Identity Theft Threat and Mitigations
Identity theft is a crime that involves using another person’s personal information to
take malicious actions, such as conducting fraud or stealing funds. The information
provided in this document is designed to help individuals protect themselves against
identity theft and...
26 September 2018 7 page(s) pdf
Outdated Software and Protocols
Outdated and unsupported software and protocols have known and unknown vulnerabilities that expose the network to severe risk. Older software versions were not developed with modern secure coding practices and do not incorporate the most recent mitigations designed to prevent...
19 July 2016 6 page(s) pdf
Cloud Security Basics
Cloud services provide enterprise organizations flexibility and new capabilities, however they introduce new risks that must be understood and addressed before procuring a cloud service provider (CSP). Department of Defense (DoD) organizations are charged with handling sensitive data ranging from...
29 August 2018 2 page(s) pdf
Information for IT Decision Makers, Staff, and Software/Hardware Developers
Site content of special interest to IT Decision Makers, Staff, and Software/Hardware Developers.
15 May 2015
Products & Services
The Information Assurance (IA) at the National Security Agency works to provide customers, stakeholders, and clients with world renowned services and expertise.
15 May 2015
Apple® Quicktime® Reaches End-of-Life for Windows® Factsheet
Apple® has officially ended support for QuickTime® on Microsoft Windows®. In January of 2016, Apple® released the final update of QuickTime® for Windows® and removed the QuickTime® plugin from browsers to help mitigate future vulnerabilities. In April of 2016, two...
09 May 2016 pdf
Defense at Cyber Speed
Track 3: Defense at Cyber Speed
17 November 2016
Third Party Services: Your Risk Picture Just Got a Lot More Complex
For some time now, the U.S. Government has sought the best means to protect national security interests without inappropriately undermining the value (i.e., innovation, efficiency) produced by the global information and communications technology (ICT) supply chain. While past efforts have...
17 November 2016 11 page(s) pdf
IAD's Top 10 Information Assurance Mitigation Strategies
Fundamental aspects of network security involve protection, detection and response measures. This provides guidance for organizations to secure and manage networks thus making the networks defensible and recommends proactive mitigation advise to counter cyber threats.
18 February 2016 2 page(s) pdf
Add all new keywords to this page so they will show in the keyword list for all pages below.
22 December 2015
1-10 of 10 results returned for: "keywords:"Software""