Long-Lived Hashes for AD Smartcard Required Accounts
It is well-known that passwords and their hashes can often be copied and reused by malicious cyber actors. Requiring smartcards or other hard tokens enables stronger authentication because they cannot be copied. Such a token can used by an adversary...
22 November 2016 2 page(s) pdf
Seven Steps to Effectively Defend Industrial Control Systems
Cyber intrusions into US Critical Infrastructure systems are happening with increased
frequency. For many industrial control systems (ICS), it’s not a matter of if an intrusion
will take place, but when. The capabilities of our adversaries have been demonstrated
06 April 2018 9 page(s) pdf
IA’s Mission and Vision
Information Assurance (IA) at the National Security Agency is tasked with the Information Assurance (IA) mission, and is dedicated to providing customers with Confidence in Cyberspace.
15 May 2015
Add all new keywords to this page so they will show in the keyword list for all pages below.
22 December 2015
1-4 of 4 results returned for: "keywords:"Adversary""