Frequently Asked Questions (FAQ)
A FAQ is a summary document written by knowledgeable individuals for a particular topic and it contains commonly requested information about the topic.
Security Advisories
A number of groups from around the world provide information about security vulnerabilities and methods to remove or reduce the danger of particular vulnerabilities for different computer operating systems. This page contains references to advisories from various different organizations .
General Topics
Many articles have been written about various topics in computer and network security that have been published on the Internet.
Specialized Topics
Many articles have been written about various topics in computer and network security that have been published on the Internet.
Newsletters
There are some magazines available online that provide timely information about computer security.
Security NewsGroups
USENET newsgroups can be useful to obtain current information of a specific topic. Some newsgroups are a better source of information than others.
Computer Security Organizations
A number of computer security organizations exists that provide information to the public or to their members.Organizations with Computer Security Subgroups:
Security World Wide Web (WWW) Sites
This page contains pointers to WWW sites that provide information about computer security. The sites are organized by topic.
Specialized Topics
Other Archives and General Information Security Sites
Computer Crime
Intruders, Intrusions and the Computer Underground
Investigation Techniques
Cryptography, Cryptanalysis and Steganography
Information Warfare
Legal
General legislative information, including pending bills in the U.S. Congress, is provided by: THOMAS . Several on-line law journals provide excellent resources for information on legal issues for computer and networks, both criminal and civil. These include:Also, there are several law centers and institutes maintaining sites:
Information Security in the Medical & Healthcare Industry
Methods and Implementations
Misc
Privacy
Protocols and Standards
- The U.S. Department of Commerce's National Institute of Standards and Technology maintains the NIST Federal Information Processing Standards site with text in various formats for federal standards, many crypto related.
- RSA Data Security, Inc. has an excellent site for cryptography standards including S/MIME, SET, SWAN, PICA and PKCS.
Virus and other Malicious Code
- David Harley maintains a Virus FAQ site that includes the alt.comp.virus and Viruses and the Macintosh FAQs.
- Data Fellow's (the creator's of F-PROT) have a large collection of virus information, software and databases.
- Galaxy's Computer Viruses and Security provides general information on malicious code.
Security Programs
Below is a list of software used to improve security of computers. At this time most of software is for Unix operating system but a number of these programs have non-Unix versions.
Authentication and Encryption Programs : Below is a list of programs improves the authentication and/or provides encryption. Authentication is a system used to verify the identity of an entity. An example of the use of authentication is a typical login session. Encryption is the method of secure data by making the information unreadable unless the correct key is known. A password file on Unix systems is an example of the use of encryption.
Firewall Programs:Below is a list of programs that can be used in conjunction with a firewall or create to a firewall. A firewall is a combination of software-hardware methods used to provide access control to networks.
- Simple Socksd is another implementation of Version 4 SOCKS protocol that is fast, easy to compile and simple to configure. Availability:http at Simple SOCKS Daemon Additional Info: Simple SOCKS Daemon
- Socks is a package which allows various Internet service such as gopher , ftp and telnet to be used through a Firewall. Availability:anonymous ftp at ftp.nec.com Additional Info: Welcome to SOCKS
Tcpr is a set of perl scripts that forwards ftp and telnet commands across a firewall.
Availability:anonymous ftp at ftp.alantec.comTCP Wrapper Allows a Unix System Administrator to control access to various network services through the use of access control list. It also provide logging information of wrapped network services which may be used to prevent or monitor of network attacks.
Availability:anonymous ftp at ftp.win.tue.nl Additional Info: TCP WrapperTIS Firewall Toolkit is a software package to build and maintain a system which is used to protect a network from unwanted network activities.
Availability:anonymous ftp at ftp.tis.com Additional Info: TIS Firewall Toolkit OverviewXp-BETA is an application gateway for X11 protocol that uses Socks and/or CERN WWW Proxy. Availability:anonymous ftp at ftp.mri.co.jp
Network and Network Monitoring Programs
Below is a list of programs that gather information from the network or improve the security of the network.
Argus
Argus is a powerful tool for monitoring IP networks. It provides tools for sophisticated analysis of network activity that can be used to verify the efforcement of network security policies, network performance analysis and more.
Availability:anonymous ftp at ftp.sei.cmu.eduArpwatch
An ethernet monitor program that keeps tracks of ethernet/IP address pairings.
Availability:anonymous ftp at ftp.ee.lbl.gov CourtneyIt is a program that tries identifies the use of SATAN on a subnet. The program tcpdump will also be needed in order to run Courtney. See below for information above tcpdump.
Availability:anonymous ftp at ciac.llnl.gov Additional Info: CIAC Notes 08Dig
Dig is a network utility which queries Domain Name Servers similar to nslookup but it's more reflexible.
Availability:anonymous ftp at venera.isi.eduDrawbridge Powerful bridging filter package.
