Sam Houston State University – Malicious Code Policy: IT-24 3.14 3.14.2 3.14.4 3.14.5 System and Information integrity
This sample policy from Sam Houston State University is an example of a policy to reduce risk by protecting against malware.
This sample policy from Sam Houston State University is an example of a policy to reduce risk by protecting against malware.
This SANS whitepaper discusses several common practices which, when implemented together, will greatly decrease, and perhaps almost stop malware.
This article describes how log management, identifying log types to collect and how log reviews will identify unauthorized access to organizational systems
This blog post describes the details of several network traffic monitoring tools.
This article from Sprocket Security highlights the challenges of vulnerability management and how to establish an effective vulnerability management program.
Common Vulnerabilities Exposure is a list of entries - each containing an identification number, a description, and at least one public reference - for publicly known cybersecurity vulnerabilities.
This is an example of a logging policy, including system and application logging elements that if logged correctly, will aid in identifying unauthorized access and use.
This blog post describes the ways network monitoring can enhance information security.