern32\\crnd.exe — D X H Login Web\"mage Mgnitor Default Gateway . . . . . . . . . Home Home wireless LAN adapter Local Area Connection' 3: Sh A D m entserver Media State . . . . . . . . . . . : Media disconnected Status Devmeln o Counter Inquky Connection-specific DNS Suffix . Fax Received F e . _ Ethernet adapter Bluetooth Network Connection: P nten P ntJobS I Devmelvame. NRGIWPZSSO J b I Locahon Media State . . . . . . . . . . : Media disconnected O I C°\"\"\"e\"t 3 Connection-specific DNS Suffix Configuration I Host Name : RNPEEOD2E wireless LAN adapter wi-Fi: Connection-specific DNS Suffix : Link-local IPv6 Address . . . : feae::S8c2:de1:ac27:133f%4 IPV4 Address. . . . . . . . . : 16.6.18.165 Subnet Mask . . . . . . . . . : 255.255.255.6 Default Gateway . . . . . . . : 16.6.18.1 Status C:\\Users\\zoe>tracert 16.6.13.179 Pnnter Ready P nte Tracing route to 16.6.13.179 over a maximum of 36 hops Comer Ready 1 156 ms 212 ms 253 ms 16.6.18.1 Fax ReadY 2 1B.6.18.1 reports: Destination host unreachable. Scanner Ready Trace complete C:\\Users\\zoe> Toner - __ 2:10 PM E 0 TYPE here to search I %' a é H : i\" U\") 5f22f2U19 % ","routeslip":"","__v":0}
106+{"_id":{"$oid":"5f3e33bf66cc3f0590a28a89"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677554","title":"test-dis-2.docx.txt","filename":"/drive/textML/Disposition Form/test-dis-2.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-12T05:10:02.249Z"},"size":1194,"content":" Taal Vista Hotel Reservation Confirmation Dear Mr. Maligro, Thank you for choosing Taal Vista Hotel. We are pleased to confirm your reservation as detailed below. Reservation Details Con rmation Number Guest Name Arrival Date Departure Date Number of Nights Number of Guest Room Type Nightly Rate Guaranteed Method Breakfast Grand Total Check-in Time Check-out Time 1054480 Mr. Nelson Maligro 25 September 2019 27 September 2019 2 1 Adult 1 Premier King Lake Wing Bldg. Premier at PHP 8,9250.00 Room rates per night are inclusive of VAT, service charge, and local government tax. Your reservation is on a TENTATIVE status. **P\"ease deposit FULL payment on/before August 23, 2019 (until 4PM) . ** AUTO CANCEL IF UNSETTLED ON THE GIVEN OPTION DATE ** Payment is non refundable Bank Name: Any BANCO DE ORO branch Account Name: SM PRIME HOLDINGS INC — TAAL VISTA HOTEL Reference Number: F\"T0000007463 Account Number: 1500009073 A copy of the deposit slip must be sent thru email at reservations@taa\"vistahote\".com. Buffet Breakfast is included PHP 17,900.00 Total amount per stay are inclusive of VAT, service charge, and local government tax. 02:00 PM 12:00 NN ","routeslip":"","__v":0}
107+{"_id":{"$oid":"5f3e33bf66cc3f0590a28a8a"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677586","title":"CRA Checklist_Answers-x.docx.txt","filename":"/drive/textML/LOI/CRA Checklist_Answers-x.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-21T03:18:02.253Z"},"size":1398,"content":" CRA Checklist (for PN Only) Resource Person for the Vulnerability Management: Sgt Rigos Critical Security Controls Policies Tools Reports CSC 4 — Vulnerability Mgmt Sgt Esparagoza Utilize VA tools Implementation - Nessus Pro Weekly Conduct of Compare VA results and prioritize remediation Assigned to cyber group but during resolution it shared among person VA...generated report is submitted Resolved with the stakeholder/ programmer on the reports of the NESSUS and submitted to the ISO and ISNCO Software Update and Patch Mgmt Con gured WSUS System in the AD in the same server. CSC 8 - Data Recovery Sgt Gonzales Ensure all system data are Draft Policy to Backup and Reports on automatically and regularly backup backup Recovery conducted backup Software Backup as complete system Cloning or (imaging) imaging software CSC 14 — Monitoring and Audit of Logs Enable Logging and NTP Policy on Logs and NTP server and Reports on Network Network Monitoring check logs Monitoring as Review of Logs to identify IDS or any generated by the anomalies Network SIEM or IDS Monitoring Log collection and Deployment of SIEM SIEM CSC 18 — Incident Response and Mgmt Ensure incident response plan CERT Policy AAR on cyber incidents Devise a mechanism for the Policy pertaining to Trouble Ticketing Reports from the reporting of any anomalies reporting of System or Hotline end users ","routeslip":"","__v":0}
108+{"_id":{"$oid":"5f3e33c266cc3f0590a28a8b"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677598","title":"CRA Checklist_Answers.docx.txt","filename":"/drive/textML/LOI/CRA Checklist_Answers.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-21T03:15:29.188Z"},"size":1398,"content":" CRA Checklist (for PN Only) Resource Person for the Vulnerability Management: Sgt Rigos Critical Security Controls Policies Tools Reports CSC 4 — Vulnerability Mgmt Sgt Esparagoza Utilize VA tools Implementation - Nessus Pro Weekly Conduct of Compare VA results and prioritize remediation Assigned to cyber group but during resolution it shared among person VA...generated report is submitted Resolved with the stakeholder/ programmer on the reports of the NESSUS and submitted to the ISO and ISNCO Software Update and Patch Mgmt Con gured WSUS System in the AD in the same server. CSC 8 - Data Recovery Sgt Gonzales Ensure all system data are Draft Policy to Backup and Reports on automatically and regularly backup backup Recovery conducted backup Software Backup as complete system Cloning or (imaging) imaging software CSC 14 — Monitoring and Audit of Logs Enable Logging and NTP Policy on Logs and NTP server and Reports on Network Network Monitoring check logs Monitoring as Review of Logs to identify IDS or any generated by the anomalies Network SIEM or IDS Monitoring Log collection and Deployment of SIEM SIEM CSC 18 — Incident Response and Mgmt Ensure incident response plan CERT Policy AAR on cyber incidents Devise a mechanism for the Policy pertaining to Trouble Ticketing Reports from the reporting of any anomalies reporting of System or Hotline end users ","routeslip":"","__v":0}
109+{"_id":{"$oid":"5f3e33c266cc3f0590a28a8c"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677607","title":"Itemized Expenditure of the File Server.docx.txt","filename":"/drive/textML/LOI/Itemized Expenditure of the File Server.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-21T03:43:38.337Z"},"size":257,"content":" Itemized Expenditure of the File Server Items Amount DVD Recordable Disk 375.00 UTP Cable 5,400.00 Less UTP -500.00 Hard Disk (1TB x 2) 4,500.00 DLINK Gigabit switch (Metal case) 3,800.00 RJ45, Crimping tool, Mouse, USB disk 1,308.00 Total P 14,883.00 ","routeslip":"","__v":0}
110+{"_id":{"$oid":"5f3e33c266cc3f0590a28a8d"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677585","title":"Brief Description of the General Function of.docx.txt","filename":"/drive/textML/LOI/Brief Description of the General Function of.docx.txt","category":"","author":"System","deyt":{"$date":"2020-01-26T07:51:47.716Z"},"size":1227,"content":" Brief Description of the General Function of Information Technology Officer (ITO) ll: Formulate plans, policies, and manage IT infrastructure and cyber security controls; supervise the activities of subordinate analyst, researcher, programmer, and technologist in the conduct of systems development and maintenance of computers and IT networks. Specific Duties and Responsibilities: 1. Develop, review, and update the PN cyber security and information system policies and procedures. 2. Develop, review, and update the PN Information Systems Strategic Plan USSP) 3. Oversees the activities of subordinate analyst, and programmers in the development of information systems. 4. Oversees the activities of subordinate technologist in the conduct of preventive and corrective maintenance of computers and networks. 5. Evaluate and facilitate the fund request of PN units pertaining to Information and Communication Technology hardware and software. 6. Oversees the implementation of all funded ICT projects of the PN including cyber security controls, network infrastructure, and information systems. 7. Provides technical advice to superior officers on matters pertaining to information technology and cyber security. ","routeslip":"","__v":0}
111+{"_id":{"$oid":"5f3e33c266cc3f0590a28a8e"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677617","title":"LastActivity.txt.txt","filename":"/drive/textML/LOI/LastActivity.txt.txt","category":"","author":"System","deyt":{"$date":"2020-04-25T14:35:02.711Z"},"size":1,"content":" ","routeslip":"","__v":0}
112+{"_id":{"$oid":"5f3e33c266cc3f0590a28a8f"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677602","title":"Bibliography 14Feb2019.docx.txt","filename":"/drive/textML/LOI/Bibliography 14Feb2019.docx.txt","category":"","author":"System","deyt":{"$date":"2020-05-21T00:13:43.284Z"},"size":1729,"content":" BIBLIOGRAPHY Books Price, J ., & Gunderloy, M. (n.d.). Masteringm Visual C#TM.NET. Carpenter, T. (2012). Microsoft Windows Operating System Essentials. John Wiley & Sons, Inc. (Vol. 21). John Wiley & Sons, Inc. Perez, M., & Binders, B. L. R. (2003). Kali Linux Revealed. WD info (Vol. 3). Sarka, D. Radevojivec, M. Durkin, W. (2018). SQL Server 2017 Developer 's Guide. Packt Publishing Peterson, L. L., & Davie, B. S. (2012). In Praise of Computer Networks .° A Systems Approach Fifth Edition. Elsevier Masson SAS. Hennig, T., Bradly, T., Linson, L., Purvis, L., & Spaulding, B. (2010). Microsoft Access Small Business Solutions. Wiley Publishing Inc. Galin, D. (2018). Software Quality: Concepts and Practices. Wiley Publishing Inc. Barot, T., & Oren, E. (2015). The Dawn of the Social Messaging Era. ToWncenter.Gitbooks. Retrieved from https://toWcenter.gitbooks.io/guide-to-chat- apps/content/introductionthe_daWn_of/ Journals and Publications Engel, K. (2014). The Rise and Fall of Instant Messengers. [Blog posts]. http://WWW.Whoishostingthis.com/blog/2014/10/22/instant-messengers/ Cummings, M.L. (2004). \"The Need for Command and Control Instant Message Adaptive Interfaces: Lessons Learned from Tactical Tomahawk Human-in-the- Loop Simulations.\" Cyl9erPsychology & Behavior 7(6): 653-61. http://WWW.liebertonline.com/doi/abs/10.1089/cpb.2004.7.653. Flanagin, A.J. (2005). \"IM Online: Instant Messaging Use Among College Students.\" Communication Research Reports 22(3): 175-87. http://WWW.tandfonline.com/doi/abs/10.1080/00036810500206966. Sweigart, C. (2003). \"Instant Messaging Security.\" (Security 401): 1-39. https://WWW.giac.org/paper/gsec/3907/introduction-computer-security-incident- ","routeslip":"","__v":0}
113+{"_id":{"$oid":"5f3e33c366cc3f0590a28a90"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677624","title":"roger.pdf.txt","filename":"/drive/textML/LOI/roger.pdf.txt","category":"","author":"System","deyt":{"$date":"2020-06-25T09:11:59.815Z"},"size":2110,"content":" Windows Preview Pane locks files for extended period SYMPTOM On a Windows Vista or Windows 7 computer, you may see a \"File in use\" or \"Fi\"e_name is locked for editing by user_name\" message when opening a Microsoft Office document (e.g., Excel or Word file) in a remote shared folder in Windows Explorer that used the Details view and the Preview Pane layout. This is caused by Windows holding a lock on the files for longer than normal, which is behavior associated with the Details view and Preview Pane layout. Per Microsoft Support, the cause of this issue is a sharing violation that happens between the operating system and the Office application over a network resource. WORKAROUNDS On desktops accessing the files on a remote shared folder, modify the following settings to disable the Windows functions that cause this behavior: Windows Explorer: 1. Click one of the following: Tools > Folder Options > View or Organize >Folder and search op ons. o Clear Show pop-up description for folder and desktop items. o Clear Show preview handlers in preview pane. 2. Click Organize -> Layout. o Clear Details Pane. o Clear Preview Pane. In Office 2010: 1. Go to File > Options > Trust center > Trust Center settings. 2. Clear Protected View. 3. Click OK. In Office 2010/2013: 1. Go to File > Options > Trust center > Trust Center settings > Trusted Locations. 2. Place a check next to Allow Trusted Locations on my network as shown below. 3. Click OK. RESOLUTION Windows Vista: A HotFix is available from Microsoft Support at Windows 7: Add the following registry keys to the computer(s) accessing the document: [H KEY_CLASSES_ROOT\\CLS\"D\\{993BE281—6695—4BA5—8A2A—7AACBFAAB69E}] @=\"Microsoft Office Metadata Handler\" \"Enab\"eShareDenyNone\"=dword:00000001 \"NoOpLock\"=dword:00000001 [H KEY_LOCAL_MACH I N E\\SOFTWARE\\C\"asses\\CLS\"D\\{993BE281—6695—4BA5—8A2A— 7AACBFAAB69E}] @=\"Microsoft Office Metadata Handler\" \"Enab\"eShareDenyNone\"=dword:00000001 To prevent Windows 7 preview functions from causing documents to open read-only, create the following registry entries: ","routeslip":"","__v":0}
114+{"_id":{"$oid":"5f3e33c366cc3f0590a28a92"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677631","title":"test-dis-3.docx.txt","filename":"/drive/textML/LOI/test-dis-3.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-12T07:06:50.538Z"},"size":1194,"content":" Taal Vista Hotel Reservation Confirmation Dear Mr. Maligro, Thank you for choosing Taal Vista Hotel. We are pleased to confirm your reservation as detailed below. Reservation Details Con rmation Number Guest Name Arrival Date Departure Date Number of Nights Number of Guest Room Type Nightly Rate Guaranteed Method Breakfast Grand Total Check-in Time Check-out Time 1054480 Mr. Nelson Maligro 25 September 2019 27 September 2019 2 1 Adult 1 Premier King Lake Wing Bldg. Premier at PHP 8,9250.00 Room rates per night are inclusive of VAT, service charge, and local government tax. Your reservation is on a TENTATIVE status. **P\"ease deposit FULL payment on/before August 23, 2019 (until 4PM) . ** AUTO CANCEL IF UNSETTLED ON THE GIVEN OPTION DATE ** Payment is non refundable Bank Name: Any BANCO DE ORO branch Account Name: SM PRIME HOLDINGS INC — TAAL VISTA HOTEL Reference Number: F\"T0000007463 Account Number: 1500009073 A copy of the deposit slip must be sent thru email at reservations@taa\"vistahote\".com. Buffet Breakfast is included PHP 17,900.00 Total amount per stay are inclusive of VAT, service charge, and local government tax. 02:00 PM 12:00 NN ","routeslip":"","__v":0}
