Mitigation Monday #3: Defense against Malware on Removable Media
This mitigation report presents a common attack scenario for Microsoft Windows networks, the use of malicious removable media by an adversary. It also discusses how it can be prevented using a defense-in-depth strategy.
01 March 2012 2 page(s) pdf
Cisco ASA Out-of the Box Security Configuration Guide (version 1)
This document provides security guidance for network administrator to assist in the initial out-of-the-box configuration of Cisco Adaptive Security Appliance (ASA) 5500 Next Generation Firewalls (software version 9.1). The guidance provided is based on a basic and simplistic security policy...
10 September 2014 22 page(s) pdf
Protect Against Cross Site Scripting (XSS) Attacks
01 September 2011 2 page(s) pdf
Host Protection Technology Study
This study examined the behavior and capabilities of the different technologies against various attack scenarios in order to determine their effectiveness. The various products were grouped into different technology categories (host firewall, virus scanner, etc) and installed in a controlled...
01 June 2011 2 page(s) pdf
Bro NSM Hunting Tips
The Bro Network Security Monitor (NSM) is used on networks worldwide for in-depth network monitoring and hunting for potential malicious activities. This document provides tips for analysts on how to raise a notice when irregular activity is observed on a...
12 December 2017 25 page(s) pdf
NSCAP CIRA Accreditation Instruction Manual (version 3.2)
CIRA instruction manual used during NSCAP accreditation evaluations.
04 May 2016 50 page(s) pdf
Spotting the Adversary with Windows Event Log Monitoring (version 2)
This paper focuses on using the built-in tools already available in the Microsoft Windows operating system (OS). Central event log collection requires a Windows Server operating system version 2003 R2 or above. Many commercially available tools exist for central event...
07 August 2015 54 page(s) pdf
Add all new keywords to this page so they will show in the keyword list for all pages below.
22 December 2015
1-8 of 8 results returned for: "keywords:"Intrusion Detection and Prevention""