Skip to main content

Computer Security: The NIST Handbook

If you are new in Computer Security field and need to learn on how to provide security for your company working environment. I highly recommend you begin reading the Special Publication 800 series e.g. The NIST Handbook.

Special Publication (800 Series)
Special Publications in the 800 series present documents of general interest to the computer security community. The Special Publication 800 series was established in 1990 to provide a separate identity for information technology security publications. This Special Publication 800 series reports on ITL's research, guidelines, and outreach efforts in computer security, and its collaborative activities with industry, government, and academic organizations. (NIST.GOV, 2010)

Cyber War: The Next Threat to National Security and What to Do About ItTo start, read the Special Publication 800-12 An Introduction to Computer Security, and follow-up with other reading materials where your current responsibility fit. For example about Cryptography, read Special Publication 800-21 2nd Edition: Guideline for Implementing Cryptography in Federal Goverment, or SP 800-30 for Risk Management Guide for Information Technology Systems, or SP 800-44 for Guidelines on Securing Public Web Servers, or SP 800-45 for Guidelines on Electronic Mail Security, etc.

The Special Publications 800 Series will give you enough information to start your study and documentation.

References:
An Introduction to Computer Security: The Nist Handbook
Special Publications (800 Series) http://csrc.nist.gov/publications/PubsSPs.html
An Introduction to Computer Security: The NIST Handbook http://csrc.nist.gov/publications/nistpubs/800-12/handbook.pdf

Comments

Popular posts from this blog

Alternative Social Networks

If you are planning to create your  social network  e.g. similar to Facebook. Here's a short list of alternative software's: Open Source and Free​ http://buddypress.org/  - Wordpress (Open Source and Free) http://elgg.org/  - (Open Source and Free) Commercial Social Networks software http://www.socialengine.com/  ($299 Stand Alone, $29/mo Cloud) http://www.jomsocial.com/  (run with Joomla, need to know CMS) http://www.boonex.com/  (very expensive, $399 for Standard) http://www.anahitapolis.com/ http://www.oxwall.org/ http://sharetronix.com/ http://www.moosocial.com/ http://www.jcow.net/ http://phpdolphin.com http://www.grou.ps  (from free to Commercial, I left my networks and they are selling it  http://www.phpfox.com/  (I used this before, it's hard to maintain. I moved to NING but left too after it was sold to another company) http://www.ning.com  (I don't recommend using this service, it's hard to export your data when it's time to move) S

Learning Vulnerability Scanning by KING.NET

Learning Vulnerability Scanning is fun and easy. So I hope you enjoy reading this short how to guide on how to use vulnerability scanning to secure your servers and networks. NMAP is the swiss tool that you need to learn if you're serious in Cyber Security profession. The NMAP tool can be use with NSE scripting (Nmap Scripting Engine) to automate your tasks. For example using NSE Script using a  single vulnerability (cold fusion)  to scan our test lab machine. root@kali:~# nmap -v -p 80  --script http-vuln-cve2010-2861  10.11.1.220 Starting Nmap 6.47 ( http://nmap.org ) at 2016-07-22 17:34 EDT NSE: Loaded 1 scripts for scanning. NSE: Script Pre-scanning. Initiating ARP Ping Scan at 17:34 Scanning 10.11.1.220 [1 port] Completed ARP Ping Scan at 17:34, 0.04s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 17:34 Completed Parallel DNS resolution of 1 host. at 17:35, 13.01s elapsed Initiating SYN Stealth Scan at 17:35 Scanning 10.11.1.220 [1 port] Comp