115+{"_id":{"$oid":"5f3e33c366cc3f0590a28a91"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677631","title":"PN Unclassified Video Teleconference System.docx.txt","filename":"/drive/textML/LOI/PN Unclassified Video Teleconference System.docx.txt","category":"","author":"System","deyt":{"$date":"2020-03-26T13:33:26.573Z"},"size":1159,"content":" PN Unclassi ed Video Teleconference System (UVTS) JITSI (On—premise) Cisco Webex Zoom Zimbra Connect 1. Data Security a) Server Location USA but keys I. Philippine Navy USA Ch(ijnea'\\(/aecriccilrging Philippine Navy to NICTC) b) End—to—End — Requires VPN to \"Ro\"\"ed their Encryption securely connect . own\" (according Y clients es (accordmg to to NICTC) none — With E2E module included them) . Data Privacy Philippine Navy CISCO legally holds the data Zoom legally holds the data Philippine Navy . Ease of Use (End user) Yes Yes Yes Yes . Administration (Managing users) Users are managed by NICTC User hosting the meeting manages the participants User hosting the meeting manages the participants Users are managed within the Zimbra server (NICTC) . Screen Sharing/ Yes Presentation Yes Yes Yes - C'0Ud 5t0r38€ Zimbra email and none webex zoom . briefcase . Integration with Office collaboration suite . none none none none (Word, Powerpoint, Excen . C t S ft d . . . S:\":SC(riO _L_i\\3/:)re an Free and Open Source Requires additional p Software (FOSS) $13/mo license fee per client to enable the feature ","routeslip":"","__v":0}
116+{"_id":{"$oid":"5f3e33c366cc3f0590a28a93"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677652","title":"CRA Checklist_Answers.docx.txt","filename":"/drive/textML/Cyber Lab/CRA Checklist_Answers.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-21T03:15:29.188Z"},"size":1398,"content":" CRA Checklist (for PN Only) Resource Person for the Vulnerability Management: Sgt Rigos Critical Security Controls Policies Tools Reports CSC 4 — Vulnerability Mgmt Sgt Esparagoza Utilize VA tools Implementation - Nessus Pro Weekly Conduct of Compare VA results and prioritize remediation Assigned to cyber group but during resolution it shared among person VA...generated report is submitted Resolved with the stakeholder/ programmer on the reports of the NESSUS and submitted to the ISO and ISNCO Software Update and Patch Mgmt Con gured WSUS System in the AD in the same server. CSC 8 - Data Recovery Sgt Gonzales Ensure all system data are Draft Policy to Backup and Reports on automatically and regularly backup backup Recovery conducted backup Software Backup as complete system Cloning or (imaging) imaging software CSC 14 — Monitoring and Audit of Logs Enable Logging and NTP Policy on Logs and NTP server and Reports on Network Network Monitoring check logs Monitoring as Review of Logs to identify IDS or any generated by the anomalies Network SIEM or IDS Monitoring Log collection and Deployment of SIEM SIEM CSC 18 — Incident Response and Mgmt Ensure incident response plan CERT Policy AAR on cyber incidents Devise a mechanism for the Policy pertaining to Trouble Ticketing Reports from the reporting of any anomalies reporting of System or Hotline end users ","routeslip":"","__v":0}
117+{"_id":{"$oid":"5f3e33c366cc3f0590a28a94"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677665","title":"Brief Description of the General Function of.docx.txt","filename":"/drive/textML/Cyber Lab/Brief Description of the General Function of.docx.txt","category":"","author":"System","deyt":{"$date":"2020-01-26T07:51:47.716Z"},"size":1227,"content":" Brief Description of the General Function of Information Technology Officer (ITO) ll: Formulate plans, policies, and manage IT infrastructure and cyber security controls; supervise the activities of subordinate analyst, researcher, programmer, and technologist in the conduct of systems development and maintenance of computers and IT networks. Specific Duties and Responsibilities: 1. Develop, review, and update the PN cyber security and information system policies and procedures. 2. Develop, review, and update the PN Information Systems Strategic Plan USSP) 3. Oversees the activities of subordinate analyst, and programmers in the development of information systems. 4. Oversees the activities of subordinate technologist in the conduct of preventive and corrective maintenance of computers and networks. 5. Evaluate and facilitate the fund request of PN units pertaining to Information and Communication Technology hardware and software. 6. Oversees the implementation of all funded ICT projects of the PN including cyber security controls, network infrastructure, and information systems. 7. Provides technical advice to superior officers on matters pertaining to information technology and cyber security. ","routeslip":"","__v":0}
118+{"_id":{"$oid":"5f3e33c366cc3f0590a28a95"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677662","title":"CRA Checklist_Answers-x.docx.txt","filename":"/drive/textML/Cyber Lab/CRA Checklist_Answers-x.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-21T03:18:02.253Z"},"size":1398,"content":" CRA Checklist (for PN Only) Resource Person for the Vulnerability Management: Sgt Rigos Critical Security Controls Policies Tools Reports CSC 4 — Vulnerability Mgmt Sgt Esparagoza Utilize VA tools Implementation - Nessus Pro Weekly Conduct of Compare VA results and prioritize remediation Assigned to cyber group but during resolution it shared among person VA...generated report is submitted Resolved with the stakeholder/ programmer on the reports of the NESSUS and submitted to the ISO and ISNCO Software Update and Patch Mgmt Con gured WSUS System in the AD in the same server. CSC 8 - Data Recovery Sgt Gonzales Ensure all system data are Draft Policy to Backup and Reports on automatically and regularly backup backup Recovery conducted backup Software Backup as complete system Cloning or (imaging) imaging software CSC 14 — Monitoring and Audit of Logs Enable Logging and NTP Policy on Logs and NTP server and Reports on Network Network Monitoring check logs Monitoring as Review of Logs to identify IDS or any generated by the anomalies Network SIEM or IDS Monitoring Log collection and Deployment of SIEM SIEM CSC 18 — Incident Response and Mgmt Ensure incident response plan CERT Policy AAR on cyber incidents Devise a mechanism for the Policy pertaining to Trouble Ticketing Reports from the reporting of any anomalies reporting of System or Hotline end users ","routeslip":"","__v":0}
119+{"_id":{"$oid":"5f3e33c366cc3f0590a28a96"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677672","title":"Bibliography 14Feb2019.docx.txt","filename":"/drive/textML/Cyber Lab/Bibliography 14Feb2019.docx.txt","category":"","author":"System","deyt":{"$date":"2020-05-21T00:13:43.284Z"},"size":1729,"content":" BIBLIOGRAPHY Books Price, J ., & Gunderloy, M. (n.d.). Masteringm Visual C#TM.NET. Carpenter, T. (2012). Microsoft Windows Operating System Essentials. John Wiley & Sons, Inc. (Vol. 21). John Wiley & Sons, Inc. Perez, M., & Binders, B. L. R. (2003). Kali Linux Revealed. WD info (Vol. 3). Sarka, D. Radevojivec, M. Durkin, W. (2018). SQL Server 2017 Developer 's Guide. Packt Publishing Peterson, L. L., & Davie, B. S. (2012). In Praise of Computer Networks .° A Systems Approach Fifth Edition. Elsevier Masson SAS. Hennig, T., Bradly, T., Linson, L., Purvis, L., & Spaulding, B. (2010). Microsoft Access Small Business Solutions. Wiley Publishing Inc. Galin, D. (2018). Software Quality: Concepts and Practices. Wiley Publishing Inc. Barot, T., & Oren, E. (2015). The Dawn of the Social Messaging Era. ToWncenter.Gitbooks. Retrieved from https://toWcenter.gitbooks.io/guide-to-chat- apps/content/introductionthe_daWn_of/ Journals and Publications Engel, K. (2014). The Rise and Fall of Instant Messengers. [Blog posts]. http://WWW.Whoishostingthis.com/blog/2014/10/22/instant-messengers/ Cummings, M.L. (2004). \"The Need for Command and Control Instant Message Adaptive Interfaces: Lessons Learned from Tactical Tomahawk Human-in-the- Loop Simulations.\" Cyl9erPsychology & Behavior 7(6): 653-61. http://WWW.liebertonline.com/doi/abs/10.1089/cpb.2004.7.653. Flanagin, A.J. (2005). \"IM Online: Instant Messaging Use Among College Students.\" Communication Research Reports 22(3): 175-87. http://WWW.tandfonline.com/doi/abs/10.1080/00036810500206966. Sweigart, C. (2003). \"Instant Messaging Security.\" (Security 401): 1-39. https://WWW.giac.org/paper/gsec/3907/introduction-computer-security-incident- ","routeslip":"","__v":0}
120+{"_id":{"$oid":"5f3e33c366cc3f0590a28a97"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677697","title":"Dear Mr.docx.txt","filename":"/drive/textML/Cyber Lab/Dear Mr.docx.txt","category":"","author":"System","deyt":{"$date":"2020-07-07T12:35:18.768Z"},"size":1390,"content":" INTERNATIONAL RESEARCH CONFERENCE IN COMPUTING, ENGINEERING, EDUCATION AND EDUCATION TECHNOLOGY (IRCCEEE 2020) January 5*-10, 2iIi2iIi at LA PIAZZA HCITELAND CONVENTION CENTER, Imelda Reeea Ave,Lega2piCity,Pi1i\"ippinee [All presented and aeeepted papers will he published in SCOPUS indexed pr REFEREEDjdLIrna\"] Dear Mr. Nelson Maligro: Paper Title: Secured Instant Messaging Application using Hybrid Encryption Algorithm We are pleased to inform you that your paper has been accepted for ORAL PRESENTATION in INTERNATIONAL RESEARCH CONFERENCE IN COMPUTING, ENGINEERING, EDUCATION AND EDUCATION TECHNOLOGY (IRCCEEE 2020) which will be held on January 9-10, 2020 at LA PIAZZA HOTEL AND CONVENTION CENTER, Imelda Roces Ave, Legazpi City, Philippines. This email also served as notification for publication in Scopus-indexed journal. Please find reviewer's comments below for the basis of your revisions. Additional instruction will be given to you during the conference for the publication instruction. Please revise your paper according to reviewer's comments and make sure that the similarity index using turnitinlithenticate or any reliable plagiarism software will not exceed 15%. Please visit wvvw.irccee2020.com for more announcement and updates. We are looking forward to meeting you at the conference. Respectfully yours, Organizing and Technical Committee of IRCCEE 2019 ","routeslip":"","__v":0}
121+{"_id":{"$oid":"5f3e33c366cc3f0590a28a98"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677686","title":"CRA Checklist_Answers2.docx.txt","filename":"/drive/textML/Cyber Lab/CRA Checklist_Answers2.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-21T04:08:57.625Z"},"size":1398,"content":" CRA Checklist (for PN Only) Resource Person for the Vulnerability Management: Sgt Rigos Critical Security Controls Policies Tools Reports CSC 4 — Vulnerability Mgmt Sgt Esparagoza Utilize VA tools Implementation - Nessus Pro Weekly Conduct of Compare VA results and prioritize remediation Assigned to cyber group but during resolution it shared among person VA...generated report is submitted Resolved with the stakeholder/ programmer on the reports of the NESSUS and submitted to the ISO and ISNCO Software Update and Patch Mgmt Con gured WSUS System in the AD in the same server. CSC 8 - Data Recovery Sgt Gonzales Ensure all system data are Draft Policy to Backup and Reports on automatically and regularly backup backup Recovery conducted backup Software Backup as complete system Cloning or (imaging) imaging software CSC 14 — Monitoring and Audit of Logs Enable Logging and NTP Policy on Logs and NTP server and Reports on Network Network Monitoring check logs Monitoring as Review of Logs to identify IDS or any generated by the anomalies Network SIEM or IDS Monitoring Log collection and Deployment of SIEM SIEM CSC 18 — Incident Response and Mgmt Ensure incident response plan CERT Policy AAR on cyber incidents Devise a mechanism for the Policy pertaining to Trouble Ticketing Reports from the reporting of any anomalies reporting of System or Hotline end users ","routeslip":"","__v":0}
122+{"_id":{"$oid":"5f3e33c366cc3f0590a28a9a"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677712","title":"Dear Mrs.docx.txt","filename":"/drive/textML/Cyber Lab/Dear Mrs.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-21T04:22:55.15Z"},"size":1390,"content":" INTERNATIONAL RESEARCH CONFERENCE IN COMPUTING, ENGINEERING, EDUCATION AND EDUCATION TECHNOLOGY (IRCCEEE 2020) January 5*-10, 2iIi2iIi at LA PIAZZA HCITELAND CONVENTION CENTER, Imelda Reeea Ave,Lega2piCity,Pi1i\"ippinee [All presented and aeeepted papers will he published in SCOPUS indexed pr REFEREEDjdLIrna\"] Dear Mr. Nelson Maligro: Paper Title: Secured Instant Messaging Application using Hybrid Encryption Algorithm We are pleased to inform you that your paper has been accepted for ORAL PRESENTATION in INTERNATIONAL RESEARCH CONFERENCE IN COMPUTING, ENGINEERING, EDUCATION AND EDUCATION TECHNOLOGY (IRCCEEE 2020) which will be held on January 9-10, 2020 at LA PIAZZA HOTEL AND CONVENTION CENTER, Imelda Roces Ave, Legazpi City, Philippines. This email also served as notification for publication in Scopus-indexed journal. Please find reviewer's comments below for the basis of your revisions. Additional instruction will be given to you during the conference for the publication instruction. Please revise your paper according to reviewer's comments and make sure that the similarity index using turnitinlithenticate or any reliable plagiarism software will not exceed 15%. Please visit wvvw.irccee2020.com for more announcement and updates. We are looking forward to meeting you at the conference. Respectfully yours, Organizing and Technical Committee of IRCCEE 2019 ","routeslip":"","__v":0}