Availability:anonymous ftp at net.tamu.eduFping An efficient way to test whether a large number of hosts are up Availability:anonymous ftp at slapshot.stanford.edu
IPACL Filters incoming and outgoing TCP and UDP in a SVR4/386 kernel.
Availability:anonymous ftp at ftp.win.tue.nlISS Checks hosts within a specified range of IP address for various security vulnerabilities in sendmail, anonymous FTP setup, NFS and many more.
Availability:anonymous ftp at info.cert.org Additional Info: CERT Advisory 93:14.Internet.Security.ScannerKlaxon It is a daemon that is used to identify the use of port scanners like
ISSandSATAN.
Availability:anonymous ftp at ftp.eng.auburn.eduNetlog Network logging and monitoring of all TCP and UDP connections on a subnet. Netlog also includes tools to analyzing the output. Availability:anonymous ftp at net.tamu.edu
Network Security Scanner (NSS) NSS is a perl that scans one host on subnet or an entire subnet for various simple security problems. Availability:anonymous ftp at jhunix.hcf.jhu.edu
NFSWatch NFSWatch monitors NFS requests and measures response time for each RPC. Availability:anonymous ftp at coast.cs.purdue.edu
Pidentd Identd tries to identify the remote user name of a TCP/IP connection. Identd is an implementation of RFC 1413.
Availability:anonymous ftp at ftp.lysator.liu.se or ftp.csc.ncsu.edu Additional Info: RFC 1413PingLogger PingLogger detects and logs
ICMP ECHO REQUESTS.
Availability:world wide web at www.students.uiuc.eduRscan Rscan is a extensible network scanner that checks for common network problems and SGI specific vulnerabilities.
Availability:anonymous ftp at ftp.vis.colostate.edu
Additional Info: Rscan:Heterogeneous Network InterrogationSATAN SATAN is a program that gathers network information such the type of machines and services available on these machine as well as potential security flaws.
Availability:anonymous ftp at ftp.win.tue.nl . Also see www.fish.com for a list of mirror sites.
Additional Info: Cert Advisory CA-95:06.satanScan-Detector Scan-detector determines when an automated scan of UDP/TCP ports is being done on a host running this program. Logs to either syslog or strerr.
Availability:anonymous ftp at coast.cs.purdue.edu
Additional Info: COAST Projects' ToolsSimple Key-Management For Internet Protocols (SKIP) SKIP adds privacy and authentication at the network level.
Availability:USA and Canada--via web form
Availability:International--anonymous ftp at ftp.elvis.ru
Additional Info: SKIP Information and SKIP in RussiaStrobe Strobe displays all active listening TCP port on remote hosts. It uses an algorithm which efficiently uses network bandwidth.
Availability:anonymous ftp at suburbia.apana.org or minnie.cs.adfa.oz.auTCP Wrapper Allows a Unix System Administrator to control access to various network services through the use of access control list. It also provide logging information of wrapped network services which may be used to prevent or monitor of network attacks.
Availability:anonymous ftp at ftp.win.tue.nl
Additional Info: TCP WrapperTcpdump It captures and dumps protocol packets to monitor or debug a network.
Availability:anonymous ftp at ftp.ee.lbl.gov TracerouteTraceroute traces the route IP packets take from the current system to a destination system. Availability:anonymous ftp at ftp.psc.eduYPX It is a utility used to retrieve a NIS map from a host running NIS daemon. Availability:anonymous ftp at ftp.uu.net or WWW server at mls.saic.com
System Enhancements Programs:
Below is a list of programs that are typically provided by an operating system but improve the security of the system.
System Monitoring Programs:
Below is a list of programs that help check the security of a system.
COPS
COPS (Computer Oracle and Password System) is a security program that tries to identify security risks on a Unix system. It checks for empty passwords in /etc/passwd , world-writable files, misconfigure anonymous ftp and many others.
Availability:anonymous ftp at ftp.cert.orgLsof
lsof displays all open files on a UNIX system.
Availability:anonymous ftp at vic.cc.purdue.eduMerlin
Merlin is an interface to five popular security package to make it easier to analyze and manage the data.
Availability:anonymous ftp at ciac.llnl.gov Additional Info: Merlin InformationSwatch
Swatch is a package used to monitor and filter log files and executes a specified action depending of pattern in the log.
Availability:anonymous ftp at ee.stanford.eduTripwire
Monitor for changes in system binaries.
Availability:anonymous ftp at coast.cs.purdue.edu Additional Info: TripwireTTY-Watcher
TTY-Watcher monitors, logs and interacts with all of the tty on a system. Availability:anonymous ftp at coast.cs.purdue.edu Additional Info: TTY-Watcher Tiger Checks for known security vulnerabilities of Unix workstations. It is similar to Cops with many extensions.
Availability:anonymous ftp at net.tamu.edu
Lists of Commercial Security Software: