Information Assurance Menu

About IA at NSA Partners Rowlett Awards Award Recipients Background Nomination Procedures Links IA Client and Partner Support IA News IA Events IA Guidance Media Destruction Guidance Security Configuration Guides Applications Archived Guides Cisco Router Guides Database Servers Fact Sheets IPv6 Operating Systems Apple Mac Operating Systems Linux Microsoft Windows Sun Solaris Supporting Documents Switches VoIP and IP Telephony Vulnerability Technical Reports Web Server and Browser Guides Wireless Standards Profiles System Level IA Guidance TEMPEST Overview TEMPEST Products: Level I Certified Confirmed Deficiencies Suspended Terminated No Longer Produced TEMPEST Products: Level II Certified Confirmed Deficiencies Suspended Terminated No Longer Produced TEMPEST Company POCs Certified Suspended Terminated TEMPEST Zoned Equipment IA Academic Outreach National Centers of Academic Excellence in IA Education CAE/IAE Program Criteria CAE-R Program Criteria Colloquium Institutions SEAL Program Applying FAQs IA Courseware Evaluation Program Institutions FAQs Student Opportunities IA Business and Research IA Business Affairs Office Certified Product Sales and Support Commercial COMSEC Evaluation Program Commercial Satellite Protection Program Independent Research and Development Program User Partnership Program National IA Research Laboratory Partnerships with Industry NIAP and COTS Product Evaluations IA Programs Global Information Grid High Assurance Platform Releases Computing Platform Architecture and Security Criteria IA Training and Rating Program Inline Media Encryptor Suite B Cryptography IA Careers Contact Information
.
Skip Search Box

Fact Sheets

Our fact sheets cover a wide variety of topics that provide information, discuss technology options, and provide recommendations.

Products that have aged, been superceded, or are no longer used are available in the Archived Security Guides section.

Fact Sheets Last Reviewed File Size Revised
Securing Fibre Channel Storage Area Networks Mar 09 3.32MB Mar 09
Service Oriented Architecture Security Vulnerabilities - Web Services Mar 09 213KB Nov 08
Hardening Tips for the Default Installation of Mac OS X 10.5 "Leopard" Mar 09 304KB Sep 08
Minimize the Effectiveness of SQL Injection Attacks Mar 09 128KB May 08
802.11 Wireless LAN Intrusion Detection Systems Mar 09 160KB May 08
Mitigation Monday: Defense Against Malicious E-mail Attachments, Rel. 1 Mar 09 364KB May 08
Video Teleconferencing (VTC) Mar 09 748KB Mar 08
Disabling USB Storage Drives Mar 09 816KB Mar 08
The Microsoft Office Isolated Conversion Environment (MOICE) and File Block Functionality with Office 2003 Mar 09 65 KB Feb 08
A Deployment Guide for the Microsoft Office Isolated Conversion Environment (MOICE) and File Block Functionality with Office 2003 ** (zip file) Mar 09 225 KB Feb 08
Internet Protocol version 6 Factsheet Mar 09 82KB Jan 08
Port Security on Cisco Access Switches Factsheet Mar 09 82KB Jan 08
Bluetooth Security Mar 09 856KB Dec 07
Hardening Tips for the Red Hat Enterprise Linux 5 Mar 09 239KB Nov 07
Data Execution Prevention (DEP) Mar 09 170KB Oct 07
How to Securely Configure Microsoft Windows Vista BitLocker Mar 09 1,049KB Aug 07
Configuring a PC to Remotely Administer a Cisco Router Using the Router Console Mar 09 233KB May 07
Configuring a Cisco Router for Remote Administration Using the Router Console Mar 09 245KB May 07
So Your Boss Bought you a New Laptop...How do you identify and disable wireless capabilities Mar 09 883KB May 07
Biometrics Security Considerations Mar 09 282KB Apr 07
Secure Instant Messaging Mar 09 224KB Feb 07
Mail Client Security Cheat Sheet Mar 09 153KB Feb 07
Security Guidance for Using Mail Clients Mar 09 247KB Feb 07
Enterprise Firewall Types Mar 09 108KB Aug 06
Desktop or Enterprise Firewall? Mar 09 72KB Aug 06
Enterprise Firewalls in Encrypted Environments Mar 09 64KB Aug 06

**To download and uncompress zipped files you need to have winzip loaded on your local machine.

 

Date Posted: Jan 15, 2009 | Last Modified: Mar 30, 2009 | Last Reviewed: Mar 30, 2009

 
bottom

National Security Agency / Central Security Service