123+{"_id":{"$oid":"5f3e33c366cc3f0590a28a9b"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677703","title":"Chapter 1 - 09Apr2020.docx.txt","filename":"/drive/textML/Cyber Lab/Chapter 1 - 09Apr2020.docx.txt","category":"","author":"System","deyt":{"$date":"2020-04-29T03:07:00.771Z"},"size":1567,"content":" Chapter 1 ‘ INTRODUCTION Background of the Study Data exchange or data communication is a key process of providing accurate and timely information to senior leaders, top management, and decision makers. It involves the use of email, instant messaging, video conference, chat, online forums, and other applications that transmit data from sender to receiver. Many organizations and modern companies prefer to use instant messaging rather than email for simpler and more user- friendly collaboration among staff and management. It also exchanges data almost at an instant, allowing two-Way communication in near real-time. Instant messaging applications like Facebook messenger, SKYPE, and Yahoo Messenger provide easy, fast, and cost-effective means of text, voice, and video communication. It has become the most preferred application to communicate with peers, families, and among professionals from various industries and sectors. Businesses are now beginning to embrace IM for their office communication. Although it is less formal than a face to face meeting, it can bridge the gap of needing to collaborate and communicate with each other. Private companies, schools, organizations, and government agencies use IM to support or provide redundancy with their other existing mode of communication. The military recognizes the necessity to develop or acquire a secure, reliable, and near real-time data communication tool for effective exchange of information and to provide the high-command a means to collate information needed for decision-making. In ","routeslip":"","__v":0}
124+{"_id":{"$oid":"5f3e33c366cc3f0590a28a9c"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677730","title":"Itemized Expenditure of the File Server.docx.txt","filename":"/drive/textML/Cyber Lab/Itemized Expenditure of the File Server.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-21T03:43:38.337Z"},"size":257,"content":" Itemized Expenditure of the File Server Items Amount DVD Recordable Disk 375.00 UTP Cable 5,400.00 Less UTP -500.00 Hard Disk (1TB x 2) 4,500.00 DLINK Gigabit switch (Metal case) 3,800.00 RJ45, Crimping tool, Mouse, USB disk 1,308.00 Total P 14,883.00 ","routeslip":"","__v":0}
125+{"_id":{"$oid":"5f3e33c366cc3f0590a28a9d"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677721","title":"LastActivity.txt.txt","filename":"/drive/textML/Cyber Lab/LastActivity.txt.txt","category":"","author":"System","deyt":{"$date":"2020-04-25T14:35:02.711Z"},"size":1,"content":" ","routeslip":"","__v":0}
126+{"_id":{"$oid":"5f3e33c366cc3f0590a28a9f"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677740","title":"VLAN Routed.doc.txt","filename":"/drive/textML/Cyber Lab/VLAN Routed.doc.txt","category":"","author":"System","deyt":{"$date":"2020-04-29T02:55:17.239Z"},"size":1583,"content":" Eile Edit Eiei.-.-' Histor-_..-' u::n::i:rnarl-.._s. lools elp Horne \" F-'hilippine Air Force X Wu:::u'-.-'-.-'za Snearning Engine -1 S X Log in I'-iessus Essentials Folnzrie X QNPEECIDZE — '-A-'er: Image M: X e II3u::.n:::ug\"e <- 0' 'Q G) 10.0. 1 I.' :_'.-'-:: 3 I -'.F-'a-: i'i:~:.r;-:;Ii \"' '3' '£1' E i\"i\\ ED 5 B X 0 Q5 5 E C:\\W\"i\\\"DOWS\\systern32\\crnd.exe — D X H Login Web\"mage Mgnitor Default Gateway . . . . . . . . . Home Home wireless LAN adapter Local Area Connection' 3: Sh A D m entserver Media State . . . . . . . . . . . : Media disconnected Status Devmeln o Counter Inquky Connection-specific DNS Suffix . Fax Received F e . _ Ethernet adapter Bluetooth Network Connection: P nten P ntJobS I Devmelvame. NRGIWPZSSO J b I Locahon Media State . . . . . . . . . . : Media disconnected O I C°\"\"\"e\"t 3 Connection-specific DNS Suffix Configuration I Host Name : RNPEEOD2E wireless LAN adapter wi-Fi: Connection-specific DNS Suffix : Link-local IPv6 Address . . . : feae::S8c2:de1:ac27:133f%4 IPV4 Address. . . . . . . . . : 16.6.18.165 Subnet Mask . . . . . . . . . : 255.255.255.6 Default Gateway . . . . . . . : 16.6.18.1 Status C:\\Users\\zoe>tracert 16.6.13.179 Pnnter Ready P nte Tracing route to 16.6.13.179 over a maximum of 36 hops Comer Ready 1 156 ms 212 ms 253 ms 16.6.18.1 Fax ReadY 2 1B.6.18.1 reports: Destination host unreachable. Scanner Ready Trace complete C:\\Users\\zoe> Toner - __ 2:10 PM E 0 TYPE here to search I %' a é H : i\" U\") 5f22f2U19 % ","routeslip":"","__v":0}
127+{"_id":{"$oid":"5f3e33c366cc3f0590a28a9e"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677721","title":"LastActivity.txt.txt","filename":"/drive/textML/Cyber Lab/LastActivity.txt.txt","category":"","author":"System","deyt":{"$date":"2020-04-25T14:35:02.711Z"},"size":1,"content":" ","routeslip":"","__v":0}
128+{"_id":{"$oid":"5f3e33c366cc3f0590a28a99"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677703","title":"Cyber Bulletin 2020 -08 - TIKTOK.doc.rodel.pdf.txt","filename":"/drive/textML/Cyber Lab/Cyber Bulletin 2020 -08 - TIKTOK.doc.rodel.pdf.txt","category":"","author":"System","deyt":{"$date":"2020-06-18T02:10:47.488Z"},"size":869,"content":" -000- OUTGOING DISPATCH TRANSMITTING CALL SERIAL NO PRECEDENCE DATEITIMEIGRP IMWMSTRUCTIONS 'P' ,4' I FM: FOIC, PN DRAFTED BY: _ R BA RA A PM \\h——.'_'//'\\_,./ TO: ALL PN UNITS (ATTN: 3/6) APPROVED BY: COL NICANOR PN(M)(GSC) INFO: co, NICT STATIONS RELEASED BY: CAPT SAMBALILO PMGSC) SCTY _ CLSFN CONFID PRECEDENCE. PRIORITY BT . . . CONFID x CITE N6B-O420- x 1. 2. IS THE ECOPY OF PN CYBER SECURITY BULLETIN 2020-O8 SUBJ: REFERENCE: HPN SOP NR 07 DTD 01 AUG 2013 SUBJ: PN COMPUTER EMERGENCY RESPONSE TEAM (PNCERT) ICOW ABOVE REF, FORWARDED TO UNIT 3/6 PNCS (ZIMBRA) ACCOUNT US GOVERNMENT AGENCIES HAVE BANNED TIK TOK APPLICATION ITR, DIRECT YOUR RESPECTIVE UNIT/OFFICE CEIS OFFR TO FACILITATE THE DISSEMINATION OF SAID BULLETIN. LATERAL COORDINATION WITH THE NEAREST NICT STATION IS HIGHLY ENCOURAGED. FOR WIDEST DISSEMINATION. 3. 4. ..BT ","routeslip":"","__v":0}
129+{"_id":{"$oid":"5f3e33c366cc3f0590a28aa0"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677750","title":"Rootcon.docx.txt","filename":"/drive/textML/Cyber Lab/Rootcon.docx.txt","category":"","author":"System","deyt":{"$date":"2020-04-28T08:53:56.074Z"},"size":1758,"content":" KEP what HEADQUARTERS PHILIPPINE NAW \\ E . OFFICE OF THE AC OF NS FOR C4\"SR SYSTEMS, N6 \"E5 Naval Station Jose Andrada HI\"?!-f'7\".*.'_'f,F*]_!-='§E__Tf\"fl\"'§h-t\"'.: 2335 Roxas Boulevard, Manila From: Staff Officer, Cyber Warfare Management Branch To: AC of NS for C4\"SR Systems, N6 Via: Deputy AC of NS for C4\"SR Systems, N6 Subj: Attendance to RootCon Hackers' Conference Ref: FOIC, PN approved DF dated 02 August 2019, subject: Attendance to RootCon Event Encls: 1) Topic Presentations 2) AAR from LTJG MARIO N TRIBUNAL PN 3) Pictures with caption I. General: ROOTCON is an annual cyber security conference and the largest hacking conference in the Philippines. The event aims to foster camaraderie and sharing of expertise among cybersecurity professionals, security researchers, and ethical hackers. A two-day activity showcasing lectures on the latest techniques and tactics of hacking, a hands-on experience on ways of cracking devices; and competing in the Capture the Flag (CTF) contest - a special kind of cybersecurity competition designed to challenge its participants to solve computer security problems. This activity was held on 26-27 September 2019 at Taal Vista Hotel, Tagaytay and was attended by LCDR RODEL G BARRACA PN, CPT JEAN PAUL T SAN GABRIEL PN(M), LTJG MARIO N TRIBUNAL PN, LTJG JOMAR M WELBA PN, SN2 Rhea T Espinosa PN, and Mr. Nelson G. Maligro CE. ll. Schedule of Activities: Time Activitiesl Topics Resource Person Day 1 O9OOH-O93OH Keynote CDR LOPEZ, Commander, AFPCYG O93OH-1015H Navigating the Shift from Opportunistic to Targeted Christopher Elisan Ransomware 1015H-1115H Capture The Flag (CTF) game participated by ON6 and NICTC personnel. 1115H-1215H Farewell, WAF — Exploiting SOL Boik Su ","routeslip":"","__v":0}
130+{"_id":{"$oid":"5f3e33c366cc3f0590a28aa1"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677747","title":"PN Unclassified Video Teleconference System.docx.txt","filename":"/drive/textML/Cyber Lab/PN Unclassified Video Teleconference System.docx.txt","category":"","author":"System","deyt":{"$date":"2020-03-26T13:33:26.573Z"},"size":1159,"content":" PN Unclassi ed Video Teleconference System (UVTS) JITSI (On—premise) Cisco Webex Zoom Zimbra Connect 1. Data Security a) Server Location USA but keys I. Philippine Navy USA Ch(ijnea'\\(/aecriccilrging Philippine Navy to NICTC) b) End—to—End — Requires VPN to \"Ro\"\"ed their Encryption securely connect . own\" (according Y clients es (accordmg to to NICTC) none — With E2E module included them) . Data Privacy Philippine Navy CISCO legally holds the data Zoom legally holds the data Philippine Navy . Ease of Use (End user) Yes Yes Yes Yes . Administration (Managing users) Users are managed by NICTC User hosting the meeting manages the participants User hosting the meeting manages the participants Users are managed within the Zimbra server (NICTC) . Screen Sharing/ Yes Presentation Yes Yes Yes - C'0Ud 5t0r38€ Zimbra email and none webex zoom . briefcase . Integration with Office collaboration suite . none none none none (Word, Powerpoint, Excen . C t S ft d . . . S:\":SC(riO _L_i\\3/:)re an Free and Open Source Requires additional p Software (FOSS) $13/mo license fee per client to enable the feature ","routeslip":"","__v":0}
131+{"_id":{"$oid":"5f3e33c366cc3f0590a28aa2"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677776","title":"test-dis-1.docx.txt","filename":"/drive/textML/Cyber Lab/test-dis-1.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-12T05:08:15.86Z"},"size":1194,"content":" Taal Vista Hotel Reservation Confirmation Dear Mr. Maligro, Thank you for choosing Taal Vista Hotel. We are pleased to confirm your reservation as detailed below. Reservation Details Con rmation Number Guest Name Arrival Date Departure Date Number of Nights Number of Guest Room Type Nightly Rate Guaranteed Method Breakfast Grand Total Check-in Time Check-out Time 1054480 Mr. Nelson Maligro 25 September 2019 27 September 2019 2 1 Adult 1 Premier King Lake Wing Bldg. Premier at PHP 8,9250.00 Room rates per night are inclusive of VAT, service charge, and local government tax. Your reservation is on a TENTATIVE status. **P\"ease deposit FULL payment on/before August 23, 2019 (until 4PM) . ** AUTO CANCEL IF UNSETTLED ON THE GIVEN OPTION DATE ** Payment is non refundable Bank Name: Any BANCO DE ORO branch Account Name: SM PRIME HOLDINGS INC — TAAL VISTA HOTEL Reference Number: F\"T0000007463 Account Number: 1500009073 A copy of the deposit slip must be sent thru email at reservations@taa\"vistahote\".com. Buffet Breakfast is included PHP 17,900.00 Total amount per stay are inclusive of VAT, service charge, and local government tax. 02:00 PM 12:00 NN ","routeslip":"","__v":0}
132+{"_id":{"$oid":"5f3e33c366cc3f0590a28aa3"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677785","title":"test-dis-3.docx.txt","filename":"/drive/textML/Cyber Lab/test-dis-3.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-12T07:06:50.538Z"},"size":1194,"content":" Taal Vista Hotel Reservation Confirmation Dear Mr. Maligro, Thank you for choosing Taal Vista Hotel. We are pleased to confirm your reservation as detailed below. Reservation Details Con rmation Number Guest Name Arrival Date Departure Date Number of Nights Number of Guest Room Type Nightly Rate Guaranteed Method Breakfast Grand Total Check-in Time Check-out Time 1054480 Mr. Nelson Maligro 25 September 2019 27 September 2019 2 1 Adult 1 Premier King Lake Wing Bldg. Premier at PHP 8,9250.00 Room rates per night are inclusive of VAT, service charge, and local government tax. Your reservation is on a TENTATIVE status. **P\"ease deposit FULL payment on/before August 23, 2019 (until 4PM) . ** AUTO CANCEL IF UNSETTLED ON THE GIVEN OPTION DATE ** Payment is non refundable Bank Name: Any BANCO DE ORO branch Account Name: SM PRIME HOLDINGS INC — TAAL VISTA HOTEL Reference Number: F\"T0000007463 Account Number: 1500009073 A copy of the deposit slip must be sent thru email at reservations@taa\"vistahote\".com. Buffet Breakfast is included PHP 17,900.00 Total amount per stay are inclusive of VAT, service charge, and local government tax. 02:00 PM 12:00 NN ","routeslip":"","__v":0}
133+{"_id":{"$oid":"5f3e33c366cc3f0590a28aa4"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677774","title":"sample1.txt.txt","filename":"/drive/textML/Cyber Lab/sample1.txt.txt","category":"","author":"System","deyt":{"$date":"2020-03-26T13:57:35.51Z"},"size":3555,"content":" The original Bata Batuta 1970 US release of The Man who Sold the world employed a cartoon—like cover drawing by Bowie's friend Michael J. weller, featuring a cowboy in front of the Cane Hill mental asylum.[16] weller, whose friend was a patient there, suggested the idea after Bowie had asked him to create a design that would capture the music's foreboding tone. Drawing on pop art styles, he depicted a dreary main entrance block to the hospital with a damaged clock tower. For the design's foreground, he used a photograph of John wayne to draw a cowboy figure wearing a ten—gallon hat and a rifle, which was meant as an allusion to the song \"Running Gun Blues\". Bowie suggested Weller incorporate the \"exploding head\" signature on the cowboy's hat, a feature he had previously used on his posters while a part of the Arts Lab. He also added an empty speech balloon for the cowboy figure, which was intended to have the line \"roll up your sleeves and show us your arms\"—a pun on record players, guns, and drug use—but Mercury found the idea too risque and the balloon was left blank. According to Bowie biographer Nicholas Pegg, \"at this point, David's intention was to call the album Metrobolist, a play on Fritz Lang's Metropolis: the title would remain on the tape boxes even after Mercury had released the LP in America as The Man who Sold the world.\"[4] Bowie was enthusiastic about the finished design, but soon reconsidered the idea and had the art department at Philips Records, a subsidiary of Mercury, enlist photographer Keith MacMillan to shoot an alternate cover. The shoot took place in a \"domestic environment\" of the Haddon Hall living room, where Bowie reclined on a chaise longue in a cream and blue satin \"man's dress\", an early indication of his interest in exploiting his androgynous appearance.[4] The dress was designed by British fashion designer Michael Fish.[17] It has been said that his \"bleached blond locks, falling below shoulder level\" in the photo, were inspired by a Pre- Raphaelite painting by Dante Gabriel Rossetti.[18] In the United States, Mercury rejected MacMillan's photo and released the album with weller's design as its cover, much to the displeasure of Bowie, although he successfully lobbied the label to use the photo for the record's release in the United Kingdom. In 1972, he said weller's design was \"horrible\" but reappraised it in 1999, saying he \"actually thought the cartoon cover was really cool\".[4] while promoting The Man who Sold the world in the US, Bowie wore the Mr Fish dress in February 1971 on his first promotional tour and during interviews, despite the fact that the Americans had no knowledge of the as yet unreleased UK cover.[17] The 1971 German release presented a winged hybrid creature with Bowie's head and a hand for a body, preparing to flick the Earth away. The 1972 worldwide reissue by RCA Records used a black—and—white picture of Ziggy Stardust on the sleeve. This image remained the cover art on reissues until 1990, when the Rykodisc release reinstated the UK \"dress\" cover. The \"dress\" cover has appeared on subsequent reissues of the album.[19] fox Page move—protected Stormtrooper (Star wars) From wikipedia, the free encyclopedia Jump to navigationJump to search \"Imperial Stormtroopers\" redirects here. For other uses, see Stormtrooper (disambiguation). Stormtrooper Star wars characters Romics 2013 135.JPG Stormtrooper cosplay at Romics 2013, Italy First appearance Star wars (1977) Created by George Lucas Information ","routeslip":"","__v":0}
