SANS – SEC575: iOS and Android Application Security Analysis and Penetration Testing
3.1 3.1.18 3.1.19 Access Control
https://www.sans.org/cyber-security-courses/ios-android-application-security-analysis-penetration-testing/
This SANS course will prepare you to effectively evaluate the security of iOS and Android mobile devices, assess and identify flaws in mobile applications, and conduct a mobile device penetration test, which are all critical skills required to protect and defend mobile device deployments. You will learn how to pen test the biggest attack surface in your organization; dive deep into evaluating mobile apps and operating systems and their associated infrastructure; and better defend your organization against the onslaught of mobile device attacks.
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blte0e352dc1934ea5f/5e9dfb76d5a1cb709eee4a6e/wireless_communication_policy.pdf
This policy from SANS provides an example of the conditions that wireless infrastructure devices must satisfy to connect to a company network.
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt836d5fac43a8727f/5e9dfd035661cd12411d53a6/wireless_communication_standard.pdf
This is a sample wireless communication standard for enterprise customization and implementation.
https://www.sans.org/newsletters/ouch/securing-your-mobile-devices/
Some simple steps to keep you and your devices safe and secure.
SANS Whitepaper – A Secure Approach to Deploying Wireless Networks
3.1 3.1.16 3.1.17 Access Control
https://www.sans.org/white-papers/37342/
This SANS whitepaper discusses how to deploy secure Enterprise wireless networks.
SANS Whitepaper – Securing Your Wireless Access Point: What Do All Those Settings Mean Anyways?
3.1 3.1.16 3.1.17 Access Control
https://www.sans.org/white-papers/1405/
This SANS whitepaper is a step by step guide for users to be able to secure their wireless networks at home.
https://www.sans.org/white-papers/33173/
This SANS whitepaper discusses a holistic approach to USB port-security.
Spiceworks – How to Enable Security Auditing on Important Files (Windows Server 2012)
3.1 3.1.15 Access Control
https://community.spiceworks.com/t/how-to-enable-security-auditing-on-important-files/1010810
This is a step-by-step procedure to restrict access to security-relevant information to authorized users. This method uses the System Access Control List which provides you information on users who have access to the data and the type of access they have.
Tech Target – Account lockout policy: Addressing too many failed login attempts
3.1 3.1.8 Access Control
https://www.techtarget.com/searchsecurity/answer/Account-lockout-policy-Addressing-too-many-failed-login-attempts
How to reduce the risk of a password dictionary attack through an account lockout policy.
https://www.techtarget.com/searchenterprisedesktop/definition/remote-desktop
This article provides an overview of remote desktop and its capabilities.