Information Assurance Menu

About IA at NSA Partners Rowlett Awards Award Recipients Background Nomination Procedures Links IA News IA Events Open for Registration Closed for Registration Scheduled IA Guidance Media Destruction Guidance Security Configuration Guides Applications Archived Guides Cisco Router Guides Current Guides Database Servers Fact Sheets IPv6 Operating Systems Apple Mac Operating Systems Linux Microsoft Windows Sun Solaris Supporting Documents Switches VoIP and IP Telephony Vulnerability Technical Reports Web Server and Browser Guides Wireless Standards Profiles System Level IA Guidance TEMPEST Overview TEMPEST Products: Level I Certified Confirmed Deficiencies Suspended Terminated No Longer Produced TEMPEST Products: Level II Certified Confirmed Deficiencies Suspended Terminated No Longer Produced TEMPEST Company POCs Certified Suspended Terminated TEMPEST Zoned Equipment IA Academic Outreach National Centers of Academic Excellence in IA Education CAE/IAE Program Criteria CAE-R Program Criteria Colloquium Institutions SEAL Program Applying FAQs IA Courseware Evaluation Program Institutions FAQs Student Opportunities IA Business and Research IA Business Affairs Office Certified Product Sales and Support Commercial COMSEC Evaluation Program Commercial Satellite Protection Program Independent Research and Development Program User Partnership Program National IA Research Laboratory Partnerships with Industry NIAP and COTS Product Evaluations IA Programs Global Information Grid High Assurance Platform Releases Computing Platform Architecture and Security Criteria IA Training and Rating Program Inline Media Encryptor Suite B Cryptography IA Careers Contact Information
.
Skip Search Box

Fact Sheets

Our fact sheets cover a wide variety of topics that provide information, discuss technology options, and provide recommendations.

Products that have aged, been superceded, or are no longer used are available in the Archived Security Guides section.

Fact Sheets File Size Updated
Hardening Tips for the Default Installation of MAC OS X 10.5 "Leopard" 304KB Sep 08
Minimize the Effectiveness of SQL Injection Attacks 128KB May 08
802.11 Wireless LAN Intrusion Detection Systems 160KB May 08
Mitigation Monday: Defense Against Malicious E-mail Attachments, Rel. 1 364KB May 08
Video Teleconferencing (VTC) 748KB Mar 08
The Microsoft Office Isolated Conversion Environment (MOICE) and File Block Functionality with Office 2003 65 KB Feb 08
A Deployment Guide for the Microsoft Office Isolated Conversion Environment (MOICE) and File Block Functionality with Office 2003 ** (zip file) 225 KB Feb 08
Internet Protocol version 6 Factsheet 82KB Jan 08
Port Security on Cisco Access Switches Factsheet 82KB Jan 08
Bluetooth Security 856KB Dec 07
Hardening Tips for the Red Hat Enterprise Linux 5 239KB Nov 07
Data Execution Prevention (DEP) 170KB Oct 07
How to Securely Configure Microsoft Windows Vista BitLocker 1,049KB Aug 07
Configuring a PC to Remotely Administer a Cisco Router Using the Router Console 233KB May 07
Configuring a Cisco Router for Remote Administration Using the Router Console 245KB May 07
So Your Boss Bought you a New Laptop...How do you identify and disable wireless capabilities 883KB May 07
Biometrics Security Considerations 282KB Apr 07
Secure Instant Messaging 224KB Feb 07
Mail Client Security Cheat Sheet 153KB Feb 07
Security Guidance for Using Mail Clients 247KB Feb 07
Disabling USB Storage Drives 816KB Mar 08
Enterprise Firewall Types 108KB Aug 06
Desktop or Enterprise Firewall? 72KB Aug 06
Enterprise Firewalls in Encrypted Environments 64KB Aug 06

**To download and uncompress zipped files you need to have winzip loaded on your local machine.

 

Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009

 
bottom

National Security Agency / Central Security Service