134+{"_id":{"$oid":"5f3e33c366cc3f0590a28aa5"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677800","title":"NOC DF.pdf.txt","filename":"/drive/textML/N6/NOC DF.pdf.txt","category":"","author":"System","deyt":{"$date":"2020-06-21T08:51:07.74Z"},"size":1421,"content":" EH8 IV}-I V Y.' FFOIGCIIFIQ rne CD63, OECUFIHQ OUT I\"'UIU!'E-3*\" DISPOSITION FORM SECURITY CLASSIFICATION (IF ANY) File Number: Subject: Conduct of 1ST Quarter Test Firing of Naval Gun NOCB-0120- DIS of PC118. TO: VCOM, PN FROM: CNS DATE: COMMENT NR: N6 /9156 men SUMMARY: 1. References: a. CPF Radio Message Cite F30-0120- 011. b. HPN SOP Nr 02 re Test Firing of Naval Guns dated 21 Jan 20 2. Per reference _a_, the Commander, Philippine Fleet (CPF) is requesting clearance for the conduct of 15* Quarter Test Firing of Naval Guns of BRP EMILIO LIWANAG (PC118) on dates and maritime areas indicated: TYPE OF COORDINATES VESSEL GUN DATE VICINITY Pt. A - Lat 05\" 24.000' N Long 124\" 55.000' E 40MM AA . Pt. 3- Lat 05° 24.000: N BRP EM\"\"O Gun 11-12 Mar V'° 18 NM SW \"ff Long 125* 10.000' E LIWANAG 2020 Baiut Island, Davao (PC118) Occidental Pt C_ Lat 05., 08000, N Long 125° 10.000' E Pt. D- Lat 05\" 08.000' N Long 124° 55.000' E 3. Per coordination made with CG8, PCG, the issuance and publication of Notice to All Mariners (NOTAM) requires seven (7) days prior to the scheduled test firing activity. RECOMMENDATIONS: 4. VCOM, PN approval on the following: a. Request of CPF for the conduct of 15' Quarter Test Firing of Naval Gun of PC118. b. Authority for DNOC to release the radio message addressed to the Commandant, PCG forthe issuance of NOTAM. (Enci) DELACRUZ ","routeslip":"","__v":0}
135+{"_id":{"$oid":"5f3e33c366cc3f0590a28aa6"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677817","title":"CRA Checklist_Answers2.docx.nelson.pdf.txt","filename":"/drive/textML/Military Letter/CRA Checklist_Answers2.docx.nelson.pdf.txt","category":"","author":"System","deyt":{"$date":"2020-07-07T05:40:10.489Z"},"size":1398,"content":" CRA Checklist (for PN Only) Resource Person for the Vulnerability Management: Sgt Rigos Critical Security Controls Policies Tools Reports CSC 4 — Vulnerability Mgmt Sgt Esparagoza Utilize VA tools Implementation - Nessus Pro Weekly Conduct of Compare VA results and prioritize remediation Assigned to cyber group but during resolution it shared among person VA...generated report is submitted Resolved with the stakeholder/ programmer on the reports of the NESSUS and submitted to the ISO and ISNCO Software Update and Patch Mgmt Con gured WSUS System in the AD in the same server. CSC 8 - Data Recovery Sgt Gonzales Ensure all system data are Draft Policy to Backup and Reports on automatically and regularly backup backup Recovery conducted backup Software Backup as complete system Cloning or (imaging) imaging software CSC 14 — Monitoring and Audit of Logs Enable Logging and NTP Policy on Logs and NTP server and Reports on Network Network Monitoring check logs Monitoring as Review of Logs to identify IDS or any generated by the anomalies Network SIEM or IDS Monitoring Log collection and Deployment of SIEM SIEM CSC 18 — Incident Response and Mgmt Ensure incident response plan CERT Policy AAR on cyber incidents Devise a mechanism for the Policy pertaining to Trouble Ticketing Reports from the reporting of any anomalies reporting of System or Hotline end users ","routeslip":"","__v":0}
136+{"_id":{"$oid":"5f3e33c366cc3f0590a28aa7"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677810","title":"Dear Mrs.docx.txt","filename":"/drive/textML/Military Letter/Dear Mrs.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-21T04:22:55.15Z"},"size":1390,"content":" INTERNATIONAL RESEARCH CONFERENCE IN COMPUTING, ENGINEERING, EDUCATION AND EDUCATION TECHNOLOGY (IRCCEEE 2020) January 5*-10, 2iIi2iIi at LA PIAZZA HCITELAND CONVENTION CENTER, Imelda Reeea Ave,Lega2piCity,Pi1i\"ippinee [All presented and aeeepted papers will he published in SCOPUS indexed pr REFEREEDjdLIrna\"] Dear Mr. Nelson Maligro: Paper Title: Secured Instant Messaging Application using Hybrid Encryption Algorithm We are pleased to inform you that your paper has been accepted for ORAL PRESENTATION in INTERNATIONAL RESEARCH CONFERENCE IN COMPUTING, ENGINEERING, EDUCATION AND EDUCATION TECHNOLOGY (IRCCEEE 2020) which will be held on January 9-10, 2020 at LA PIAZZA HOTEL AND CONVENTION CENTER, Imelda Roces Ave, Legazpi City, Philippines. This email also served as notification for publication in Scopus-indexed journal. Please find reviewer's comments below for the basis of your revisions. Additional instruction will be given to you during the conference for the publication instruction. Please revise your paper according to reviewer's comments and make sure that the similarity index using turnitinlithenticate or any reliable plagiarism software will not exceed 15%. Please visit wvvw.irccee2020.com for more announcement and updates. We are looking forward to meeting you at the conference. Respectfully yours, Organizing and Technical Committee of IRCCEE 2019 ","routeslip":"","__v":0}
137+{"_id":{"$oid":"5f3e33c366cc3f0590a28aa8"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677826","title":"Dear Mr.docx.txt","filename":"/drive/textML/Military Letter/Dear Mr.docx.txt","category":"","author":"System","deyt":{"$date":"2020-07-07T12:35:18.768Z"},"size":1390,"content":" INTERNATIONAL RESEARCH CONFERENCE IN COMPUTING, ENGINEERING, EDUCATION AND EDUCATION TECHNOLOGY (IRCCEEE 2020) January 5*-10, 2iIi2iIi at LA PIAZZA HCITELAND CONVENTION CENTER, Imelda Reeea Ave,Lega2piCity,Pi1i\"ippinee [All presented and aeeepted papers will he published in SCOPUS indexed pr REFEREEDjdLIrna\"] Dear Mr. Nelson Maligro: Paper Title: Secured Instant Messaging Application using Hybrid Encryption Algorithm We are pleased to inform you that your paper has been accepted for ORAL PRESENTATION in INTERNATIONAL RESEARCH CONFERENCE IN COMPUTING, ENGINEERING, EDUCATION AND EDUCATION TECHNOLOGY (IRCCEEE 2020) which will be held on January 9-10, 2020 at LA PIAZZA HOTEL AND CONVENTION CENTER, Imelda Roces Ave, Legazpi City, Philippines. This email also served as notification for publication in Scopus-indexed journal. Please find reviewer's comments below for the basis of your revisions. Additional instruction will be given to you during the conference for the publication instruction. Please revise your paper according to reviewer's comments and make sure that the similarity index using turnitinlithenticate or any reliable plagiarism software will not exceed 15%. Please visit wvvw.irccee2020.com for more announcement and updates. We are looking forward to meeting you at the conference. Respectfully yours, Organizing and Technical Committee of IRCCEE 2019 ","routeslip":"","__v":0}
138+{"_id":{"$oid":"5f3e33c366cc3f0590a28aa9"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677840","title":"VLAN Routed.doc.txt","filename":"/drive/textML/N6C/VLAN Routed.doc.txt","category":"","author":"System","deyt":{"$date":"2020-04-29T02:55:17.239Z"},"size":1583,"content":" Eile Edit Eiei.-.-' Histor-_..-' u::n::i:rnarl-.._s. lools elp Horne \" F-'hilippine Air Force X Wu:::u'-.-'-.-'za Snearning Engine -1 S X Log in I'-iessus Essentials Folnzrie X QNPEECIDZE — '-A-'er: Image M: X e II3u::.n:::ug\"e <- 0' 'Q G) 10.0. 1 I.' :_'.-'-:: 3 I -'.F-'a-: i'i:~:.r;-:;Ii \"' '3' '£1' E i\"i\\ ED 5 B X 0 Q5 5 E C:\\W\"i\\\"DOWS\\systern32\\crnd.exe — D X H Login Web\"mage Mgnitor Default Gateway . . . . . . . . . Home Home wireless LAN adapter Local Area Connection' 3: Sh A D m entserver Media State . . . . . . . . . . . : Media disconnected Status Devmeln o Counter Inquky Connection-specific DNS Suffix . Fax Received F e . _ Ethernet adapter Bluetooth Network Connection: P nten P ntJobS I Devmelvame. NRGIWPZSSO J b I Locahon Media State . . . . . . . . . . : Media disconnected O I C°\"\"\"e\"t 3 Connection-specific DNS Suffix Configuration I Host Name : RNPEEOD2E wireless LAN adapter wi-Fi: Connection-specific DNS Suffix : Link-local IPv6 Address . . . : feae::S8c2:de1:ac27:133f%4 IPV4 Address. . . . . . . . . : 16.6.18.165 Subnet Mask . . . . . . . . . : 255.255.255.6 Default Gateway . . . . . . . : 16.6.18.1 Status C:\\Users\\zoe>tracert 16.6.13.179 Pnnter Ready P nte Tracing route to 16.6.13.179 over a maximum of 36 hops Comer Ready 1 156 ms 212 ms 253 ms 16.6.18.1 Fax ReadY 2 1B.6.18.1 reports: Destination host unreachable. Scanner Ready Trace complete C:\\Users\\zoe> Toner - __ 2:10 PM E 0 TYPE here to search I %' a é H : i\" U\") 5f22f2U19 % ","routeslip":"","__v":0}
139+{"_id":{"$oid":"5f3e33c366cc3f0590a28aaa"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677858","title":"AFP CRA TEAM MEMBERS - AS OF 26 FEB 2019.docx.txt","filename":"/drive/textML/N6A/AFP CRA TEAM MEMBERS - AS OF 26 FEB 2019.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-01T11:16:56.338Z"},"size":1508,"content":" AFP CYBER RISK ASSESSMENT TEAM OJ6 DESIGNATION I JOB NIT NAME KILL ET U DESCRIPTION S S LTC RIZALDY A . OA6, PAF RADAZA 042536 DIRECTOR FOR INFO SYS Managerial Ethical Hacking, 950\"' CEISG, TSG FERNIE S LLIDO F/SGT 954\"' Cyberspace Digital Forensic, PAF 830095 Operations Squadron VAPT, IT Infra Admin VAPT, 950T\" SGT MARIEL ELAINE T H, Networking, CEISG, PAF DELA CRUZ 867063 NCO\": \"SF 954 COS Ethical Hacking, Network Admin Info Sys (Web, DB), Disaster Recovery/ A2C JOEDEL L DALIOAN Business OA6, PAF 923203 DIS PERSONNEL Continuity Planning, Digital Forensics, System Admin ISG, Cpl Vincent A Terencio NCOIC Research and Devt Network & Sys CEISSAFP PA Branch Admin IT Infrastructure Admin, VAPT, ISG, OFRATES C SIRINGAN DR/BCP, EH, CEISSAFP CE 'T AD'V\"N Incident Response/CERT, Digital Forensic CSG, Sgt Jefferson Natividad CEISSAFP PA MALWARE ANALYST CSG, CHRISTIAN JOE J INFO SYSTEM, CEISSAFP DULAN CE MALWARE ANALYST Malware Analysis LCDR RODEL G CHIEF, CW Management ON6, PN BARRACA PN BRANCH IT Infrastructure ON6, PN Nelson G. Maligro IT Personnel Ethical Hacking NICTC, PN LTJG MICHELLE B YU '80 Officer \"SO_27001 Lead PN Auditor CPL PRECIOUS JOY NICTC, PN MAURO PN(M) CSG VAPT CPT MARC ANTHONY G Chief, Cyberspace . 066' PA ROMERO (sc) PA Management Branch, oec Ma\"a9e'\"a' C\"E'PM I Nt kO t' S '\"'t, OG6, PA PX rvin unar ( nf) C:/\"\\\"/3vor)G6pera Ion pecia IS Network Opns NETBn, ASR PFC Ramon R Ramos Jr Network System Administrator, VAPT (P), PA (Inf) PA NETBn, ASR (P), PA ","routeslip":"","__v":0}
140+{"_id":{"$oid":"5f3e33c766cc3f0590a28aab"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677872","title":"Circular on Secure Baseline Configuration.docx.txt","filename":"/drive/textML/N6A/Circular on Secure Baseline Configuration.docx.txt","category":"","author":"System","deyt":{"$date":"2020-01-26T08:36:22.117Z"},"size":2008,"content":" PUNONGHIMPILAN HUKBONG DAGAT NG PILIPINAS (Headquarters Philippine Navy) Naval Station Jose Andrada 2335 Roxas Boulevard, Manila O/N6 CIRCULAR NUMBER Philippine Navy Command and Control, Computers, Communication, and Intelligence Surveillance and Reconnaissance (C4\"SR) Systems Secure Baseline Configuration 1. PURPOSE: The purpose of this policy is to provide specific guidance and advisory to Philippine Navy units, offices, personnel, and third party stakeholders to ensure the employment of standard configurations to PN C4\"SR Systems. It provides guidelines for the creation and maintenance of baseline configuration and employment of configuration change control (CCC) processes as mandated in Circular Nr 29 dated 06 December 2017: PN Cybersecurity Policy. This policy is important in order to maintain a secure C4\"SR Systems for the PN and supports for managing security risks. This policy adopts the National Institute for Standards and Technology Special Publication (NIST-SP) 800-53 for Configuration Management (CM) wherein the controls under the said publication were mapped in ISO/IEC 27001 for Information techno\"ogy—Security Techniques- lnformation Security Management Systems (\"SMS)—Requirements. 2. SCOPE: This policy applies to all PN personnel and third party stakeholders who administer, maintain, and operate PN C4\"SR Systems. C4\"SR Systems include but not limited to software/applications, operating system, Cybersecurity systems, and software—enab\"ed C3 system and ISR systems. 3. DEFINITION OF TERMINOLOGIES: a.—Baseline Configuration - is a documented, formally reviewed and agreed—upon sets of specifications for systems or configuration items within those systems. Baseline configurations serve as a basis for future builds, releases, and/or changes to systems. Baseline configurations include information about system components, network topology, and the logical placement of those components within the system architecture. RESTRICTED (Page 1 of 11) ","routeslip":"","__v":0}
