-
Created by Anonymous, last updated on Feb 26, 2009
1 minute read
- Access Control
- Computer Incident Response — A formal process to manage computer incident response
- abuse of resources
- Locating Host Contacts — Thoughts on locating the appropriate contact for an on-campus host.
- CSG January 2008
- CyberSecurity Operations Center (CSOC)
- Encryption Now — Discussion of encryption use in the near future
- Enhanced Security Environment
- IDS - IPS Inline Network Considerations — Arguments for and against putting security devices inline with our campus network connections.
- Interesting Reading
- IT Evaluation Thoughts — This covers some security-related topics you may want to consider when evaluating or specifying an information technology product.
- ITSO - Virtualization and Security
- Key Strength — Choosing an appropriate key strength.
- Network Activity
- OpenID
- OpenPGP — Info on OpenPGP, GnuPG, PGP, etc. for file encryption and signing.
- Bootstrap gpg on Windows — An order of operations to the other wiki pages
- CNS Keyring Bootstrap — Establishing trust in important CNS keys.
- Create an authentication subkey — Create a subkey to use with SSH. Does not address setting up an agent to make this useful.
- Editing Sensitive Data on Unix Systems — Some considerations when using confidential data on a Unix system.
- Generating a New Key
- Generating a new key (Windows GUI) — How to create a basic keyring using the GNU Privacy Assistant (GPA) in Windows.
- GnuPG System Setup — CNS standard system setup for GnuPG.
- Importing Your Old PGP 2.x Key
- Install gpg on Windows — First steps to using gpg in Windows
- OpenPGP Constants — Constants and other data useful for debugging OpenPGP packets.
- User Environment
- Portable Computing - Encrypted Data Storage — Portable secure data and applications on laptops, thumb drives, etc.
- BitLocker and EFS presentation
- Disk Encryption Cryptography — Notes on the cryptography used for disk encryption.
- EDS Workgroup Report
- ESD Minutes 16-Jan-2007
- FDE Vendor Matrix
- Federal Technical Requirements — Original federal requirements spreadsheet converted to HTML by OpenOffice.org
- Laptop Case Study — Examines encryption needs for a particular user's laptop.
- New Methods in Hard Disk Encryption Summary — Outline of the paper by the same name.
- Pointsec Notes
- TPM on Linux
- Virginia Tech DAR Functional and Technical Requirements — Working copy of VT requirements based on the original federal requirements.
- Regulatory Compliance — Discussion of CALEA, FERPA, GLB, SOX, etc.
- Security Assessment Tools — Originally from Randy Marchany's post to ED-SEC 31 Oct 2006.
- Security Awareness Initiatives by the ITSO
- Self-Service Password Reset
- Snort IDS Sensors
- SSH and SSH Keys
- PuTTY and Gpg4win — Setup PuTTY to use an authentication key from gpg for ssh authentication.
- SSH Keys for remote scripts — Using SSH for executing scripts on remote systems.
- SSH via a Proxy — How to get your ssh client to connect via a proxy host.
- Using GPG for SSH key authentication
- SSL
- SSL and Authentication — Testing SSL and authentication on various services.
- SSL Best Practices and Testing
- VPN Authentication
- VT Public Key Infrastructure (PKI)
{"serverDuration": 5358, "requestCorrelationId": "faa28b3c676a9a5a"}