NISER > Resources > Policies and Procedures
How to form an Incident Response Team
This paper examines the role an IRT may play in the community, and the issues that should be addressed both during the formation and after commencement of operations. It may be of benefit to existing IRTs as it may raise awareness of issues not previously addressed.
Links:
http://www.singcert.org.sg/resource.shtml
ftp://ftp.jaring.my/pub/cert/
CGI security
This document gathers resources related to writing secure CGI scripts for WWW servers.
Links:
http://www.go2net.com/people/paulp/cgi-security/
Policies and Computing Ethics
This directory contains ethics policies. There are now copyright policies, and some data access policies. The sub-directory Data.Access contains these few policies.
Links:
ftp://ftp.unm.edu/ethics/
A Sample High-level Network Security Policy
A high-level network security policy states your company's security measures in general terms. This document was created for a fictatious company which addresses each policy issue covered in "What Is Usually Included in a Network Security Policy.". Note that this document was written in Microsoft Words.
Links:
http://www.cl.ais.net/baier/security/
What Is Usually Included in a Network Security Policy- rfc1244 Site Security Handbook by the Internet Engineering Task Force
Whether you decide to write a high- or low-level network security policy, you will typically cover the same basic issues. This document address at least 10 issues needed in most network security policies--regardless of the company's size, industry, or security requirements. (WinWord)
Links:
http://www.cl.ais.net/baier/security/
Network Security Policy by Novell
What would you do if you arrived at work one morning and discovered that hundreds of files had been deleted from your company's file servers? Who would you call? How would you recover the files? How would you investigate how these files were deleted? If your company had a comprehensive network security policy, you would know exactly what to do in such a situation. This document provides information on how to wite such network security policy. (WinWord)
Links:
http://www.cl.ais.net/baier/security/
rfc1244 Site Security Handbook by the Internet Engineering Task Force
This handbook is a guide to setting computer security policies and procedures for sites that have systems on the Internet. This guide lists issues and factors that a site must consider when setting their own policies. It makes some recommendations and gives discussions of relevant areas. This guide is only a framework for setting security policies and procedures. In order to have an effective set of policies and procedures, a site will have to make many decisions, gain agreement, and then communicate and implement the policies.
Links:
Web based : http://info.ox.ac.uk/CompSecurity/rfc1244/
Text based : http://www.cert.funet.fi/rfc/rfc1244.txt
rfc1281 Guidelines for the Secure Operation of the Internet from the IETF
The purpose of this document is to provide a set of guidelines to aid in the secure operation of the Internet. This includes a sample of Network Security Policy from UEL and UNIX Security Checklist.
Links:
Web based : http://www.cl.ais.net/baier/security/
Text based : http://www.cert.funet.fi/rfc/rfc1281.txt
NIST : Internet Security Policy: A technical Guide [DRAFT]
This document is intended to help an organization create a coherent Internet-specific information security policy. It provides a brief overview of the Internet and its constituent protocols. It discusses the primary uses of the Internet, and the associated policy implications. And it provides sample policy statements for low, medium and high risk/protection environments.
Links:
http://csrc.nist.gov/isptg/
Phrack Magazine Issue Number 55
Among the articles found on this magazine are:
- SecurPBX using SecurID
- A *REAL* NT Rootkit, patching the NT Kernel
- The Libnet Reference Manual v.01
- Perl CGI problems
- The Frame Pointer Overwrite
- Distributed Information Gathering
- Building Bastion Routers Using Cisco IOS
- Stego Hasho
- Building Into The Linux Network Layer
- Black Book of AFS
- A Global Positioning System Primer
- Win32 Buffer Overflows (Location, Exploitation and Prevention)
- Distributed Metastasis: A Computer Network Penetration Methodology
- Alternative Thinking in H.323 Capable Firewall Design
Links:
http://www.phrack.com/search.phtml?issueno=55&r=0
ftp://ftp.phrack.com/pub/phrack/phrack55.tar.gz
Whitepapers and Publications
Among whitepapers and publications listed by Lance Spitzner are:
- Know Your Enemy
- Armoring Linux
- Armouring Solaris
- Armouring NT
- Intrusion Detection for Check Point FireWall-1
- The Secrets of Snoop
- Watching your Logs
- Intrusion Detection
Links:
http://www.enteract.com/%7Elspitz/pubs.html
Disclaimers and copyright information
Last Update March 11, 2001
|