141+{"_id":{"$oid":"5f3e33c766cc3f0590a28aac"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677860","title":"Application for Force Leave July 2019.docx.txt","filename":"/drive/textML/N6A/Application for Force Leave July 2019.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-01T12:25:09.596Z"},"size":2162,"content":" (Headquarters Philippine Navy) Naval Station Jose Andrada 2335 Roxas Blvd, Manila APPLICATION FOR LEAVE CSC FORM NO.6 Revised 1984 1. OFFICE/AGENCY 2. NAME (last) ( rst) (middle) Of ce N6, HPN MALIGRO NELSON GILOS 3. DATE OF FILING 4. RANK 5. SALARY 02 September 2019 Information Technology Of cer II DETAILS OF APPLICATIONS 6.A. TYPE OF LEAVE 6.B. WHERE LEAVE WILL BE SPENT III Vacation (1) IN CASE OF VACATION LEAVE 0 To seek employment 0 Within the Philippines: Cebu 0 Others (Specify) o Abroad (Specify) _ El Sick (2) IN CASE OF SICK LEAVE III Maternity o In Hospital (Specify) III Others (Specify) Force/Mandatory Leave 0 Out Patient (Specify): 6.C. NO. OF WORKING DAYS APPLIED Five (5) days 6.D. COMMUTATIONS Q Rgqugstgd 0 Not Requested Sept 09-13. 2019 NELSON G. MALIGRO Signature of Applicant DETAILS OF ACTION ON APPLICATION 7.A. CERTIFICATION OF LEAVE 7.B. RECOMMENDATION CREDITS AS OF 0 Approval 0 Disapproval due to VACATION SICK TOTAL Certi ed by: CARLO S MARCELO Acting Chief Administrative Of cer LT RUSSEL JOHN V BAUTISTA PN For PN Civilian Personnel Affairs Staff Officer for C4ISR System Sustainment Branch, ON6 Designation/ Office 7.C. APPROVED FOR 7.D. DISAPPROVED DUE TO: days with pay days without pay others (Specify) FOR THE FLAG OFFICER IN COMMAND, PN: _CAPT ROLANDO F SARMIENTO PN(GSC) Commander HPN & HSG AUTHORIZED OFFICIAL DATE : 1.Application for vacation or sick leave for one-half day or more shall be made on this form in DUPLICATE. 2. Application for vacation leave should be led in advance whenever possible ve (5) days before going such leave. 3.Application for vacation leave exceeding thirty (3 0) calendar days and leave to be spent abroad regardless of the number of days should be accompanied by duly accomplished HPN clearance. 4. Application for sick leave applied in advance or exceeding ve (5) days shall be accompanied by a medical certi cate. 5.Application for maternity should always be in sixty (60) days or two (2) months regardless if with full pay or without pay or with half pay shall be accompanied by a medical certi cate and duly accomplished HPN Clearance. ","routeslip":"","__v":0}
142+{"_id":{"$oid":"5f3e33c766cc3f0590a28aad"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677883","title":"Distribution of Antivirus Software.docx.txt","filename":"/drive/textML/N6A/Distribution of Antivirus Software.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-02T07:08:05.414Z"},"size":532,"content":" Distribution of Antivirus Software Nr Names 1 N6A Desktop Computer 2. N6B Desktop Computer 3. NEC Desktop Computer 4. N6D-Tatoy Desktop Computer 5. N6D-Faye Desktop Computer 6. N6D-CMAA Computer 7. N6E Desktop Computer 8. N6F-Placido Desktop Computer 9. N6F-Banez Desktop Computer 10. N6F-Awid Desktop Computer 11. Internet Desktop Computer 12. File Server 13. LCDR CARRIDO 14. LT BAUTISTA 15. LT ROSARIO 16. CPT DICEN 17. CPT PORTILLO 18. LT DNOC 19. LT AQUINO 20. Remy Antipoc 21. ON6 Laptop Computer (Nelson) ","routeslip":"","__v":0}
143+{"_id":{"$oid":"5f3e33c766cc3f0590a28aae"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677867","title":"Brief Description of the General Function of.docx.txt","filename":"/drive/textML/N6A/Brief Description of the General Function of.docx.txt","category":"","author":"System","deyt":{"$date":"2020-01-26T07:30:50.175Z"},"size":1227,"content":" Brief Description of the General Function of Information Technology Officer (ITO) ll: Formulate plans, policies, and manage IT infrastructure and cyber security controls; supervise the activities of subordinate analyst, researcher, programmer, and technologist in the conduct of systems development and maintenance of computers and IT networks. Specific Duties and Responsibilities: 1. Develop, review, and update the PN cyber security and information system policies and procedures. 2. Develop, review, and update the PN Information Systems Strategic Plan USSP) 3. Oversees the activities of subordinate analyst, and programmers in the development of information systems. 4. Oversees the activities of subordinate technologist in the conduct of preventive and corrective maintenance of computers and networks. 5. Evaluate and facilitate the fund request of PN units pertaining to Information and Communication Technology hardware and software. 6. Oversees the implementation of all funded ICT projects of the PN including cyber security controls, network infrastructure, and information systems. 7. Provides technical advice to superior officers on matters pertaining to information technology and cyber security. ","routeslip":"","__v":0}
144+{"_id":{"$oid":"5f3e33c766cc3f0590a28aaf"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677886","title":"Eclipse IDE.pdf.txt","filename":"/drive/textML/N6A/Eclipse IDE.pdf.txt","category":"","author":"System","deyt":{"$date":"2020-02-26T08:39:10.556Z"},"size":1863,"content":" X. 5%; Java for students Explore the English language on a new scale using AI—powered English lang ge navigator. Setting up Eclipse: J aVa's popular IDE Summary This tutorial will help you to install J DK (Java Development Kit), setup Eclipse IDE (Integrated development environment) and get started with Java. Keywords: IDE, Eclipse, JDK Downloads First of all you have to download some stuff from the Internet: 1. Download the latest J DK from: h_ttp:_//j ava.sun.com/j avase/downloads/index.jsp 2. Download Eclipse IDE for Java Developers from: http://www.eclipse.org/downloads/ Installation Run JDK installer and follow instructions. After you installed the JDK, unpack eclipse archive somewhere on a disk and run eclipse.eXe. Get started with Eclipse Select a workspace If you did previous steps right, you should see the following: % 'Workspace Launcher Select a workspace Eclipse Platform stores your projects in a Folder called a workspace. Choose a workspace Folder to use For this session. 'I.I'I.I'i:irl=:5pai:e: II:'I\"Ii-:n:urnents and '_:I\"E!l:l:lF\"\":I5'll::'\"E!F\"l5'l'.\"'.'\":\"l'l'=35 .'::. st I:l Use this as the default and do not aslrc. again Elli l l Cancel '-se -:-:-n1:r'il:-u1:-:-r'-_=. an-:l c-1:l':er'-_=.. EIIIIIIIII, L\"-'IIIIII'E\". .-'-'I.\"\" ri-grits res-ewe-:l. ..\"e'.-*- '... .-.1 '-\" I'--.1 lc-gc--_=. are tr'e-zlernerl-:-s or registere-:l tr'e-zlernerl-:-s of Ell.-n Fr\"- .-+' -.-'-uritrie-_=-. cur' I:--:-'r.l':. Eclir--=.-=- is =- tr\"-:-:lon'..'=ir'l-: of the F-\"' You are asked to select a workspace directory, where all of your further projects would be stored. You may leave the default folder or choose another one. It's important to remember this path for future. After you choose the workspace location, press ok and wait a little, while Eclipse is loading. Creating a project ","routeslip":"","__v":0}
145+{"_id":{"$oid":"5f3e33c766cc3f0590a28ab0"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677885","title":"ISSP-Template.pdf.txt","filename":"/drive/textML/N6A/ISSP-Template.pdf.txt","category":"","author":"System","deyt":{"$date":"2020-02-26T08:48:38.465Z"},"size":2075,"content":" I-I '. :.EI 7? III\"-.\"- \"if;=;'.5i;.\"'i'iI'=:?.-.i'1:.3';it§'E:'.\"I'L\"='i'5ft.:?.21' INFORMATION SYSTEMS STRATEGIC PLI 2018-2020 PART I. ORGANIZATIONAL PROFILE A. DEPARTMENT/AGENCY VISION / MISSION STATEMENT A.1. Mandate o Legal Basis The Department of Information and Communications Technology (DICT) was created 10844 \"An Act Creating the Department of Information and Communications Technc and Functions, Appropriating Funds Therefore and for Other Purposes\" which was ISSUI - Func ons A.2. Vision Statement \"An innovative, safe and happy nation that thrives through and is enabled by lnformatic Technology\" A.3. Mission Statement \"DlCT of the People, DICT for the People\". The DICT commits to: - Provide every Filipino access to vital ICT infostructure and services; Ensure sustainable growth of Philippine ICT-enabled industries resulting to creatic Establish a one digitized government, one nation; Support the National Government in fully achieving its goals; and Make the DICT as the enabler, innovator, achiever, and leader in pushing the cou transition towards a world-class digital economy. A.4. Major Final Outputs M FO 1 : Government- wide ICT Policy Services MFO 2 : Technical Advisory Services MFO 3 : ICT Training Services Fill-in Instructions: A.1 — State the legal basis for the creation of the organization and should likewise describe the major functions as indicated/I A.2 — State the wishful projection of the organization into the future; a statement of what your organization wants to become; A.3 - State the organization's scope and operations that assert its basic purpose, specify its principal products/sen/ices that 5 A.4 — Enumerate the MFOS as prescribed in the Organizational Performance Indicator Framework(OPIF). An MFO is a good mandated to deliver to external clients through the implementation of programs, activities and projects. Emphasis shou the Philippine Development Plan 's Key Result Areas and the critical indicators and results presented in the PDP Ftesuli ","routeslip":"","__v":0}
146+{"_id":{"$oid":"5f3e33c766cc3f0590a28ab1"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677897","title":"NOC DF.pdf.txt","filename":"/drive/textML/N6A/NOC DF.pdf.txt","category":"","author":"System","deyt":{"$date":"2020-04-26T14:03:11.571Z"},"size":1421,"content":" EH8 IV}-I V Y.' FFOIGCIIFIQ rne CD63, OECUFIHQ OUT I\"'UIU!'E-3*\" DISPOSITION FORM SECURITY CLASSIFICATION (IF ANY) File Number: Subject: Conduct of 1ST Quarter Test Firing of Naval Gun NOCB-0120- DIS of PC118. TO: VCOM, PN FROM: CNS DATE: COMMENT NR: N6 /9156 men SUMMARY: 1. References: a. CPF Radio Message Cite F30-0120- 011. b. HPN SOP Nr 02 re Test Firing of Naval Guns dated 21 Jan 20 2. Per reference _a_, the Commander, Philippine Fleet (CPF) is requesting clearance for the conduct of 15* Quarter Test Firing of Naval Guns of BRP EMILIO LIWANAG (PC118) on dates and maritime areas indicated: TYPE OF COORDINATES VESSEL GUN DATE VICINITY Pt. A - Lat 05\" 24.000' N Long 124\" 55.000' E 40MM AA . Pt. 3- Lat 05° 24.000: N BRP EM\"\"O Gun 11-12 Mar V'° 18 NM SW \"ff Long 125* 10.000' E LIWANAG 2020 Baiut Island, Davao (PC118) Occidental Pt C_ Lat 05., 08000, N Long 125° 10.000' E Pt. D- Lat 05\" 08.000' N Long 124° 55.000' E 3. Per coordination made with CG8, PCG, the issuance and publication of Notice to All Mariners (NOTAM) requires seven (7) days prior to the scheduled test firing activity. RECOMMENDATIONS: 4. VCOM, PN approval on the following: a. Request of CPF for the conduct of 15' Quarter Test Firing of Naval Gun of PC118. b. Authority for DNOC to release the radio message addressed to the Commandant, PCG forthe issuance of NOTAM. (Enci) DELACRUZ ","routeslip":"","__v":0}
147+{"_id":{"$oid":"5f3e33c766cc3f0590a28ab2"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677915","title":"CEIS Dir on PN Standard LAN and Network Security .docx.txt","filename":"/drive/textML/N6B/CEIS Dir on PN Standard LAN and Network Security .docx.txt","category":"","author":"System","deyt":{"$date":"2020-01-26T07:38:32.785Z"},"size":1482,"content":" PUNONGHIMPILAN HUKBONG DAGAT NG PILIPINAS (Headquarters Philippine Navy) Naval Station Jose V Andrada 2335 Roxas Boulevard, Manila CEIS DIRECTIVE ) NUMBER... ) SUBJECT: Supplemental Guidelines to SOP Nr. 13 dated 08 April 2009, Subject: Utilization of PN IT Facilities TO: See Distribution 1. REFERENCES: a. SOP Nr. 13 dated 08 April 2009, Subject: Utilization of PN IT Facilities b. CEIS LD Nr. 2012-001 dtd 19 Dec 2012, Subj: PN Standard LAN and Network Security c. Circular nr 29 dated 06 December 2017, Subject: PN Cybersecurity Policy. cl. 20 Critical Security Controls by SysAdmin, Audit, Network, Security (SANS) Institute. 2. PURPOSE: This CEIS Directive prescribes the supplemental guidelines to SOP Nr. 13 dated 08 April 2009, Subject: Utilization of PN IT Facilities particularly on the conformity to the SANS twenty (20) Critical Security Controls. 3. DEFINITION OF TERMS: a. Asset \"\" is any data, device, or other component of the environment that supports information-related activities. Assets generally include hardware (e.g. servers and switches), software (e.g. mission critical applications and support systems) and confidential information. b. Cybersecurity -deliberate synergy of technologies, processes, and practices to protect information and the networks, computer systems and appliances, and programs used to collect, process, store, and transport that information from attack, damage and unauthorized access. RESTRICTED (Page 1 of 8) ","routeslip":"","__v":0}
148+{"_id":{"$oid":"5f3e33c766cc3f0590a28ab3"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677901","title":"Red Team Assessment.docx.txt","filename":"/drive/textML/N6A/Red Team Assessment.docx.txt","category":"","author":"System","deyt":{"$date":"2020-05-26T02:41:08.876Z"},"size":1834,"content":" Result of the Scenarios (Objectives) Given to the Red Team The competition is comprised of several different scenarios, each with specific objectives that competitors must achieve to gain points. For each scenario, the teams will submit a report of their accomplishments which will be evaluated and verified by the Attack Task Group (ATG) to determine the total points acquired by each team. Verification is performed in combination of automated and manual review of the reports and evidences presented. For automated evaluation by a computer program or script, the teams will be provided with a formatted template with clear specifications that must be strictly followed. No considerations are given for wrong specification of data that may be unreadable. Each scenario has unique set of objectives and, therefore, teams will have different ways of earning points. Scenario 1 - Capture the Flag Objective: Red teams compete to gather as many flags as possible from the various challenges given. Result: DICT wins with 1600 point followed by PAF with 1500 and CEISSAFP with 1300 points. Scenario 2 - Network Discovery Objective: Discover the network and come up with a network map. Each team will identify the hosts, its running services, network devices, and determine how they are connected to each other in the network. A reporting template is distributed for each team to fill-in with the required information. Result: The RESERVIST identified the most number of devices and came up with accurate map of the network. Scenario 3 - Website Hack Objectives: Hack into the Mock-up ID System Web Server and extract the database of personnel records. Result: The DICT was able to find the vulnerability of the ID System and was able to gain access to all web pages without going through the login page. Several files were ","routeslip":"","__v":0}
