Information Assurance Menu

About IA at NSA Partners Rowlett Awards Award Recipients Background Nomination Procedures Links IA Client and Partner Support IA News IA Events IA Mitigation Guidance Media Destruction Guidance Security Configuration Guides Applications Archived Guides Cisco Router Guides Database Servers Fact Sheets Industrial Control Systems (ICS) IPv6 Operating Systems Supporting Documents Switches VoIP and IP Telephony Vulnerability Technical Reports Wireless System Level IA Guidance TEMPEST Overview TEMPEST Products: Level I Certified Confirmed Deficiencies Suspended Terminated No Longer Produced TEMPEST Products: Level II Certified Confirmed Deficiencies Suspended Terminated No Longer Produced TEMPEST Company POCs Certified Suspended Terminated Trusted Computing IA Academic Outreach National Centers of Academic Excellence in IA Education Colloquium Institutions SEAL Program IA Courseware Evaluation Program Institutions Student Opportunities IA Business and Research IA Business Affairs Office Certified Product Sales and Support Commercial COMSEC Evaluation Program Commercial Satellite Protection Program Independent Research and Development Program User Partnership Program Partnerships with Industry NIAP and COTS Product Evaluations IA Programs Commercial Solutions for Classified Program Global Information Grid High Assurance Platform HAP Technology Overview HAP Technology Partner Program HAP Resource Library Inline Media Encryptor Suite B Cryptography NSA Mobility Program IA Careers Contact Information
.
Skip Search Box

Fact Sheets

Our fact sheets cover a wide variety of topics that provide information, discuss technology options, and provide recommendations.

Products that have aged, been superceded, or are no longer used are available in the Archived Security Guides section.

Fact Sheets Last Reviewed File Size Revised
Configuring Windows To Go as a Mobile Desktop Solution Nov 2012 3197K Nov 2012
Securing Data and Handling Spillage Events Oct 2012 443K Oct 2012
Mobile Device Management: A Risk Discussion for IT Decision Makers Aug 2012 756KB Aug 2012
Mobile Device Management: Capability Gaps for High-Security Use Cases Aug 2012 738KB Aug 2012
Defending Against Compromised Certificates July 2012 365KB July 2012
Mitigation Monday #3: Defense Against Malware on Removable Media June 2012 1.01MB June 2012
New Smartphones and the Risk Picture June 2012 315KB Apr 2012
Security Tips for Personally-Managed Apple iPhones and iPads June 2012 513KB Jan 2012
Protect Against Cross Site Scripting (XSS) Attacks June 2012 373KB Nov 2011
Enforcing No Internet or E-mail from Privileged Accounts June 2012 852KB June 2011
Hardening Authentication Factsheet Aug 2012 755KB Sep 2012
Host Protection Technology Study June 2012 9969KB Apr 2011
Best Practices for Securing a Home Network June 2012 492KB Apr 2011
Unified Communications (UC) Technical Primer June 2012 481KB Jan 2011
Securing IBM Lotus Sametime June 2012 337KB Jan 2011
Cisco Unified Presence Server (CUPS) Fact Sheet June 2012 555KB Nov 2010
Application Whitelisting Trifold June 2012 751KB Aug 2010
Encrypting Files with SecureZip June 2012 470KB Jan 2011
Social Networking Sites June 2012 256KB Dec 2009
Exchanging Files with PGP June 2012 294KB Dec 2009
Windows Fine-Grained Password Policies June 2012 61KB May 2009
Mitigation Monday #2: Defense Against Drive-By Downloads June 2012 107KB Jun 09
Encrypting Files with WinZip® June 2012 624KB Jul 09
Securing Fibre Channel Storage Area Networks June 2012 3.32MB Mar 09
Securing Supervisory Control and Data Acquisition (SCADA) and Control Systems (CS) June 2012 107KB Feb 09
Service Oriented Architecture Security Vulnerabilities - Web Services June 2012 213KB Nov 08
Hardening Tips for the Default Installation of Mac OS X 10.5 "Leopard" June 2012 304KB Sep 08
Minimize the Effectiveness of SQL Injection Attacks June 2012 128KB May 08
802.11 Wireless LAN Intrusion Detection Systems June 2012 160KB May 08
Mitigation Monday: Defense Against Malicious E-mail Attachments, Rel. 1 June 2012 364KB May 08
Video Teleconferencing (VTC) June 2012 748KB Mar 08
Disabling USB Storage Drives June 2012 816KB Mar 08
The Microsoft Office Isolated Conversion Environment (MOICE) and File Block Functionality with Office 2003 June 2012 65 KB Feb 08
A Deployment Guide for the Microsoft Office Isolated Conversion Environment (MOICE) and File Block Functionality with Office 2003 ** (zip file) June 2012 225 KB Feb 08
Internet Protocol version 6 Factsheet June 2012 82KB Jan 08
Port Security on Cisco Access Switches Factsheet June 2012 82KB Jan 08
Bluetooth Security June 2012 856KB Dec 07
Hardening Tips for the Red Hat Enterprise Linux 5 June 2012 239KB Nov 07
Data Execution Prevention (DEP) June 2012 170KB Oct 07
How to Securely Configure Microsoft Windows Vista BitLocker June 2012 1,049KB Aug 07
Configuring a PC to Remotely Administer a Cisco Router Using the Router Console June 2012 233KB May 07
Configuring a Cisco Router for Remote Administration Using the Router Console June 2012 245KB May 07
So Your Boss Bought you a New Laptop...How do you identify and disable wireless capabilities June 2012 883KB May 07
Biometrics Security Considerations June 2012 282KB Apr 07
Secure Instant Messaging June 2012 224KB Feb 07
Mail Client Security Cheat Sheet June 2012 153KB Feb 07
Security Guidance for Using Mail Clients June 2012 247KB Feb 07
Enterprise Firewall Types June 2012 108KB Aug 06
Desktop or Enterprise Firewall? June 2012 72KB Aug 06
Enterprise Firewalls in Encrypted Environments June 2012 64KB Aug 06

**To download and uncompress zipped files you need to have winzip loaded on your local machine.

 

Date Posted: Jan 15, 2009 | Last Modified: Dec 19, 2012| Last Reviewed: Dec 19, 2012

 
bottom

National Security Agency / Central Security Service