Information System Security Links 

Frequently Asked Questions (FAQ) A FAQ is a summary document written by knowledgeable individuals for a particular topic and it contains commonly requested information about the topic.

 


Security Advisories A number of groups from around the world provide information about security vulnerabilities and methods to remove or reduce the danger of particular vulnerabilities for different computer operating systems. This page contains references to advisories from various different organizations .

 


General Topics Many articles have been written about various topics in computer and network security that have been published on the Internet.

 


Specialized Topics Many articles have been written about various topics in computer and network security that have been published on the Internet.

 


Newsletters There are some magazines available online that provide timely information about computer security.

 


Security NewsGroups USENET newsgroups can be useful to obtain current information of a specific topic. Some newsgroups are a better source of information than others.

 


Computer Security Organizations A number of computer security organizations exists that provide information to the public or to their members.

Organizations with Computer Security Subgroups:

 


Security World Wide Web (WWW) Sites This page contains pointers to WWW sites that provide information about computer security. The sites are organized by topic.

 


Specialized Topics

 


Other Archives and General Information Security Sites

 


Computer Crime

 


Intruders, Intrusions and the Computer Underground


Investigation Techniques

 


Cryptography, Cryptanalysis and Steganography

 


Information Warfare


Legal General legislative information, including pending bills in the U.S. Congress, is provided by: THOMAS . Several on-line law journals provide excellent resources for information on legal issues for computer and networks, both criminal and civil. These include:

Also, there are several law centers and institutes maintaining sites:

 


Information Security in the Medical & Healthcare Industry

 


Methods and Implementations

Misc

Privacy

 


Protocols and Standards

Virus and other Malicious Code

Security Programs

Below is a list of software used to improve security of computers. At this time most of software is for Unix operating system but a number of these programs have non-Unix versions.

Authentication and Encryption Programs :

Below is a list of programs improves the authentication and/or provides encryption. Authentication is a system used to verify the identity of an entity. An example of the use of authentication is a typical login session. Encryption is the method of secure data by making the information unreadable unless the correct key is known. A password file on Unix systems is an example of the use of encryption.

Kerberos
Kerberos is an authentication system used to protect unsecurity networks. (Export restricted)
Availability:anonymous ftp at athena-dist.mit.edu Additional Info: Kerberos Reference Page
 
MD5
MD5 is a hash function using to the authenticity of a file.
Availability:anonymous ftp at rsa.com Additional Info: RFC 1544 , www.rsa.com
 
MIME Object Security Services (MOSS)
It is an extension of Multi-purpose Internet Mail Extensions (MIME) that provides authentication, integrity, and confidentiality of an email message. (export restricted)  Availability:anonymous ftp at ftp.tis.com Additional Info: MOSS FAQ
 
OPIE
This software provides the ability to generate and use one time passwords. Related tools are also available for Windows, DOS and Mac. Availability:anonymous ftp at ftp.nrl.navy.mil
 
PGP
Pretty Good Privacy (PGP) protects documents such as email from unauthorized reading using public key encryption. (Some versions are export restricted)
Availability:USA and Canada--anonymous ftp at www.eff.org or via web form
Availability:International-- anonymous ftp at ftp.ifi.uio.no Additional Info: Cryptography, PGP, and Your Privacy
 
RIPEM
Riordan's Internet Privacy Enhanced Mail (RIPEM) improves the security of email by verifying the authenticity of the message sender among other things. ( Export restricted)
Availability:anonymous ftp at ripem.msu.edu Additional Info: Information about RIPEM
 
SKey
S/Key generated one time passwords to gain authenticated access to computer hosts.
Availability:anonymous ftp at thumper.bellcore.com or www.first.org
 
SSH
SSH (Secure Shell) is an enhance versions of rlogin , rsh and rcp that provides RSA authentication and encryption of communications as well as many other security improvements. This program has export restrictions for US, France, Russia and possibly other countries!
Availability:anonymous ftp at ftp.cs.hut.fi
Additional Info: Ssh (Secure Shell) Home Page or Ssh FAQ

Firewall Programs:

Below is a list of programs that can be used in conjunction with a firewall or create to a firewall. A firewall is a combination of software-hardware methods used to provide access control to networks.

Simple Socksd is another implementation of Version 4 SOCKS protocol that is fast, easy to compile and simple to configure. Availability:http at Simple SOCKS Daemon Additional Info: Simple SOCKS Daemon
 
Socks is a package which allows various Internet service such as gopher , ftp and telnet to be used through a Firewall. Availability:anonymous ftp at ftp.nec.com Additional Info: Welcome to SOCKS

Tcpr  is a set of perl scripts that forwards ftp and telnet commands across a firewall.
Availability:anonymous ftp at ftp.alantec.com

TCP Wrapper Allows a Unix System Administrator to control access to various network services through the use of access control list. It also provide logging information of wrapped network services which may be used to prevent or monitor of network attacks.
Availability:anonymous ftp at ftp.win.tue.nl Additional Info: TCP Wrapper

TIS Firewall Toolkit is a software package to build and maintain a system which is used to protect a network from unwanted network activities.
Availability:anonymous ftp at ftp.tis.com Additional Info: TIS Firewall Toolkit Overview

Xp-BETA is an application gateway for X11 protocol that uses Socks and/or CERN WWW Proxy. Availability:anonymous ftp at ftp.mri.co.jp  

 

 


Network and Network Monitoring Programs

Below is a list of programs that gather information from the network or improve the security of the network.