149+{"_id":{"$oid":"5f3e33c766cc3f0590a28ab4"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677921","title":"AFDS_21_MAY_2019.docx.txt","filename":"/drive/textML/N6B/AFDS_21_MAY_2019.docx.txt","category":"","author":"System","deyt":{"$date":"2020-01-26T07:28:42.587Z"},"size":2245,"content":" Dc1're:2i Ivloy 20i9 Time: O94OH Office/ U nil Device Name Network Wireless Nome AFDS (4) Wireless 10.0.21 .0/24 AFDS (W\"RELESS_NET) ASO Wireless i0.0.2i .O/24 OAFS (W\"RELESS_N ET) AO4 — LOGISTICS Wireless I92.I 68.0.0/24 LOGISTICSZ, IP Addresses Q-I .\"'1'¢d*.ranced IP Ecanner — K Eile actions ettings Eiew elp Scan _.G E]: E : I'I\"}.\"}.2'\".'\" - 254 :55 572 ':3 :3 'V ':33 :33 VI I3-_=_=II'-II': E7 V Results Favorites Status I'-lame IP Manufacturer MAC address Comments \"\"\" 'I\"II.D.E'I.'I 1[3\".\"I\".E1.1 Watchliiuard Technologies, Inc. D\"I\":§'D:?F:AE:'IC:ElC 'I\"I\".D.E'I.53 1\"I\".D.E'I.53 Samsung Electronics Co.,Ltd 'I4:'IF:.T3:DD:E :95 . 'ID.[I\".2'I.5~4 1\"I\".D.E1.54 RaIinIcTechno\"ogj,r, Corp. \"I\"\"I\":\"I\"C:r-'I3:E'I:.T\"5«:EEI V E 113.13.21.55 1'\"]\".'\"]\".I-11.55 {lP_:E :E : C:A5:E1 Ii: H'\"'\"'F', WiFi—Re\":Ieater'».\"'.\"eIs Server n[H'\"'\"'F'DjI V . AFADI5 1\"I\".D.E'I.59 Intel Corporate DD:'IE:E-.7:D3:3D:4E HTTP, Authentication required! {Apache httpd 2.2.14] V . EIETCHA 1\"I\".\"I\".E1.E«E\" ASUSTelcCDMPUTEF'.\"NC. 'IC:E?:EC:5E-:EC:5f:« I: Usersl DDDTFIAINING-PC 1\"I\".\"I\".E1. E Hewlett Packard 9E:4B:E'I:A9:F9:EE. AFSDADMIN-D3 1\"I\".\"I\".E1..74 Dell Inc. F4:EE:3E:9EI:3E:5D 'I\"I\".D.2'I.?EI 'I\"I\".\"I\".E1.F\"E- GUANGDDNG DPPD MDBILETELECDMMUNICATI... EE.:D5:DC:CF:F\"5:?5 'I\"I\".D.2'I.B\"I\" 'I\"I\".\"I\".E1.E\"I\" ASUSTelc CDMPUTEFL ll'-IC. 34:9?:FE-:.I1E::1E:FE 'I\"I\".D.E'I.E.'I 1\"I\".\"I\".E1.E-'I D\"I\":D.7':E.3:C\"I\":C'I:3C L.\"1PTDP—HC4L\".JEEEl 'I\"I\".\"I\".E1.E~E- E~E\":C5:FE:D3:EA:53 DESPAI\"\"\\II—D3 'I\"I\".\"I\".E1.9\"I\" Dell Inc. F4:EE:3E:§'D:4E:5C CL\"'1k5DSP—'I5 1\"I\".\"I\".E1.El\"I Dell Inc. F4:E»E:3E»:9D:4E«:'I\"I\" DJ'1kEi'F'.DA—'ID 'I\"I\".\"I\".E1.9E Dell Inc. F4:E»E:3E»:9E«:3E:C\"I\" CJESPJ'l.r5lDM\"N—D5 1[I\".\"I\".E1.9Eu Dell Inc. F4:E.E:3E.:9E:3r1:El5 'lD.\"I\".2l.9E. 1[I\".\"I\".E1.9E. V . ERWQIMEGADGEEEB 1[I\".\"I\".E1.99 Hon Hai Precision Ind. Co.,Ltd. 9D:4E:9A:D9:EE:E3 HTTP, Brother MFC—JEDD IIDeI::Iut ernlcledded httpd 'I.E\"I\"] IE\" I-_I'P I[Erother_a'HP printer Ftpd 1.13] V . DESP.\"'lI\"'*-IEI-\"I\"'I 1\"I\".\"I\".E1.1E\"\"I\" Dell Inc. F4:EE:3E:9D:4E:EF I: Users v ?4 alive, D dead, TED unlcnown pi . 'cs. [3 D 1:; E ' 2\"? ,.;;:;:-.5 'ID ::1:u:: 9:-15A\"\"i-'1 E ","routeslip":"","__v":0}
150+{"_id":{"$oid":"5f3e33c766cc3f0590a28ab5"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677936","title":"Brief Description of the General Function of.docx.txt","filename":"/drive/textML/N6B/Brief Description of the General Function of.docx.txt","category":"","author":"System","deyt":{"$date":"2020-01-26T07:30:50.175Z"},"size":1227,"content":" Brief Description of the General Function of Information Technology Officer (ITO) ll: Formulate plans, policies, and manage IT infrastructure and cyber security controls; supervise the activities of subordinate analyst, researcher, programmer, and technologist in the conduct of systems development and maintenance of computers and IT networks. Specific Duties and Responsibilities: 1. Develop, review, and update the PN cyber security and information system policies and procedures. 2. Develop, review, and update the PN Information Systems Strategic Plan USSP) 3. Oversees the activities of subordinate analyst, and programmers in the development of information systems. 4. Oversees the activities of subordinate technologist in the conduct of preventive and corrective maintenance of computers and networks. 5. Evaluate and facilitate the fund request of PN units pertaining to Information and Communication Technology hardware and software. 6. Oversees the implementation of all funded ICT projects of the PN including cyber security controls, network infrastructure, and information systems. 7. Provides technical advice to superior officers on matters pertaining to information technology and cyber security. ","routeslip":"","__v":0}
151+{"_id":{"$oid":"5f3e33c766cc3f0590a28ab6"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677922","title":"2ndProg.py.txt","filename":"/drive/textML/N6B/2ndProg.py.txt","category":"","author":"System","deyt":{"$date":"2020-06-16T23:06:59.217Z"},"size":318,"content":" #init variable that will allow rating input rating = int(input('From 1-10, rate this training: ')) #check rating if not woth it or helped a lot if (rating <= 3): #1-3 print ('It\"˜s not worth it.') elif (rating > 3) and (rating < 7): # 4-6 print ('well, It\"˜s ok.') else:#7\"\"1G print('Great! It helped me a lot!') ","routeslip":"","__v":0}
152+{"_id":{"$oid":"5f3e33c766cc3f0590a28ab7"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677948","title":"COMMO MONITORING N6B.docx.txt","filename":"/drive/textML/N6B/COMMO MONITORING N6B.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-25T12:27:30.891Z"},"size":904,"content":" (Plans and Programs) COMMO MONITORING N6B Subject FOIC NICTC Other PN Units NRMO RRF Availability of fund to support ISO —Reconci\"e NRMO _STL 27001—\"SMS comment _aWai ng Comment Availability of fund to support CCTV —Reconci\"e NRMO —Rad Msg + Tracer Requirements comment —awaiting supporting docs Availability of fund to support —Approved — Rad Msg — Routing license software for 7 PN Units — Awaiting APPMP (Inclusion) Availability of fund to support —Approved license software and AD in HPN Availability of fund to support ICT — STL CMOG inclusion requirement for CMOG in MITHI Availability of fund to support ICT 117T requirement for Mine Warfare Offc. Availability of fund to support SDE — Awaiting validation for NPAO of POE Availability of fund to VTS for NPMC — Awaiting POE from NPMC Availability of Computers for ONSS — awaiting network diagram ","routeslip":"","__v":0}
153+{"_id":{"$oid":"5f3e33c866cc3f0590a28ab8"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677950","title":"CONFIG MGMT-16Jan2019.docx.txt","filename":"/drive/textML/N6B/CONFIG MGMT-16Jan2019.docx.txt","category":"","author":"System","deyt":{"$date":"2020-07-08T06:19:27.696Z"},"size":2007,"content":" PUNONGHIMPILAN HUKBONG DAGAT NG PILIPINAS (Headquarters Philippine Navy) Naval Station Jose Andrada 2335 Roxas Boulevard, Manila O/N6 CIRCULAR NUMBER Philippine Navy Command and Control, Computers, Communication, and Intelligence Surveillance and Reconnaissance (C4\"SR) Systems Configuration Management Policy 1. PURPOSE: The purpose of this policy is to provide specific guidance and advisory to Philippine Navy units, offices, personnel, and third party stakeholders to ensure the employment of standard configurations to PN C4\"SR Systems. It provides guidelines for the creation and maintenance of baseline configuration and employment of configuration change control (CCC) processes as mandated in Circular Nr 29 dated 06 December 2017: PN Cybersecurity Policy. This policy is important in order to maintain a secure C4\"SR Systems for the PN and supports for managing security risks. This policy adopts the National Institute for Standards and Technology Special Publication (NIST-SP) 800-53 for Configuration Management (CM) wherein the controls under the said publication were mapped in ISO/IEC 27001 for Information techno\"ogy—Security Techniques- lnformation Security Management Systems (\"SMS)—Requirements. 2. SCOPE: This policy applies to all PN personnel and third party stakeholders who administer, maintain, and operate PN C4\"SR Systems. C4\"SR Systems include but not limited to software/applications, operating system, Cybersecurity systems, and software—enab\"ed C3 system and ISR systems. 3. DEFINITION OF TERMINOLOGIES: a.—Baseline Configuration - is a documented, formally reviewed and agreed—upon sets of specifications for systems or configuration items within those systems. Baseline configurations serve as a basis for future builds, releases, and/or changes to systems. Baseline configurations include information about system components, network topology, and the logical placement of those components within the system architecture. RESTRICTED (Page 1 of 14) ","routeslip":"","__v":0}
154+{"_id":{"$oid":"5f3e33c866cc3f0590a28ab9"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677943","title":"CRA Checklist_Answers.docx.txt","filename":"/drive/textML/N6B/CRA Checklist_Answers.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-18T03:52:12.272Z"},"size":1398,"content":" CRA Checklist (for PN Only) Resource Person for the Vulnerability Management: Sgt Rigos Critical Security Controls Policies Tools Reports CSC 4 — Vulnerability Mgmt Sgt Esparagoza Utilize VA tools Implementation - Nessus Pro Weekly Conduct of Compare VA results and prioritize remediation Assigned to cyber group but during resolution it shared among person VA...generated report is submitted Resolved with the stakeholder/ programmer on the reports of the NESSUS and submitted to the ISO and ISNCO Software Update and Patch Mgmt Con gured WSUS System in the AD in the same server. CSC 8 - Data Recovery Sgt Gonzales Ensure all system data are Draft Policy to Backup and Reports on automatically and regularly backup backup Recovery conducted backup Software Backup as complete system Cloning or (imaging) imaging software CSC 14 — Monitoring and Audit of Logs Enable Logging and NTP Policy on Logs and NTP server and Reports on Network Network Monitoring check logs Monitoring as Review of Logs to identify IDS or any generated by the anomalies Network SIEM or IDS Monitoring Log collection and Deployment of SIEM SIEM CSC 18 — Incident Response and Mgmt Ensure incident response plan CERT Policy AAR on cyber incidents Devise a mechanism for the Policy pertaining to Trouble Ticketing Reports from the reporting of any anomalies reporting of System or Hotline end users ","routeslip":"","__v":0}
155+{"_id":{"$oid":"5f3e33c866cc3f0590a28aba"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677964","title":"Conference-01Oct2019.docx.txt","filename":"/drive/textML/N6B/Conference-01Oct2019.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-25T12:12:22.377Z"},"size":1503,"content":" ICT Project Updates — 01 October 2019 Minutes of Conference Procurement Monitoring Svstem CNICTC intends to launch the system prior the 2\"\"' semester command conference. DN6 suggested: Include target date on every sub—phases. Re—audit (VAPT) on every modi cation of the system. Separate systems admin: System admin as owner and system admin as technical. Monitoring will be feed to the SOC. Audit log includes event about unauthorized access. Foresight the archiving of logs and database. Remove the project trail in the public viewing. '°9°.\".°'P\":'>S\"!\"!' . Admin can only view all entries but does not have privilege to edit any entry. 10. Simulation training of the system on 03 Oct 2019 11. DN6: Initial test with the end users prior command conference 12. Issues on encoding previous and ongoing projects into the system will be resolved by N4 Red and Gray Network Current Setup 1. CSG: Direct NICT stations to submit network diagram in Visio format to consolidated in order to come up a holistic network architecture of the PN 2. NICTC to come up an enterprise AD architecture. 3. Next week follow up. CONOPS for the Cyber Lab 1. LCDR SORIANO seeks guidance from N2 regarding this matter. 2. N6 and NICTC to craft the CONOPS 3. DN6: in Coordination with N2 on the concept of the Cyber Lab. \"U E' No designated officer to implement the PKI. !\" Communicate with the NICTC on the implementation of PKI U) \"U 3. CSG: Start planning cloud computing. ","routeslip":"","__v":0}
156+{"_id":{"$oid":"5f3e33c866cc3f0590a28abb"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677960","title":"Comparison of Mobile Phones with regards to Privacy and Security.docx.txt","filename":"/drive/textML/N6B/Comparison of Mobile Phones with regards to Privacy and Security.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-25T12:05:28.254Z"},"size":953,"content":" Comparison of Mobile Phones with regards to Privacy and Security Parameters Huawei Oppo Samsung Encryption Fi\"e\"\"based Fi\"e\"\"based (AES 256 bit) (AES 256 bit) Authentication Pin, Password, Pin, Password, Pin, Password, Pattern, Pattern Pattern Fingerprint and Iris Scanner Privacy Protection (e.g. disable Yes Yes Yes location) Security Patch Time\"\"frame Monthly Scheduled Monthly, Quarterly, an Only when necessary Password Protected Files SecureFo\"der Reputable Apps Store Less stringent review in Playstore Operating System Open Source (Can be freely modified) Hardware Advance RISC Machine Main Office Location China South Korea Embedded Spying Chips no substantial proof of espionage has ever been established Assessment: All mobile phones provide the necessary security features for data protection. I- more advantage in having less reported malware due to its proprietary OS and a more strir applications in the App Store. ","routeslip":"","__v":0}
