Supporting Documents
IAD publishes brochures, forms, Frequently Asked Questions (FAQ), and collateral material related to our programs, products and services.
-
From section:
Frequently Asked Questions
Identity Theft Threat and Mitigations
Identity theft is a crime that involves using another person’s personal information to
take malicious actions, such as conducting fraud or stealing funds. The information
provided in this document is designed to help individuals protect themselves against
identity theft and mitigate the risk.26 September 2018 7 page(s) pdf
-
From section:
Frequently Asked Questions
Best Practices for Keeping Your Home Network Secure
Electronic computing devices including computers, laptops, printers, mobile phones,
tablets, security cameras, home appliances, cars and other “Internet of Things” devices
must all be secured in order to prevent attack. Most home entertainment and utility
devices, such as home monitoring systems, baby monitors, Internet of Things (IoT),
Smart Devices, Blu-ray™ players, streaming video players, and video game consoles
are capable...26 September 2018 4 page(s) pdf
-
From section:
Supporting Documents
Blocking Unnecessary Advertising Web Content
Cyber adversaries can leverage malicious advertising ("malvertising") to install
malware. Exploit kits in malicious ads can take advantage of unpatched vulnerabilities to silently install malware. Administrators should ensure that software updates are
implemented promptly to prevent malware installation. Blocking potentially malicious web advertisements further mitigates malvertising. Additionally, blocking such content can decrease traffic across the network boundary, streamlining incident forensics...10 July 2018 4 page(s) pdf
-
From section:
Supporting Documents
Mobile Device Best Practices When Traveling OCONUS
In their brief history, mobile devices have evolved to become the critical link between
a remote user and the home office, providing travelers with access to business
applications and data they would otherwise lack. Ensuring that this line of communication is private and secure is imperative. The security guidance outlined below applies to U.S. Government personnel using Government-issued commercial mobile...07 June 2018 2 page(s) pdf
-
From section:
Supporting Documents
Security Guidance for the Use of JSON and JSON Schemas
This paper provides guidance for creating JSON schemas. Validating JSON instance documents against properly designed JSON schemas can reduce the risk of transferring unauthorized or malicious data. Note that schema validation alone is not enough to prevent transfer of unauthorized data; users must perform other content filtering such as dirty word and anti-virus checks, in conjunction with schema validation. The...
26 July 2017 49 page(s) pdf
-
From section:
Forms and Templates
Frank B Rowlett Award for Organizational Excellence
Nomination Procedures for Rowlett Awards - Group instruction booklet
16 June 2017
-
From section:
Supporting Documents
NSCAP CIRA Accreditation Instruction Manual 3.3
NSCAP CIRA Accreditation Instruction Manual 3.3
14 June 2017 49 page(s) pdf
-
From section:
Supporting Documents
Rowlett-Award_Booklet_2016
Rowlett-Award_Booklet_2016
17 April 2017 pdf
-
From section:
Frequently Asked Questions
NSCAP_FAQs_Updated-Version_wDisclaimer_02092017
NSCAP_FAQs_Updated-Version_wDisclaimer_02092017
17 April 2017 pdf
-
From section:
Supporting Documents
NSCAP CIRA-Accredited Companies' Contact Information
NSCAP CIRA-Accredited Companies' Contact Information document
03 February 2017 4 page(s) docx
Top