Argus Argus is a powerful tool for monitoring IP networks. It provides tools for sophisticated analysis of network activity that can be used to verify the efforcement of network security policies, network performance analysis and more.
Availability:anonymous ftp at ftp.sei.cmu.edu

Arpwatch An ethernet monitor program that keeps tracks of ethernet/IP address pairings.
Availability:anonymous ftp at ftp.ee.lbl.gov Courtney
It is a program that tries identifies the use of SATAN on a subnet. The program tcpdump will also be needed in order to run Courtney. See below for information above tcpdump.
Availability:anonymous ftp at ciac.llnl.gov Additional Info: CIAC Notes 08

Dig Dig is a network utility which queries Domain Name Servers similar to nslookup but it's more reflexible.
Availability:anonymous ftp at venera.isi.edu

Drawbridge Powerful bridging filter package.
Availability:anonymous ftp at net.tamu.edu

Fping An efficient way to test whether a large number of hosts are up Availability:anonymous ftp at slapshot.stanford.edu

IPACL Filters incoming and outgoing TCP and UDP in a SVR4/386 kernel.
Availability:anonymous ftp at ftp.win.tue.nl

ISS Checks hosts within a specified range of IP address for various security vulnerabilities in sendmail, anonymous FTP setup, NFS and many more.
Availability:anonymous ftp at info.cert.org Additional Info: CERT Advisory 93:14.Internet.Security.Scanner

Klaxon It is a daemon that is used to identify the use of port scanners like ISS and SATAN .
Availability:anonymous ftp at ftp.eng.auburn.edu

Netlog Network logging and monitoring of all TCP and UDP connections on a subnet. Netlog also includes tools to analyzing the output. Availability:anonymous ftp at net.tamu.edu

Network Security Scanner (NSS) NSS is a perl that scans one host on subnet or an entire subnet for various simple security problems. Availability:anonymous ftp at jhunix.hcf.jhu.edu

NFSWatch NFSWatch monitors NFS requests and measures response time for each RPC. Availability:anonymous ftp at coast.cs.purdue.edu

Pidentd Identd tries to identify the remote user name of a TCP/IP connection. Identd is an implementation of RFC 1413.
Availability:anonymous ftp at ftp.lysator.liu.se or ftp.csc.ncsu.edu Additional Info: RFC 1413

PingLogger PingLogger detects and logs ICMP ECHO REQUESTS .
Availability:world wide web at www.students.uiuc.edu

Rscan Rscan is a extensible network scanner that checks for common network problems and SGI specific vulnerabilities.
Availability:anonymous ftp at ftp.vis.colostate.edu
Additional Info: Rscan:Heterogeneous Network Interrogation

SATAN SATAN is a program that gathers network information such the type of machines and services available on these machine as well as potential security flaws.
Availability:anonymous ftp at ftp.win.tue.nl . Also see www.fish.com for a list of mirror sites.
Additional Info: Cert Advisory CA-95:06.satan

Scan-Detector Scan-detector determines when an automated scan of UDP/TCP ports is being done on a host running this program. Logs to either syslog or strerr.
Availability:anonymous ftp at coast.cs.purdue.edu
Additional Info: COAST Projects' Tools

Simple Key-Management For Internet Protocols (SKIP) SKIP adds privacy and authentication at the network level.
Availability:USA and Canada--via web form
Availability:International--anonymous ftp at ftp.elvis.ru
Additional Info: SKIP Information and SKIP in Russia

Strobe Strobe displays all active listening TCP port on remote hosts. It uses an algorithm which efficiently uses network bandwidth.
Availability:anonymous ftp at suburbia.apana.org or minnie.cs.adfa.oz.au

TCP Wrapper Allows a Unix System Administrator to control access to various network services through the use of access control list. It also provide logging information of wrapped network services which may be used to prevent or monitor of network attacks.
Availability:anonymous ftp at ftp.win.tue.nl
Additional Info: TCP Wrapper

Tcpdump It captures and dumps protocol packets to monitor or debug a network.
Availability:anonymous ftp at ftp.ee.lbl.gov TracerouteTraceroute traces the route IP packets take from the current system to a destination system. Availability:anonymous ftp at ftp.psc.edu

YPX It is a utility used to retrieve a NIS map from a host running NIS daemon. Availability:anonymous ftp at ftp.uu.net or WWW server at mls.saic.com

 


System Enhancements Programs:

Below is a list of programs that are typically provided by an operating system but improve the security of the system.