157+{"_id":{"$oid":"5f3e33c866cc3f0590a28abc"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677978","title":"Cyber Bulletin 2020 -08 - TIKTOK.doc.rodel.pdf.txt","filename":"/drive/textML/N6B/Cyber Bulletin 2020 -08 - TIKTOK.doc.rodel.pdf.txt","category":"","author":"System","deyt":{"$date":"2020-06-18T02:21:48.047Z"},"size":869,"content":" -000- OUTGOING DISPATCH TRANSMITTING CALL SERIAL NO PRECEDENCE DATEITIMEIGRP IMWMSTRUCTIONS 'P' ,4' I FM: FOIC, PN DRAFTED BY: _ R BA RA A PM \\h——.'_'//'\\_,./ TO: ALL PN UNITS (ATTN: 3/6) APPROVED BY: COL NICANOR PN(M)(GSC) INFO: co, NICT STATIONS RELEASED BY: CAPT SAMBALILO PMGSC) SCTY _ CLSFN CONFID PRECEDENCE. PRIORITY BT . . . CONFID x CITE N6B-O420- x 1. 2. IS THE ECOPY OF PN CYBER SECURITY BULLETIN 2020-O8 SUBJ: REFERENCE: HPN SOP NR 07 DTD 01 AUG 2013 SUBJ: PN COMPUTER EMERGENCY RESPONSE TEAM (PNCERT) ICOW ABOVE REF, FORWARDED TO UNIT 3/6 PNCS (ZIMBRA) ACCOUNT US GOVERNMENT AGENCIES HAVE BANNED TIK TOK APPLICATION ITR, DIRECT YOUR RESPECTIVE UNIT/OFFICE CEIS OFFR TO FACILITATE THE DISSEMINATION OF SAID BULLETIN. LATERAL COORDINATION WITH THE NEAREST NICT STATION IS HIGHLY ENCOURAGED. FOR WIDEST DISSEMINATION. 3. 4. ..BT ","routeslip":"","__v":0}
158+{"_id":{"$oid":"5f3e33c866cc3f0590a28abd"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677985","title":"Cyber Bulletin Nr 2020 13 - FaceApp-Edited.docx.txt","filename":"/drive/textML/N6B/Cyber Bulletin Nr 2020 13 - FaceApp-Edited.docx.txt","category":"","author":"System","deyt":{"$date":"2020-07-08T06:40:49.216Z"},"size":1174,"content":" PUNONGHIMPILAN HUKBONG DAGAT NG PILIPINAS (Headquarters Philippine Navy) Office of the AC of NS for C4lSR Systems, N6 Naval Station Jose Andrada 2335 Roxas Boulevard, Manila 3% witilg Eb'. ' I .-_. =5 _. iuun lllli-\".~ ' tr\" . . .L _ r - - g'. =l\"~\"'ll'\"3ll*.l'l?:'~i\"- N6B CYBERSECURITY BULLETIN: 2020-13 Filipinos Warned Against the Consequences of Exposing Their Data To a Mobile Application Sourced from: https://manilastandard.net/tech/tech-news/326498/new-faceapp-no-malicious— e\"ements—but—users-must—be—carefuI.html Security concerns about Russian—based FaceApp resurfaced anew nearly a month after the emergence of clone or ghost accounts on Facebook. FaceApp, released in 2017, is a mobile application that allows users to generate realistic transformations of their faces which became one of the most downloaded mobile applications across the world today. The FaceApp application has started to circulate on social networks after the free launch of the \"gender swap\" filter. The new craze has generated the hashtag \"faceappcha\"\"enge\" and received hundreds of thousands of shares on Facebook and lnstagram. ","routeslip":"","__v":0}
159+{"_id":{"$oid":"5f3e33c866cc3f0590a28abe"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677986","title":"Conference-29Aug2019.docx.txt","filename":"/drive/textML/N6B/Conference-29Aug2019.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-25T12:41:27.305Z"},"size":1778,"content":" Information Systems Updates Conference: 29 August 2019 Agenda: Updates on Procurement Monitoring System 1. 2. .°'.U':'>9° 10. 11. 12. 13. 14. Invite PS3 and PS6 of AFP PS to be involved in the Procurement System next week. Sub—phases for the PHASE 1 (275 working days) are: a. Sub Phase 1 — Competitive Bidding (95 working days) b. Sub Phase 2 — Alternative mode of procurement c. Sub Phase 3 — File Uploading Submit documentary requirements to COA prior NTP. Phase 2 — implement PKI and Bar coding Phase 3 Cloud based, data analytics, and noti cation service For modi cation: a. Delete option is deleted b. Monitoring number of dates, warning to user for the number of dates. c. Progress or milestone payment (this maybe irrelevant because of the \"remark\" option) d. Growth repair Procurement service only encodes contract number and not controls number. Project Control number will be the UPR number. End user will encode the UPS number. Add contract number for PS. drop down \"mode of procurement — Competitive bidding and alternative mode\", Display \"NOA and supplier\" if alternative mode of procurement. Separate interface for internal end users (FOIC monitoring) and public users (supplier). Remove \"remarks\" in public viewing status only. Develop Flowchart for the end users appreciation. Next week. Workshop next week for PRISM. Conference Meeting on 03 September 2019 at 1500H. Agenda: Updates on NRC MIS 1. .°'.\"'P9°!\" Start encoding of data (build up database) while developing the other requirements of NRC. Define project objectives and rationale. Develop the entire NRCMIS project in phases. Target date of completion - 10 September 2019. Deployment— 11 September. Users training 12 September. ","routeslip":"","__v":0}
160+{"_id":{"$oid":"5f3e33c866cc3f0590a28abf"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119677992","title":"NOA for IJATCSE journal.docx.txt","filename":"/drive/textML/N6B/NOA for IJATCSE journal.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-21T12:28:24.249Z"},"size":1293,"content":" IRCCEI53 I 'lH1-I!I'lIr'IIl\"I\"l-i-ll Hun.\" -'..'r'\"I~I:lIil.2:1IIlrrI'1:IuI:1:uIuEIHIHLI-Irll-r:t\". lIL1'\"irII.-4:I'i:II:_'\"_ F'rIIII:.'=I1iIIr-I :IrIr\"- FrIIII:.'I1iII:1:I\" T:-.r:III1I1\"II!\"'-,- .I.IIIII.II-I.-:I'I III '-\":'-'II\"I.II'III.-.-IIIIIIIIIII.Illllr.-IIIHIIIIII'I-IIIIII- II_\"II.-\"IIIII..- I'III'.\"I\"IIIII--. December 30, 2019 Dear Author/s, We are pleased to inform you that your paper has been accepted for ORAL PRESENTATION in INTERNATIONAL RESEARCH CONFERENCE IN COMPUTING, ENGINEERING, EDUCATION AND EDUCAT\"ON\"\"TECHNOLOGY (IRCCEEE 2020) an international conference which will be held on January 9-10, 2020 at LA PIAZZA HOTEL AND CONVENTION CENTER, Imelda Roces Ave, Legazpi City, Philippines Your paper is also considered for publication to International Journal of Advanced Trends in Computer Science and Engineering (IJATCSE) (ISSN: 2278-3091, a Scopus-indexed journal since 2018) subject to the conditions and standards agreed between the IRCCEEE 2020 and the IJATCSE editor-in-chief. Please revise your paper according to the suggestions of the peer reviewers from the previous notification you have received. Your paper may still be rejected if these instructions are not followed. Respectfully yours, Rhowel M. Dellosa, D.Eng. Conference Chair, IRCCEEE 2020 ","routeslip":"","__v":0}
161+{"_id":{"$oid":"5f3e33c866cc3f0590a28ac0"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119678007","title":"NOC DF Conduct of 1st Quarter Test Firing of Naval Gun of PC118.pdf.txt","filename":"/drive/textML/N6B/NOC DF Conduct of 1st Quarter Test Firing of Naval Gun of PC118.pdf.txt","category":"","author":"System","deyt":{"$date":"2020-02-26T08:55:31.703Z"},"size":1421,"content":" EH8 IV}-I V Y.' FFOIGCIIFIQ rne CD63, OECUFIHQ OUT I\"'UIU!'E-3*\" DISPOSITION FORM SECURITY CLASSIFICATION (IF ANY) File Number: Subject: Conduct of 1ST Quarter Test Firing of Naval Gun NOCB-0120- DIS of PC118. TO: VCOM, PN FROM: CNS DATE: COMMENT NR: N6 /9156 men SUMMARY: 1. References: a. CPF Radio Message Cite F30-0120- 011. b. HPN SOP Nr 02 re Test Firing of Naval Guns dated 21 Jan 20 2. Per reference _a_, the Commander, Philippine Fleet (CPF) is requesting clearance for the conduct of 15* Quarter Test Firing of Naval Guns of BRP EMILIO LIWANAG (PC118) on dates and maritime areas indicated: TYPE OF COORDINATES VESSEL GUN DATE VICINITY Pt. A - Lat 05\" 24.000' N Long 124\" 55.000' E 40MM AA . Pt. 3- Lat 05° 24.000: N BRP EM\"\"O Gun 11-12 Mar V'° 18 NM SW \"ff Long 125* 10.000' E LIWANAG 2020 Baiut Island, Davao (PC118) Occidental Pt C_ Lat 05., 08000, N Long 125° 10.000' E Pt. D- Lat 05\" 08.000' N Long 124° 55.000' E 3. Per coordination made with CG8, PCG, the issuance and publication of Notice to All Mariners (NOTAM) requires seven (7) days prior to the scheduled test firing activity. RECOMMENDATIONS: 4. VCOM, PN approval on the following: a. Request of CPF for the conduct of 15' Quarter Test Firing of Naval Gun of PC118. b. Authority for DNOC to release the radio message addressed to the Commandant, PCG forthe issuance of NOTAM. (Enci) DELACRUZ ","routeslip":"","__v":0}
162+{"_id":{"$oid":"5f3e33c866cc3f0590a28ac1"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119678012","title":"NPC Request for courtesy call.doc.txt","filename":"/drive/textML/N6B/NPC Request for courtesy call.doc.txt","category":"","author":"System","deyt":{"$date":"2020-05-26T02:36:04.492Z"},"size":1028,"content":" PUNONGHIMPILAN HUKBONG DAGAT NG PILIPINAS (Headquarters Philippine Navy) Naval Station Jose Andrada 2335 Roxas Boulevard, Manila COMMISSIONER RAYMUND ENRIQUEZ LIBORO. PRIVACY COMMISSIONER AND CHAIRMAN National Privacy Commission PICC Building Roxas Blvd. Metro Manila Attention: Conrad Dela Cruz IT Officer I Compliance and Monitoring Division Dear Commissioner Liboro: Greetings! We, the delegation from Philippine Navy, would like to request for a meeting/ courtesy call at your office on 16 June 2019. We intend to discuss matters about our upcoming Cyber Defense Exercise 2019. Prior coordination was made with the attention officer to provide overview about the event and the needed participation of the NPC. Should our request be granted, please contact our office at 522-2376 or LT RUSSEL JOHN V BAUTISTA PN at 09178130401 or LCDR RODEL G BARRACA PN at 09178095116. Thank you and more power! Sincerely, FOR THE FLAG OFFICER IN COMMAND, PN: ERIC E NICANOR Colonel PN(M)(GSC) AC of NS for C4\"SR Systems, N6 ","routeslip":"","__v":0}
163+{"_id":{"$oid":"5f3e33c866cc3f0590a28ac2"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119678004","title":"Dear Mr.docx.txt","filename":"/drive/textML/N6B/Dear Mr.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-18T01:50:32.806Z"},"size":1390,"content":" INTERNATIONAL RESEARCH CONFERENCE IN COMPUTING, ENGINEERING, EDUCATION AND EDUCATION TECHNOLOGY (IRCCEEE 2020) January 5*-10, 2iIi2iIi at LA PIAZZA HCITELAND CONVENTION CENTER, Imelda Reeea Ave,Lega2piCity,Pi1i\"ippinee [All presented and aeeepted papers will he published in SCOPUS indexed pr REFEREEDjdLIrna\"] Dear Mr. Nelson Maligro: Paper Title: Secured Instant Messaging Application using Hybrid Encryption Algorithm We are pleased to inform you that your paper has been accepted for ORAL PRESENTATION in INTERNATIONAL RESEARCH CONFERENCE IN COMPUTING, ENGINEERING, EDUCATION AND EDUCATION TECHNOLOGY (IRCCEEE 2020) which will be held on January 9-10, 2020 at LA PIAZZA HOTEL AND CONVENTION CENTER, Imelda Roces Ave, Legazpi City, Philippines. This email also served as notification for publication in Scopus-indexed journal. Please find reviewer's comments below for the basis of your revisions. Additional instruction will be given to you during the conference for the publication instruction. Please revise your paper according to reviewer's comments and make sure that the similarity index using turnitinlithenticate or any reliable plagiarism software will not exceed 15%. Please visit wvvw.irccee2020.com for more announcement and updates. We are looking forward to meeting you at the conference. Respectfully yours, Organizing and Technical Committee of IRCCEE 2019 ","routeslip":"","__v":0}
164+{"_id":{"$oid":"5f3e33c866cc3f0590a28ac3"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119678026","title":"PN Eclipse IDE - 3.pdf.txt","filename":"/drive/textML/N6B/PN Eclipse IDE - 3.pdf.txt","category":"","author":"System","deyt":{"$date":"2020-04-26T14:46:07.274Z"},"size":1863,"content":" X. 5%; Java for students Explore the English language on a new scale using AI—powered English lang ge navigator. Setting up Eclipse: J aVa's popular IDE Summary This tutorial will help you to install J DK (Java Development Kit), setup Eclipse IDE (Integrated development environment) and get started with Java. Keywords: IDE, Eclipse, JDK Downloads First of all you have to download some stuff from the Internet: 1. Download the latest J DK from: h_ttp:_//j ava.sun.com/j avase/downloads/index.jsp 2. Download Eclipse IDE for Java Developers from: http://www.eclipse.org/downloads/ Installation Run JDK installer and follow instructions. After you installed the JDK, unpack eclipse archive somewhere on a disk and run eclipse.eXe. Get started with Eclipse Select a workspace If you did previous steps right, you should see the following: % 'Workspace Launcher Select a workspace Eclipse Platform stores your projects in a Folder called a workspace. Choose a workspace Folder to use For this session. 'I.I'I.I'i:irl=:5pai:e: II:'I\"Ii-:n:urnents and '_:I\"E!l:l:lF\"\":I5'll::'\"E!F\"l5'l'.\"'.'\":\"l'l'=35 .'::. st I:l Use this as the default and do not aslrc. again Elli l l Cancel '-se -:-:-n1:r'il:-u1:-:-r'-_=. an-:l c-1:l':er'-_=.. EIIIIIIIII, L\"-'IIIIII'E\". .-'-'I.\"\" ri-grits res-ewe-:l. ..\"e'.-*- '... .-.1 '-\" I'--.1 lc-gc--_=. are tr'e-zlernerl-:-s or registere-:l tr'e-zlernerl-:-s of Ell.-n Fr\"- .-+' -.-'-uritrie-_=-. cur' I:--:-'r.l':. Eclir--=.-=- is =- tr\"-:-:lon'..'=ir'l-: of the F-\"' You are asked to select a workspace directory, where all of your further projects would be stored. You may leave the default folder or choose another one. It's important to remember this path for future. After you choose the workspace location, press ok and wait a little, while Eclipse is loading. Creating a project ","routeslip":"","__v":0}
165+{"_id":{"$oid":"5f3e33c866cc3f0590a28ac4"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119678038","title":"Old Rootcon.doc.txt","filename":"/drive/textML/N6B/Old Rootcon.doc.txt","category":"","author":"System","deyt":{"$date":"2020-04-26T14:42:50.464Z"},"size":1765,"content":" e Ok HEADQUARTERS PHILIPPINE NAW \\ E . OFFICE OF THE AC OF NS FOR C4lSR SYSTEMS, N6 'gt Naval Station Jose Andrada Ii\"?-f'7\"-'f'.'_'.F'..'_'.'fF_?\"%I\"'~'\".t 2335 Roxas Boulevard, Manila From: Staff Officer, Cyber Warfare Management Branch To: AC of NS for C4\"SR Systems, N6 Via: Deputy AC of NS for C4\"SR Systems, N6 Subj: Attendance to RootCon Hackers' Conference Ref: FOIC, PN approved DF dated 02 August 2019, subject: Attendance to RootCon Event Encls: 1) Topic Presentations 2) AAR from LTJG MARIO N TRIBUNAL PN 3) Pictures with caption I. General: ROOTCON is an annual cyber security conference and the largest hacking conference in the Philippines. The event aims to foster camaraderie and sharing of expertise among cybersecurity professionals, security researchers, and ethical hackers. A two-day activity showcasing lectures on the latest techniques and tactics of hacking, a hands-on experience on ways of cracking devices; and competing in the Capture the Flag (CTF) contest - a special kind of cybersecurity competition designed to challenge its participants to solve computer security problems. This activity was held on 26-27 September 2019 at Taal Vista Hotel, Tagaytay and was attended by LCDR RODEL G BARRACA PN, CPT JEAN PAUL T SAN GABRIEL PN(M), LTJG MARIO N TRIBUNAL PN, LTJG JOMAR M WELBA PN, SN2 Rhea T Espinosa PN, and Mr. Nelson G. Maligro CE. ll. Schedule of Activities: Time Activitiesl Topics Resource Person Day 1 O9OOH-O93OH Keynote CDR LOPEZ, Commander, AFPCYG O93OH-1015H Navigating the Shift from Opportunistic to Targeted Christopher Elisan Ransomware 1015H-1115H Capture The Flag (CTF) game participated by ON6 and NICTC personnel. 1115H-1215H Farewell, WAF — Exploiting SOL Boik Su ","routeslip":"","__v":0}
