NIST SP 800-123 Guide to General Server Security
Title | NIST SP 800-123 Guide to General Server Security PDF eBook |
Author | National Institute of Standards and Technology |
Publisher | Createspace Independent Publishing Platform |
Pages | 56 |
Release | 2008-07-31 |
Genre | |
ISBN | 9781548165871 |
NIST SP 800-123 July 2008 An organization's servers provide a wide variety of services to internal and external users, and many servers also store or process sensitive information for the organization. Some of the most common types of servers are Web, email, database, infrastructure management, and file servers. This publication addresses the general security issues of typical servers. Servers are frequently targeted by attackers because of the value of their data and services. For example, a server might contain personally identifiable information that could be used to perform identity theft. Why buy a book you can download for free? First you gotta find it and make sure it's the latest version, not always easy. Then you gotta print it using a network printer you share with 100 other people - and its outta paper - and the toner is low (take out the toner cartridge, shake it, then put it back). If it's just 10 pages, no problem, but if it's a 250-page book, you will need to punch 3 holes in all those pages and put it in a 3-ring binder. Takes at least an hour. An engineer that's paid $75 an hour has to do this himself (who has assistant's anymore?). If you are paid more than $10 an hour and use an ink jet printer, buying this book will save you money. It's much more cost-effective to just order the latest version from Amazon.com This public domain material is published by 4th Watch Books. We publish tightly-bound, full-size books at 8 � by 11 inches, with glossy covers. 4th Watch Books is a Service Disabled Veteran Owned Small Business (SDVOSB) and is not affiliated with the National Institute of Standards and Technology. For more titles published by 4th Watch, please visit: cybah.webplus.net GSA P-100 Facilities Standards for the Public Buildings Service GSA P-120 Cost and Schedule Management Policy Requirements GSA P-140 Child Care Center Design Guide GSA Standard Level Features and Finishes for U.S. Courts Facilities GSA Courtroom Technology Manual NIST SP 500-299 NIST Cloud Computing Security Reference Architecture NIST SP 500-291 NIST Cloud Computing Standards Roadmap Version 2 NIST SP 500-293 US Government Cloud Computing Technology Roadmap Volume 1 & 2 NIST SP 500-293 US Government Cloud Computing Technology Roadmap Volume 3 DRAFT NIST SP 1800-8 Securing Wireless Infusion Pumps NISTIR 7497 Security Architecture Design Process for Health Information Exchanges (HIEs) NIST SP 800-66 Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule NIST SP 1800-1 Securing Electronic Health Records on Mobile Devices NIST SP 800-177 Trustworthy Email NIST SP 800-184 Guide for Cybersecurity Event Recovery NIST SP 800-190 Application Container Security Guide NIST SP 800-193 Platform Firmware Resiliency Guidelines NIST SP 1800-1 Securing Electronic Health Records on Mobile Devices NIST SP 1800-2 Identity and Access Management for Electric Utilities NIST SP 1800-5 IT Asset Management: Financial Services NIST SP 1800-6 Domain Name Systems-Based Electronic Mail Security NIST SP 1800-7 Situational Awareness for Electric Utilities DoD Medical Space Planning Criteria FARs Federal Acquisitions Regulation DFARS Defense Federal Acquisitions Regulations Supplement
Guide to General Server Security
Title | Guide to General Server Security PDF eBook |
Author | Karen Scarfone |
Publisher | DIANE Publishing |
Pages | 53 |
Release | 2009-05 |
Genre | Computers |
ISBN | 1437913504 |
Servers are frequently targeted by attackers because of the value of their data and services. For example, a server might contain personally identifiable info. that could be used to perform identity theft. This document is intended to assist organizations in installing, configuring, and maintaining secure servers. More specifically, it describes, in detail, the following practices to apply: (1) Securing, installing, and configuring the underlying operating system; (2) Securing, installing, and configuring server software; (3) Maintaining the secure configuration through application of appropriate patches and upgrades, security testing, monitoring of logs, and backups of data and operating system files. Illus.
