Featuring 15 Papers as of December 13, 2013
Getting Started with the Internet Storm Center Webhoneypot Masters
Mason Pokladnik - December 13, 2013
The DShield/Internet Storm Center (ISC) Webhoneypot is a new project from DShield--a distributed intrusion detection system--that extends its logging capabilities from layer 3 and 4 network traffic further up the OSI layers to help study application layer attacks.
Introduction to the OWASP Mutillidae II Web Pen-Test Training Environment
Jeremy Druin - December 4, 2013
Web application security has become increasingly important to organizations.
Information Risks & Risk Management
John Wurzler - May 1, 2013
In a relatively short period of time, data in the business world has moved from paper files, carbon copies, and filing cabinets to electronic files stored on very powerful computers.
Information Security: Starting Out
Stewart James - December 7, 2009
Going from technical guru to Information Security Manager can be a bigger step than you might think. Taking on the role of IT Security Officer in an enterprise that treats information security as an IT problem can offer many challenges and many opportunities to learn.
Innovative Technologies and Guidelines Securing 21Century Telecommunications
Joseph Cronin - August 18, 2006
This paper defines the fundamentals of 802.1x authentication, explains how the authentication process works in 802.1x, and provides the detailed steps to implement 802.1x in a switched LAN environment using Cisco's Implementation of 802.1x.
Secure Perimeter Network Design for GIAC Enterprises
Ted Franger - May 17, 2005
This paper puts forth a secure perimeter network design for the fictional company GIAC Enterprises, which is in the business of brokering fortune cookie sayings. The paper consists of three assignments and is completed in fulfillment of the requirements of a practical exam for the GIAC Certified Firewall Analysis Certification.
Possible Points of Failure in the Information Security Environment
Marion Qualls - July 25, 2004
The task of designing a secure infrastructure for IIS 5.0 web servers within a DMZ is difficult enough. Securing an existing DMZ becomes exponentially more difficult due to the added requirement of retrofitting those currently working servers with more appropriate security settings, policies and operational procedures while not adversely affecting website or application availability and keep costs to a minimum throughout the process.
Improving Defense in Depth for NASA's Mission Network
Mary Foote - October 31, 2003
This paper discusses the defense building blocks used by NASA which include increasing network capabilities, continued examination of network capabilities, assessment of new technologies and tools, increased security awareness for NASA non-security professionals, and training of the Mission Network security team members.
Security Education for Users: A Starting Place for Network Administrators
Blou Baker - October 31, 2003
This paper provides a simple outline of conducting basic computer security training within organizations.
Ways To Become An Effective Information Security Professional - From A GIAC Wannabe Perspectives
Asmuni Yusof - October 31, 2003
This paper will examine the requirements necessary to become an effective Information Security Officer (ISO).
Pockets of Chaos: Management Theory for the Process of Computer Security
Jason Collins - October 31, 2003
This paper discusses Computer Security as an ongoing journey, not simply a destination and outlines a flexible security framework that manages "pockets of chaos" to better help organizations achieve their security goals.
Anti-Virus Strategy in a Public K-12 Educational Environment
Shawn Wyman - October 31, 2003
This paper discusses virus protection within a K-12 educational environment
A Primer on OpenVMS (VMS) Security
Steven Bourdon - October 31, 2003
This paper provides an overview of the VMS operating system, security concepts and features, and several recent vulnerabilities affecting VMS.
Digital Signature and Multiple Signature: Different Cases for Different Purposes
Chafic Moussa - October 31, 2003
This paper will discuss digital signatures, how the security properties of integrity, authentication, and non-repudiation are respected and present the purposes of multiple signature schemes.
Information Security: Managing Risk with Defense in Depth
Kenneth Straub - October 31, 2003
This paper provides a detailed overview of risk/risk management & data classification and why we need the Defense in Depth strategy.
Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact email@example.com.
All papers are copyrighted. No re-posting or distribution of papers is permitted.