166+{"_id":{"$oid":"5f3e33c866cc3f0590a28ac5"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119678047","title":"Philippine Navy NICTS.pdf.txt","filename":"/drive/textML/N6B/Philippine Navy NICTS.pdf.txt","category":"","author":"System","deyt":{"$date":"2020-04-26T14:44:02.616Z"},"size":1601,"content":" rnone 333-43254 tax: 0344413 ' IN I CKNAI IUNAL email: or0@ 0r0—int1.c0m V CORPORAHON www. 0r0—int1.c0m, wwwdigitizingdocuments.c0m lo: —\\I.I'l \\ 0 -' run: /-' 3.''-.__.- ._._.-'_f. » WITH 09 January 20l 9 id 0 (._'«.'ll\"l\".\"..l~.' :\".ux\"*.m'\" Nelson Maligro, ON6 Philippine Navy Via email: nelsonmaligro@gmail.com Dear n Thank you for meeTing wiTh us lasT November 20l8 To discuss your documenT managemenT reauiremenfs. May We Take This opporTuniTy To summarize The Globodox DIv\\S objecTives discussed during The meeTing: i. To respond quickly To The search/reTrieval of records. Globodox DMS provides several search meThods including The reTrieval of records by indices or by a documenT's conTenT, very similar To how a search and reTrieve is made in Yahoo or Google. 2. To demonsTraTe office efficiency. Refrieval of records can be by school name, by Teacher's name such as lasT name, firsT name, middle name, localiTy, and oTher fields. FMWC would like To define. Globodox DMS provides simple and advance search funcTions. 3. To have a backup of records elecTronically. ElecTronic records (scanned civil regisTry images, Iv\\icrosofT Office files, email, and oTher forms of elecTronic files) placed inTo Globodox DIv\\S can be copied inTo exTernal medias To serve as a backup of original paper and office records. 4. To mainTain disasTer recovery measures in Times of fire, rain, and earThaual<es. In case of disasTer, Globodox DMS can uTilize These exTernal disl<s/CDs and recreaTe The server daTabase for business conTinuiTy. 2000-001 ","routeslip":"","__v":0}
167+{"_id":{"$oid":"5f3e33c866cc3f0590a28ac6"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119678044","title":"Red Team Assessment.docx.txt","filename":"/drive/textML/N6B/Red Team Assessment.docx.txt","category":"","author":"System","deyt":{"$date":"2020-05-26T02:41:08.876Z"},"size":1834,"content":" Result of the Scenarios (Objectives) Given to the Red Team The competition is comprised of several different scenarios, each with specific objectives that competitors must achieve to gain points. For each scenario, the teams will submit a report of their accomplishments which will be evaluated and verified by the Attack Task Group (ATG) to determine the total points acquired by each team. Verification is performed in combination of automated and manual review of the reports and evidences presented. For automated evaluation by a computer program or script, the teams will be provided with a formatted template with clear specifications that must be strictly followed. No considerations are given for wrong specification of data that may be unreadable. Each scenario has unique set of objectives and, therefore, teams will have different ways of earning points. Scenario 1 - Capture the Flag Objective: Red teams compete to gather as many flags as possible from the various challenges given. Result: DICT wins with 1600 point followed by PAF with 1500 and CEISSAFP with 1300 points. Scenario 2 - Network Discovery Objective: Discover the network and come up with a network map. Each team will identify the hosts, its running services, network devices, and determine how they are connected to each other in the network. A reporting template is distributed for each team to fill-in with the required information. Result: The RESERVIST identified the most number of devices and came up with accurate map of the network. Scenario 3 - Website Hack Objectives: Hack into the Mock-up ID System Web Server and extract the database of personnel records. Result: The DICT was able to find the vulnerability of the ID System and was able to gain access to all web pages without going through the login page. Several files were ","routeslip":"","__v":0}
168+{"_id":{"$oid":"5f3e33c866cc3f0590a28ac7"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119678054","title":"Taal Vista Hotel Reservation Confirmation.docx.txt","filename":"/drive/textML/N6B/Taal Vista Hotel Reservation Confirmation.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-01T12:26:13.011Z"},"size":1194,"content":" Taal Vista Hotel Reservation Confirmation Dear Mr. Maligro, Thank you for choosing Taal Vista Hotel. We are pleased to confirm your reservation as detailed below. Reservation Details Con rmation Number Guest Name Arrival Date Departure Date Number of Nights Number of Guest Room Type Nightly Rate Guaranteed Method Breakfast Grand Total Check-in Time Check-out Time 1054480 Mr. Nelson Maligro 25 September 2019 27 September 2019 2 1 Adult 1 Premier King Lake Wing Bldg. Premier at PHP 8,9250.00 Room rates per night are inclusive of VAT, service charge, and local government tax. Your reservation is on a TENTATIVE status. **P\"ease deposit FULL payment on/before August 23, 2019 (until 4PM) . ** AUTO CANCEL IF UNSETTLED ON THE GIVEN OPTION DATE ** Payment is non refundable Bank Name: Any BANCO DE ORO branch Account Name: SM PRIME HOLDINGS INC — TAAL VISTA HOTEL Reference Number: F\"T0000007463 Account Number: 1500009073 A copy of the deposit slip must be sent thru email at reservations@taa\"vistahote\".com. Buffet Breakfast is included PHP 17,900.00 Total amount per stay are inclusive of VAT, service charge, and local government tax. 02:00 PM 12:00 NN ","routeslip":"","__v":0}
169+{"_id":{"$oid":"5f3e33c866cc3f0590a28ac8"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119678060","title":"Rootcon.docx.txt","filename":"/drive/textML/N6B/Rootcon.docx.txt","category":"","author":"System","deyt":{"$date":"2020-02-26T08:59:10.256Z"},"size":1758,"content":" KEP what HEADQUARTERS PHILIPPINE NAW \\ E . OFFICE OF THE AC OF NS FOR C4\"SR SYSTEMS, N6 \"E5 Naval Station Jose Andrada HI\"?!-f'7\".*.'_'f,F*]_!-='§E__Tf\"fl\"'§h-t\"'.: 2335 Roxas Boulevard, Manila From: Staff Officer, Cyber Warfare Management Branch To: AC of NS for C4\"SR Systems, N6 Via: Deputy AC of NS for C4\"SR Systems, N6 Subj: Attendance to RootCon Hackers' Conference Ref: FOIC, PN approved DF dated 02 August 2019, subject: Attendance to RootCon Event Encls: 1) Topic Presentations 2) AAR from LTJG MARIO N TRIBUNAL PN 3) Pictures with caption I. General: ROOTCON is an annual cyber security conference and the largest hacking conference in the Philippines. The event aims to foster camaraderie and sharing of expertise among cybersecurity professionals, security researchers, and ethical hackers. A two-day activity showcasing lectures on the latest techniques and tactics of hacking, a hands-on experience on ways of cracking devices; and competing in the Capture the Flag (CTF) contest - a special kind of cybersecurity competition designed to challenge its participants to solve computer security problems. This activity was held on 26-27 September 2019 at Taal Vista Hotel, Tagaytay and was attended by LCDR RODEL G BARRACA PN, CPT JEAN PAUL T SAN GABRIEL PN(M), LTJG MARIO N TRIBUNAL PN, LTJG JOMAR M WELBA PN, SN2 Rhea T Espinosa PN, and Mr. Nelson G. Maligro CE. ll. Schedule of Activities: Time Activitiesl Topics Resource Person Day 1 O9OOH-O93OH Keynote CDR LOPEZ, Commander, AFPCYG O93OH-1015H Navigating the Shift from Opportunistic to Targeted Christopher Elisan Ransomware 1015H-1115H Capture The Flag (CTF) game participated by ON6 and NICTC personnel. 1115H-1215H Farewell, WAF — Exploiting SOL Boik Su ","routeslip":"","__v":0}
170+{"_id":{"$oid":"5f3e33c866cc3f0590a28ac9"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119678021","title":"Network and IS.xlsx.txt","filename":"/drive/textML/N6B/Network and IS.xlsx.txt","category":"","author":"System","deyt":{"$date":"2020-02-26T08:52:01.024Z"},"size":698,"content":" USERS HNICTC N\"CTS—Mani\"a NICTS —La Union NICTS-Legazpi N\"CTS— Palawan NICTS-Zamboanga N\"CTS— Davao N\"CTS— Cebu N\"CTS—Bonifacio NICTU ZAMBALES NICTU CAGAYAN FORT SANT\"AGO(NRC) MR\"C,N\"SF CWS ZAMBOANGA N\"CTU—U\"ugan Status 30 Operating 60 Operating 20 Operating 2 Operating 2 Operating 20 Operating 20 Operating 20 Operating 20 Operating 2 Operating 2 Operating 4 Operating 10 Operating 4 Operating 2 Operating NICTU-Ulugan 2 cws ZAMBOANGA it 4 MR\"C,N\"SFi FORT SANT\"AGO(NRC) NICTU CAGAYAN @ 2 NICTU ZAMBALES to 2 _ . . [ NICTS Bonlfaclo N(\":C:S- Cebu NI T - Davaoi NICTS-Zamboanga N\"CTS- Palawan 2 NICTS-Legazpi 2 NICTS —La Union I: i NICTS-Manila 1 HNICTC 0 j ","routeslip":"","__v":0}
171+{"_id":{"$oid":"5f3e33c866cc3f0590a28aca"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119678082","title":"test-dis-1.docx.txt","filename":"/drive/textML/N6B/test-dis-1.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-12T04:50:43.421Z"},"size":1194,"content":" Taal Vista Hotel Reservation Confirmation Dear Mr. Maligro, Thank you for choosing Taal Vista Hotel. We are pleased to confirm your reservation as detailed below. Reservation Details Con rmation Number Guest Name Arrival Date Departure Date Number of Nights Number of Guest Room Type Nightly Rate Guaranteed Method Breakfast Grand Total Check-in Time Check-out Time 1054480 Mr. Nelson Maligro 25 September 2019 27 September 2019 2 1 Adult 1 Premier King Lake Wing Bldg. Premier at PHP 8,9250.00 Room rates per night are inclusive of VAT, service charge, and local government tax. Your reservation is on a TENTATIVE status. **P\"ease deposit FULL payment on/before August 23, 2019 (until 4PM) . ** AUTO CANCEL IF UNSETTLED ON THE GIVEN OPTION DATE ** Payment is non refundable Bank Name: Any BANCO DE ORO branch Account Name: SM PRIME HOLDINGS INC — TAAL VISTA HOTEL Reference Number: F\"T0000007463 Account Number: 1500009073 A copy of the deposit slip must be sent thru email at reservations@taa\"vistahote\".com. Buffet Breakfast is included PHP 17,900.00 Total amount per stay are inclusive of VAT, service charge, and local government tax. 02:00 PM 12:00 NN ","routeslip":"","__v":0}
172+{"_id":{"$oid":"5f3e33c866cc3f0590a28acb"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119678060","title":"Rootcon.docx.txt","filename":"/drive/textML/N6B/Rootcon.docx.txt","category":"","author":"System","deyt":{"$date":"2020-02-26T08:59:10.256Z"},"size":1758,"content":" KEP what HEADQUARTERS PHILIPPINE NAW \\ E . OFFICE OF THE AC OF NS FOR C4\"SR SYSTEMS, N6 \"E5 Naval Station Jose Andrada HI\"?!-f'7\".*.'_'f,F*]_!-='§E__Tf\"fl\"'§h-t\"'.: 2335 Roxas Boulevard, Manila From: Staff Officer, Cyber Warfare Management Branch To: AC of NS for C4\"SR Systems, N6 Via: Deputy AC of NS for C4\"SR Systems, N6 Subj: Attendance to RootCon Hackers' Conference Ref: FOIC, PN approved DF dated 02 August 2019, subject: Attendance to RootCon Event Encls: 1) Topic Presentations 2) AAR from LTJG MARIO N TRIBUNAL PN 3) Pictures with caption I. General: ROOTCON is an annual cyber security conference and the largest hacking conference in the Philippines. The event aims to foster camaraderie and sharing of expertise among cybersecurity professionals, security researchers, and ethical hackers. A two-day activity showcasing lectures on the latest techniques and tactics of hacking, a hands-on experience on ways of cracking devices; and competing in the Capture the Flag (CTF) contest - a special kind of cybersecurity competition designed to challenge its participants to solve computer security problems. This activity was held on 26-27 September 2019 at Taal Vista Hotel, Tagaytay and was attended by LCDR RODEL G BARRACA PN, CPT JEAN PAUL T SAN GABRIEL PN(M), LTJG MARIO N TRIBUNAL PN, LTJG JOMAR M WELBA PN, SN2 Rhea T Espinosa PN, and Mr. Nelson G. Maligro CE. ll. Schedule of Activities: Time Activitiesl Topics Resource Person Day 1 O9OOH-O93OH Keynote CDR LOPEZ, Commander, AFPCYG O93OH-1015H Navigating the Shift from Opportunistic to Targeted Christopher Elisan Ransomware 1015H-1115H Capture The Flag (CTF) game participated by ON6 and NICTC personnel. 1115H-1215H Farewell, WAF — Exploiting SOL Boik Su ","routeslip":"","__v":0}
173+{"_id":{"$oid":"5f3e33c866cc3f0590a28acd"},"projects":[],"reference":[],"enclosure":[],"comment":[],"id":"15979119678103","title":"test-dis-3.docx.txt","filename":"/drive/textML/N6B/test-dis-3.docx.txt","category":"","author":"System","deyt":{"$date":"2020-06-12T07:08:37.885Z"},"size":1194,"content":" Taal Vista Hotel Reservation Confirmation Dear Mr. Maligro, Thank you for choosing Taal Vista Hotel. We are pleased to confirm your reservation as detailed below. Reservation Details Con rmation Number Guest Name Arrival Date Departure Date Number of Nights Number of Guest Room Type Nightly Rate Guaranteed Method Breakfast Grand Total Check-in Time Check-out Time 1054480 Mr. Nelson Maligro 25 September 2019 27 September 2019 2 1 Adult 1 Premier King Lake Wing Bldg. Premier at PHP 8,9250.00 Room rates per night are inclusive of VAT, service charge, and local government tax. Your reservation is on a TENTATIVE status. **P\"ease deposit FULL payment on/before August 23, 2019 (until 4PM) . ** AUTO CANCEL IF UNSETTLED ON THE GIVEN OPTION DATE ** Payment is non refundable Bank Name: Any BANCO DE ORO branch Account Name: SM PRIME HOLDINGS INC — TAAL VISTA HOTEL Reference Number: F\"T0000007463 Account Number: 1500009073 A copy of the deposit slip must be sent thru email at reservations@taa\"vistahote\".com. Buffet Breakfast is included PHP 17,900.00 Total amount per stay are inclusive of VAT, service charge, and local government tax. 02:00 PM 12:00 NN ","routeslip":"","__v":0}
174+{"_id":{"$oid":"5f3e33c866cc3f0590a28ace"},"proj

Part of diff was cut off due to size limit. Use your local client to view the full diff.

Show on old repository browser