Guide to Industrial Control Systems (ICS) Security
Title | Guide to Industrial Control Systems (ICS) Security PDF eBook |
Author | Keith Stouffer |
Publisher | |
Pages | 0 |
Release | 2015 |
Genre | Computer networks |
ISBN |
Guide to Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist
Title | Guide to Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist PDF eBook |
Author | Karen Scarfone |
Publisher | DIANE Publishing |
Pages | 127 |
Release | 2009-08 |
Genre | Computers |
ISBN | 1437914926 |
When an IT security configuration checklist (e.g., hardening or lockdown guide) is applied to a system in combination with trained system administrators and a sound and effective security program, a substantial reduction in vulnerability exposure can be achieved. This guide will assist personnel responsible for the administration and security of Windows XP systems. It contains information that can be used to secure local Windows XP workstations, mobile computers, and telecommuter systems more effectively in a variety of environments, including small office, home office and managed enterprise environments. The guidance should only be applied throughout an enterprise by trained and experienced system administrators. Illustrations.
Guide to Bluetooth Security
Title | Guide to Bluetooth Security PDF eBook |
Author | Karen Scarfone |
Publisher | DIANE Publishing |
Pages | 43 |
Release | 2009-05 |
Genre | Computers |
ISBN | 1437913490 |
This document provides info. to organizations on the security capabilities of Bluetooth and provide recommendations to organizations employing Bluetooth technologies on securing them effectively. It discusses Bluetooth technologies and security capabilities in technical detail. This document assumes that the readers have at least some operating system, wireless networking, and security knowledge. Because of the constantly changing nature of the wireless security industry and the threats and vulnerabilities to the technologies, readers are strongly encouraged to take advantage of other resources (including those listed in this document) for more current and detailed information. Illustrations.
Glossary of Key Information Security Terms
Title | Glossary of Key Information Security Terms PDF eBook |
Author | Richard Kissel |
Publisher | DIANE Publishing |
Pages | 211 |
Release | 2011-05 |
Genre | Computers |
ISBN | 1437980090 |
This glossary provides a central resource of definitions most commonly used in Nat. Institute of Standards and Technology (NIST) information security publications and in the Committee for National Security Systems (CNSS) information assurance publications. Each entry in the glossary points to one or more source NIST publications, and/or CNSSI-4009, and/or supplemental sources where appropriate. This is a print on demand edition of an important, hard-to-find publication.
Effective Cybersecurity
Title | Effective Cybersecurity PDF eBook |
Author | William Stallings |
Publisher | Addison-Wesley Professional |
Pages | 1081 |
Release | 2018-07-20 |
Genre | Computers |
ISBN | 0134772954 |
The Practical, Comprehensive Guide to Applying Cybersecurity Best Practices and Standards in Real Environments In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity. Stallings makes extensive use of standards and best practices documents that are often used to guide or mandate cybersecurity implementation. Going beyond these, he offers in-depth tutorials on the “how” of implementation, integrated into a unified framework and realistic plan of action. Each chapter contains a clear technical overview, as well as a detailed discussion of action items and appropriate policies. Stallings offers many pedagogical features designed to help readers master the material: clear learning objectives, keyword lists, review questions, and QR codes linking to relevant standards documents and web resources. Effective Cybersecurity aligns with the comprehensive Information Security Forum document “The Standard of Good Practice for Information Security,” extending ISF’s work with extensive insights from ISO, NIST, COBIT, other official standards and guidelines, and modern professional, academic, and industry literature. • Understand the cybersecurity discipline and the role of standards and best practices • Define security governance, assess risks, and manage strategy and tactics • Safeguard information and privacy, and ensure GDPR compliance • Harden systems across the system development life cycle (SDLC) • Protect servers, virtualized systems, and storage • Secure networks and electronic communications, from email to VoIP • Apply the most appropriate methods for user authentication • Mitigate security risks in supply chains and cloud environments This knowledge is indispensable to every cybersecurity professional. Stallings presents it systematically and coherently, making it practical and actionable.