Uncategorized
Security Principles
Engineering Principles for IT SecurityPrinciples and Practices for Securing ITComputer Security Act of 1987Government Information Security Reform ActFIPSPrivacy Act of 1974Recommended Security Controls
Engineering Principles for IT SecurityPrinciples and Practices for Securing ITComputer Security Act of 1987Government Information Security Reform ActFIPSPrivacy Act of 1974Recommended Security Controls
NCSA Security PoliciesSANS Policy TemplatesInformation Security Policies and Standards
Risk Management Guide For IT SystemsSEPM Certificate ProgramsRisk Management and Business Continuity PlanningPerformance Measurement Guide for Information SecurityThreat and Risk Assessment Working Guide
I have started my training for my CISSP, so many many cool links will be posted on this site. Well, cool if you’re a huge nerd. Here’s the first few. Pentesting Framework:http://www.vulnerabilityassessment.co.uk/index.htm CISSP Training Resources:http://cccure.org/ISO 17799http://www.17799.com/http://www.isaca.org/http://www.itil-officialsite.com/home/home.asp
Here’s my fig for Ubuntu 8.10 Server. $ cat /etc/apache2/sites-available/splunk<virtualhost X.X.X.X:80> ServerAdmin root@localhost ServerAlias splunk.example.com ProxyPass / http://127.0.0.1:8000/ ProxyPassReverse / http://127.0.0.1:8000/ ErrorLog /var/log/splunk.example.com-error_log CustomLog /var/log/splunk.example.com-access_log common</virtualhost><proxy http://127.0.0.1:8000/*> Order deny,allow Deny from all Allow from all AuthName “splunk.example.com” AuthType Basic AuthUserFile /var/www/.htpasswd Require valid-user</proxy>$ cat /var/www/.htaccessAuthUserFile /var/www/.htpasswdAuthName “Authorized Users Only”AuthType Basicrequire Read more…