Inspection and Sanitization Guidance for National Imagery Transmission Format
This Inspection and Sanitization Guidance (ISG) for National Imagery Transmission Format (NITF) document provides guidelines and specifications for developing file inspection and sanitization software for NITF files, which are formally defined by the National Imagery Transmission Format Standard (NITFS). The...
18 January 2018 79 page(s) pdf
Verification, Inspection, and Sanitization (VIS) Report Specification
The Verification, Inspection and Sanitization (VIS) Report Specification provides a standardized XML-based mechanism to describe the results of all the verification, inspection, sanitization, transformation, and transliteration filter actions performed by a Filter Orchestration Engine (FOE) and its associated filters on...
18 January 2018 48 page(s) pdf
Unicode Security Risks
Fundamentally, computers process numbers, not letters, so when a computer processes text, the characters must be converted into numbers prior to processing. There are many schemes for encoding characters as numbers. US-ASCII is one well-known scheme, but it encodes only...
18 January 2018 27 page(s) pdf
The TEMPEST Certification Program (TCP) consists of three closely related NSA programs: the Certified TEMPEST Products Program, the Certified TEMPEST Test Services Program, and the Zoned Equipment Program. Each of these programs involves partnerships with industrial companies.
15 May 2015
Independent Research and Development Program
IR&DP was established to assist vendors in the exploration of new IA technologies.
15 May 2015
Guidelines for Application Whitelisting Industrial Control Systems
This document serves as an appendix to the “Seven Steps to Defend Industrial Control Systems” document, providing additional conceptual-level guidance on implementing application whitelisting.
Application Whitelisting (AWL) can detect and prevent attempted execution of malware uploaded by adversaries. The static...
01 April 2016 7 page(s) pdf
Guidelines for Configuration/Patch Management in Industrial Control Systems
This document was written with contributions from Subject Matter Experts at the Department of Homeland Security (DHS) and the National Security Agency (NSA). This document serves as an appendix to "Seven Strategies to Defend Industrial Control Systems". Application Whitelisting (AWL)...
20 May 2016 pdf
Add all new keywords to this page so they will show in the keyword list for all pages below.
22 December 2015
1-8 of 8 results returned for: "keywords:"National Security Agency - NSA""