SANS Whitepaper – Proxies and Packet Filters in Plain English 3.1.20 3.13 csc12 csc9 System and Communications Protection
This SANS whitepaper describes firewall and perimeter protections.
This SANS whitepaper describes firewall and perimeter protections.
This SANS whitepaper defines FIPS, identify FIPS approved encryption algorithms, and examine some different vendor solutions and their use of these approved algorithms.
This paper examines the vulnerabilities of VoWiFi calling, assesses what common and less well-known attacks are able to exploit those vulnerabilities, and then proposes technological or procedural security protocols to harden telephony systems against adversary exploitation.
This paper focuses on these VoIP specific security threats and the countermeasures to mitigate the problem.
This SANS whitepaper discusses the need for web application firewalls.
This article speaks to the deficiencies in current network segmentation for the endpoint and network segmentation best practices.
This policy from The State University of New York at Oneonta provides sample guidelines for VPN access.
Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of information, produced by the actions of prior users/roles (or the actions of processes acting on behalf of prior users/roles) from being available to any current users/roles (or current processes) that obtain access to shared system resources (e.g., registers, main memory, hard disks) after those resources have been released back to information systems.
This resource offers assessment guidance for a related control (NIST SP 800-53 SC-10)
This blog post discusses some of the web browser security settings options.