Anonftpd
anonftpd is a read-only anonymous FTP server.
Availability:anonymous ftp at koobera.math.uic.edu
Additional Info: anonftd
 
Crack
Crack is a password cracker.
Availability:anonymous ftp at sable.ox. ac.uk
 
Crack lib
Checks plaintext words against through generated by Crack.
Availability:anonymous ftp at sable.ox.ac.uk
 
Deslogin
Provides a more secure method for remote login than telnet or rlogin in untrusted networks. Deslogin encrypts the connection using DES.
Availability:anonymous ftp at ftp.uu.net
 
Logdaemon
Replacement for system ftp , rlogin , rexec , rsh daemons and login program that have added security features such as login in failures and S/Key one-time password support.
Availability:anonymous ftp at ftp.win.tue.nl
Additional Info: Wietse's tools and papers
 
Mangle
It is a utility that either checks existing passwords for weakness or forces users to choose good passwords.
Availability:anonymous ftp at ftp.informatik.uni-erlangen.de
Additional Info: Readme file for Mangle
 
Npasswd
It is a replacement for the system passwd command that does not accept poor passwords.
Availability:anonymous ftp at ftp.cc.utexas.edu
Additional Info: Information about npasswd
 
Osh
Osh is a restricted C shell that allows the administrator to control access to files and directories and to provide logging.
Availability:anonymous ftp at ftp.c3.lanl.gov
Additional Info: The Operator Shell
 
Passwd+
Passwd+ is a proactive password checker which replaces the system passwd command. It enforces the selection of good passwords.
Availability:anonymous ftp at dartmouth.edu
 
Portmapper
It is a modified version of portmapper that reduces the v ulnerabilities and disallows proxy access.
Availability:anonymous ftp at ftp.win.tue.nl
 
Rpcbind
A modified version of rpcbind (System V.4 portmapper) that prevents intruders from bypassing NFS export restrictions.
Availability:anonymous ftp at ftp.win.tue.nl
 
Sendmail
A replacement for the system sendmail . This version includes all of the latest patches.
Availability:anonymous ftp at ftp.cs.berkeley.edu
 
Sendmail wrapper
The sendmail wrapper provides limited protection against local sendmail attacks.
Availability:anonymous ftp at ftp.auscert.org.au
 
Shadow
This package including everything that is necessary to use shadow password file.
Availability:anonymous ftp at ftp.cs.widener.edu
 
Smrsh
Smrsh is a restricted shell for sendmail to limit the number of programs that can be executed by sendmail.
Availability:anonymous ftp at ftp.nec.com
 
STEL
STEL is a system replacement for telnet which provides strong mutual authentication and encryption.
Availability:anonymous ftp at idea.sec.dsi.unimi.it
 
Sudo
Sudo allows a system administrator to give limited root privileges to user and log their activities. This version of Sudo is also known as CU-sudo.
Availability:anonymous ftp at ftp.cs.colorado.edu
Additional Info: Sudo - a utility to allow restricted root access
 
Wu-ftpd
A replacement ftp server for UNIX systems that many features including extensive logging and a way of limiting number of ftp users.
Availability:anonymous ftp at wuarchive.wustl.edu
 

System Monitoring Programs:

Below is a list of programs that help check the security of a system.

COPS COPS (Computer Oracle and Password System) is a security program that tries to identify security risks on a Unix system. It checks for empty passwords in /etc/passwd , world-writable files, misconfigure anonymous ftp and many others.
Availability:anonymous ftp at ftp.cert.org

Lsof lsof displays all open files on a UNIX system.
Availability:anonymous ftp at vic.cc.purdue.edu

Merlin Merlin is an interface to five popular security package to make it easier to analyze and manage the data.
Availability:anonymous ftp at ciac.llnl.gov Additional Info: Merlin Information

Swatch Swatch is a package used to monitor and filter log files and executes a specified action depending of pattern in the log.
Availability:anonymous ftp at ee.stanford.edu

Tripwire Monitor for changes in system binaries.
Availability:anonymous ftp at coast.cs.purdue.edu Additional Info: Tripwire

TTY-Watcher TTY-Watcher monitors, logs and interacts with all of the tty on a system. Availability:anonymous ftp at coast.cs.purdue.edu Additional Info: TTY-Watcher

Tiger Checks for known security vulnerabilities of Unix workstations. It is similar to Cops with many extensions.
Availability:anonymous ftp at net.tamu.edu

 


Lists of Commercial Security Software: Vendors and Commercial Products by Telstra Corporation Security Vendor Links by National Computer Security Association (NCSA) Commercial Firewalls and Partial FW Products