Defense in Depth
This paper provides an overview of the major elements of the strategy and provides links to resources that provide additional insight.
12 March 2010 5 page(s) pdf
BIND 9 DNS Security
Vulnerability Technical Reports such as BIND 9 Security provide our customers with value-added information regarding a plethora of technologies. These reports identify vulnerabilities and provide recommendations to improve or eliminate the identified vulnerabilities. These reports also prioritize vulnerabilities and identify...
14 February 2011 15 page(s) pdf
Best Practices for Keeping Your Home Network Secure
This document contains information about best practices in order to keep your home network secure.
01 May 2014 7 page(s) pdf
New Smartphones and the Risk Picture
Mobile phone platforms are susceptible to malicious attacks, both from the network and upon physical compromise. Understanding the vectors of such attacks, level of expertise required to carry them out, available mitigations, and impact of compromise provides a background for certain risk...
01 April 2012 2 page(s) pdf
Validate Integrity of Hardware and Software
Grey market devices are network infrastructure devices acquired through unofficial channels. These devices can cause a loss of intellectual property and damage to reputation. Counterfeit hardware and software have appeared across many industries. They are often introduced into the supply...
22 June 2016 2 page(s) pdf
Unfetter is bringing Net Defenders and Threat Analysts together for the first time. Net Defenders need the ability to make operational decisions based on complex threat data published by Threat Analysts.
A unique platform that unifies the Net...
29 March 2018 2 page(s) pdf
Defending Against the Malicious Use of Admin Tools: PowerShell™
Malicious actors are using our own tools against us. Why reinvent the wheel or drop something new, something distinguishable, when the tools used on every network every day will provide you all you need? This paper provides a strategy for...
10 November 2016 10 page(s) pdf
Cisco Unified Presence Server (CUPS)
This document goes over Cisco Unifed Presence Server (CUPS) and what it is, the functions, risks, etc.
01 August 2010 2 page(s) pdf
Securely Managing Industrial Control System (ICS) Networks
The fourth in a series, this document focuses on implementing a secure ICS network management program through comprehensive network management policies and procedures. An effective network management program is an essential element of maintaining the security posture of critical ICS...
01 October 2015 16 page(s) pdf
Mobile Device Management: Capability Gaps for High-Security Use Cases
This paper, intended for mobile device platform vendors as well as risk decision makers, provides an overview of MDM platform components and then outlines these gaps in capability.
01 August 2012 2 page(s) pdf
Securing Assets Within a Closed Industrial Control System (ICS) Network
The second in a series, this document focuses on system security within a "closed" ICS perimeter. It provides a systematic approach for implementing the access control concept of Least Privilege.
01 October 2015 17 page(s) pdf
Network Mitigations Package-Infrastructure (NMP-I)
The security community continues to address emerging network threats. The new security model now consists of prevention, detection, containment, and response to mitigate threats. The Network Mitigations Package-Infrastructure (NMP-I) focuses on layering information system network defenses enabling communications while controlling...
23 June 2016 2 page(s) pdf
Comply to Connect
Ensuring that devices on a network are not vulnerable is hard to do. Comply to Connect (C2C) simplifies this by enforcing that patches and hardened configuration are applied to devices before they connect and updated continually. Learn about the benefits...
18 November 2016 15 page(s) pdf
Mitigating Insider Threats
External cyber intrusions can be difficult to defend against. Internal intrusions by insiders are even more difficult to defend against. Learn about mitigations that can be effective against insider threats.
18 November 2016 12 page(s) pdf
A Framework for Assessing and Improving the Security Posture of Industrial Control Systems (ICS) (version 1.1)
This publication is the first in a series intended to help Industrial Control System (ICS) owners and operators in need of improving the security posture of their systems. This document will focus the reader on aspects of network security and...
20 August 2010 18 page(s) pdf
Bro NSM Hunting Tips
The Bro Network Security Monitor (NSM) is used on networks worldwide for in-depth network monitoring and hunting for potential malicious activities. This document provides tips for analysts on how to raise a notice when irregular activity is observed on a...
12 December 2017 25 page(s) pdf
Campus WLAN Registration Form (version 15)
This document is the registration form for Campus WLAN.
01 June 2015 5 page(s) pdf
Information Assurance Symposium - 2016
The Information Assurance (IA) mission at NSA held the Information Assurance Symposium (IAS) 2016 at the Walter E. Washington Convention Center, DC, 16-18 August. The theme for this year was: Security at Mission Speed". IAS is the premier IA event...
17 November 2016
Application Whitelisting Best Practices
Cyber defense is not easy. Application Whitelisting is the number one mitigation from the NSA's Information Assurance Top 10, yet many network owners find it a challenge to implement. Learn about some of the common barriers to implementing Application Whitelisting...
18 November 2016 13 page(s) pdf