http://uw714doc.sco.com/en/SEC_admin/IS_HowObjReuseRelatesScur.html
This article describes UnixWare prevention of object reuse. It notes that the administrator need not do anything to enforce the secure reuse of system objects. This requirement is handled by the kernel automatically.
US-CERT – Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies
3.13 3.13.2 System and Communications Protection
https://www.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf
This white paper describes strategies to securely configure Industrial Control Systems.
https://www.varonis.com/blog/ntfs-permissions-vs-share
This article provides the key differences between share and NTFS permissions.
https://www.veracode.com/security/mobile-code-security
This article describes the two main categories of mobile code security risks
https://www.youtube.com/watch?v=gAuQcXinJW0
What is a FIPS-validated crypto module and why do I need one? Watch this video for an overview of how to find FIPS-validated cryptographic modules and why we need them.