Information resource related to Computer Security and Security Incident Responce



Reports, Documents for Discussion and Comments

CERT Security Practices and Evaluations

Organizational Models for Computer Security Incident Response Teams (CSIRTs)
Georgia Killcrece, Klaus-Peter Kossakowski, Robin Ruefle, Mark Zajicek. CMU/SEI-2003-HB-001. December 2003 -http://www.sei.cmu.edu/publications/documents/03.reports/03hb001.html

SANS (System Administration, Networking, and Security) Institute.
SANS offers a series of exceptional educational conferences, cooperative research reports, electronic digests, posters of authoritative answers to current questions, and cooperatively-created software. The Common Vulnerabilities and Exposures (CVE) list maintained by Mitre Comp.
CVE list is a list of standardised names for Vulnerabilities and other Information Security Exposures aimed to easy sharing data across separate vulnerability databases and security tools. The content of CVE is a result of a collaborative effort of the CVE Editorial Board of many security-related organizations such as security tool vendors, academic institutions, and government as well as other security experts.
  • NIST Recommendation: SP 800-51. Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme, September 2002
  • A Common Language for Computer Security Incidents by John Howard and Tom Longstaff

    Information Protection Center (IPC) Operations Blueprint by Andrew Mackie (2001)

    ICMP Usage in Scanning or Understanding some of the ICMP Protocol’s Hazards, by Ofir Arkin, 2000 (PDF, PostScript)



    IETF Security related activity and information

    Site Security and Incidents Response related RFCs

    RFC 2196. Site Security Handbook (replaces the now obsolete RFC1244)
    RFC 2350. Expectations for Computer Security Incident Response (June 1998)
    RFC 2505. Users' Security Handbook (Feb 1999)
    RFC 2828. Internet Security Glossary
    RFC3013.  Recommended Internet Service Provider Security Services and Procedures
    RFC3067
    . Incident Object Description and Exchange Format (IODEF) Requirements
    RFC3227
    . Guidelines for Evidence Collection and Archiving

    Current IETF Working Groups

    INCH-WG (Extended Incident Handling) - Security Area

    The purpose of the Incident Handling (inch) working group is to define data formats for communication between a CSIRT and its constituency, a CSIRT and parties involved in an incident investigation and between collaborating CSIRTs sharing information.
    This format will support the now largely human-intensive dimension of the incident handling process. It will represent the product of various incremental data gathering and analysis operations performed by a CSIRT from the time when the system misuse was initially reported (perhaps by an automated system) till ultimate resolution.
    Specifically, the working group will address the issues related to representing: the source(s) and target(s) of system misuse, as well as the analysis of their behavior; the evidence to support any analysis results; a scheme to document the incident investigation and analysis process; and constructs to facilitate the exchange of security information across administrative domains (e.g., internationalization, data sensitivity).  The WG will investigate the information model needed to support the typical, operational workflow of the incident handling processes found at Internet Service Providers; Managed Security Service Providers; Risk Analysis vendors; and traditional, internal CSIRTs.

    IDWG (Intrusion Detection Exchange Format)  - Security Area

    Scope of IDWG is to define data formats and exchange procedures for sharing information of interest to intrusion detection and response systems, and to management systems which may need to interact with them. Issues are rather related to operation level than to application. WG Activity contributed by specialists from ISS, Boeing Co, IBM, CyberSafe Corporation, Nokia and some Universities.


    Other Standards

    Computer Systems Security documents
    Rainbow Series Library

    The Common Criteria VERSION 2.1/ISO IS 15408 (MIL site; Common Criteria Project at NIST; International Common Criteria Project Home page)
    The Common Criteria (CC) is presented as a set of distinct but related parts as identified below.



    Other Information Resources  

    NIST CSRC Publications

    NIST Computer Security Special Publications

    Computer Incident Advisory Capability (CIAC)
    CIAC provides on-call technical assistance and information to Department of Energy (DOE) sites faced with computer security incidents. 

    Federal Computer Incident Response Capability (FedCIRC) CERT/CC tecnical tips

    Internet Security Systems, Inc. - X-Force Allert and Advisories List

    Cisco Secure Encyclopedia
    Online network vulnerabilities database, which also contains statistics of vulnerabilities, and other stuff.

    Security Focus Vulnerability Database

    NTBugtraq Vulnerability Database

    Latest virus info from Network Associates

    SECURITY at ITWorld.com
    Authentication - PKI - Biometric - Encryption - Intrusion - Prevention - Firewalls
     

    Unsolicited Commercial Email (Spam) - Technical and Legal issues


    Security BCP, Audit, Risk Assessment and Security Policy Management

    The ISO 17799 Service & Software Directory - http://www.iso17799software.com/

    Internet Security Auditing Class - http://www.porcupine.org/auditing/
    On April 30th, 1996, Dan Farmer (Sun Microsystems) and Wietse Venema (Eindhoven University) presented a full-day free class on security auditing before an audience of 200 in Santa Clara (CA).

    RUSecure™ - Information Security Officer's Manual - the ISO Manual
    http://www.eon-commerce.com/rusecure

    The Security Audit and Internal Audit Shop - http://www.security-audit-internal-audit.com/

    Evaluation download - http://www.computer-security-policies.com/down.htm

    IBM Security Solutions -  http://www-306.ibm.com/software/tivoli/solutions/security/

    Microsoft Security webpage - http://www.microsoft.com/technet/security/topics/assess/default.mspx

    Cisco Security Best Practices Whitepaper - http://www.cisco.com/en/US/tech/tk869/tk769/technologies_white_paper09186a008014f945.shtml
    Cisco Security Advisories and Notes - http://www.cisco.com/en/US/products/products_security_advisories_listing.html

    Security Code Review Guidelines - http://www.homeport.org/~adam/review.html

    How to Find Security Holes - http://www.canonical.org/~kragen/security-holes.html

    Sun Software Security Audit page - http://wwws.sun.com/software/security/audit/




    Information pages at European CSIRT's and associations

    JANET-CERT: Security Information pages

    CERT-NL Reports: The CERT-NL organisation eCSIRT - The European CSIRT Network

    CHIHT (Clearinghouse for Incident Handling Tools)



    Forums and Mailing lists

    Security Related Mailing Lists at XForce Internet Security Systems, Inc
    CIAC Bulletins and Advisories

    SecurityFocus Mailing Lists Aarchives

    SANS newsletters and digests




    Legal issues

    Computer law and legislature in European countries at EuroCERT site

    Crypto Law Survey by Bert-Jaap Koops

    ICRI, Interdisciplinary Center for Law and IT (Belgium)

    World Cryptography Survey by Global Internet Liberty Campaign   


    2000-2005. Maintained by Y.Demchenko