Access "On The Radar: NIST resources"
This article is part of the August 2005 issue of Betting the house on network anomaly detection systems
"We're with the government, and we're here to help." Not the most reassuring words, unless you need strong security guidance or want to conduct a security risk assessment--then the federal government is indeed your friend. The National Institute of Standards and Technology (NIST) has a computer security division that creates security standards, policies and procedures used by the government to secure its federal IT systems. Even if you are not working for the feds, these security standards provide a solid starting point to secure your enterprise and analyze your security posture. Of the many guides NIST provides as part of its special publication's 800 series (http://csrc.nist. gov/publications/nistpubs/), I have found two guides particularly easy to read and useful: The Computer Security Incident Handling Guide (800-61) covers everything from organizing an incident response team before an event to putting preventive measures in place and providing checklists for use in the heat of the battle. Incident planning includes how to handle malicious code and deal ... Access >>>
Premium Content for Free.
A Safe Bet?
Network anomaly detection is the newest player at the security table.
Whip your users into shape with security awareness training.
Paper or PKI?
SAFE is a biopharmaceutical industry initiative to standardize credentials for drug discovery. It could save the industry billions.
Learn how to leverage the VLAN as a security tool.
Recent Releases: Security product briefs, August 2005
Learn about the security products released in August 2005.
by Steven Weil, Contributor
Symark Software's PowerKeeper 1.4
- A Safe Bet?
Test labs are the ideal place to check theory against reality.
Hot Pick: Elemental's Elemental Compliance System 1.1
Elemental's Elemental Compliance System 1.1
Identity Management: Trustgenix's IdentityBridge Standard Edition
Trustgenix's IdentityBridge Standard Edition
Wireless security review: Juniper Networks' Netscreen-5GT Wireless
Juniper Networks' Netscreen-5GT Wireless
Hacking Exposed: Network Security Secrets & Solutions
Read a review of the security book Hacking Exposed: Network Security Secrets & Solutions (Fifth Edition).
- Proving Grounds
Ping: Chrisan Herrod
Perspectives: Which security certification best meets your needs?
The pressure is on to earn security certifications to prove your worth.
Publisher's Note: Compliance 2.0
Learn about Compliance 2.0, which involves continuous process improvement.
On The Radar: NIST resources
Help from the Government
- Ping: Chrisan Herrod
More Premium Content Accessible For Free
In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of ...
Unified threat management (UTM) long focused on small and medium-sized businesses, but now it's climbing the ladder and attempting to become ...
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...