Site

Security Feature

A

B

C

D

E

F

Mobile access protection

 

 

 

 

 

 

Intruder script protection

 

 

 

 

 

ControlInternet Protocol addresses

 

 

 

 

 

Encryption

 

 

 

 

 

 

Cryptography-based authentication

 

 

 

 

 

 

Encrypt network traffic

 

 

 

 

 

 

Encrypt database contents

 

 

 

 

 

 

Digital signatures

 

 

 

 

 

 

Document integrity

 

 

 

 

 

 

Transaction nonrepudiation

 

 

 

 

 

 

Encrypt backup media

 

 

 

 

 

 

Software Discipline

 

 

 

 

 

 

Use antivirus technology

 

 

 

 

 

Checksum, validate software

 

 

 

 

 

Control user software

 

 

 

 

 

 

Control PC software loading

 

 

 

 

 

 

Network software census

 

 

 

 

 

Integrated software tools

 

 

 

 

 

 

Backup and Disaster Recovery

 

 

 

 

 

 

Backups, multiple storage sites

 

Data content integrity

 

 

 

 

 

 

Operations recoverability

 

System Self-Assessment Evaluation, Staying Technically Current

 

 

 

 

 

 

Run anti-intrusion programs

 

 

 

 

 

Vulnerability evaluation

 

 

 

 

 

Stay up on CERT alerts

 

 

 

 

 

Avoid or update obsolete technologies

 

 

 

 

 



The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement