Today, 
 Welcome 

   

Surf to LSD Home Page

Donate
Look up for the news ;)

  Babelfish
  French
  Spanish
  German
  Italian
  Portuguese
  Japanese
  Korean
  Dutch
  Greek
  Russian
  Chinese (trad.)
  Chinese (simp.)

Cert Teams

Vendor Security

Vendors

NON commercial or cool security sites

Contact

Your System Check:

Liquidmatrix, the LSD logo, its likeness, and these pages Copyslight © 1998 - 2006 Liquidmatrix Solutions & Design All Rights Obscured...whatever.

 

   

  Liquidmatrix White Papers

  NSA Rainbow Series Security Guides

External  

Rainbow Series Library

The following files are provided in PDF format. IMPORTANT: Please read our (NSA's) Legal Notice before using these guides.

  1. DoD Trusted Computer System Evaluation Criteria (Orange Book)

  2. DoD Password Management Guideline (Green Book)

  3. Computer Security Requirements -- Guidance for Applying the DoD TCSEC in Specific Environments (Light Yellow Book)

  4. Technical Rational Behind CSC-STD-003-85: Computer Security Requirements -- Guidance for Applying the DoD TCSEC in Specific Environments (Yellow Book)

  5. A Guide to Understanding Audit in Trusted Systems (Tan Book)

  6. Trusted Product Evaluations - A Guide for Vendors (Bright Blue Book)

  7. A Guide to Understanding Discretionary Access Control in Trusted Systems (Neon Orange Book)

  8. Glossary of Computer Security Terms (Teal Green Book)

  9. Trusted Network Interpretation of the TCSEC (Red Book)

  10. A Guide to Understanding Configuration Management in Trusted Systems (Amber Book)

  11. A Guide to Understanding Design Documentation in Trusted Systems (Burgundy Book)

  12. A Guide to Understanding Trusted Distribution in Trusted Systems (Dark Lavender Book)

  13. Computer Security Subsystem Interpretation of the TCSEC (Venice Blue Book)

  14. A Guide to Understanding Security Modeling in Trusted Systems (Aqua Book)

  15. Trusted Network Interpretation Environments Guideline (Red Book)

  16. Guidelines for Formal Verification Systems (Purple Book)

  17. A Guide to Understanding Trusted Facility Management (Brown Book)

  18. Guidelines for Writing Trusted Facility Manuals (Yellow-Green Book)

  19. A Guide to Understanding Identification and Authentication in Trusted Systems (Light Blue Book)

  20. A Guide to Understanding Object Reuse in Trusted Systems (Light Blue Book)

  21. A Guide to Understanding Trusted Recovery in Trusted Systems (Yellow Book)

  22. A Guide to Understanding Security Testing and Test Documentation in Trusted Systems (Bright Orange Book)

  23. A Guide to Writing the Security Features User's Guide for Trusted Systems (Hot Peach Book)

  24. A Guide to Understanding Information System Security Officer Responsibilities for Automated Information Systems (Turquoise Book)

  25. Assessing Controlled Access Protection (Violet Book)

  26. Introduction to Certification and Accreditation Concepts (Blue Book)

  27. A Guide to Understanding Covert Channel Analysis of Trusted Systems (Light Pink Book)





  NSA Security Recommendation Guides

Internal  

Security Recommendation Guides

The following files are provided in PDF format. IMPORTANT: Please read our (NSA's) Legal Notice before using these guides.

  1. Microsoft Windows 2000 Network Architecture Guide (161KB)

  2. Guide to Securing Microsoft Windows 2000 Group Policy: Security Configuration Tool Set (936KB)

  3. Guide to Securing Microsoft Windows 2000 Group Policy (237KB)

  4. Guide to Securing Microsoft Windows 2000 File and Disk Resources (234KB)

  5. Guide to Securing Microsoft Windows 2000 DNS (738KB)

  6. Guide to Securing Microsoft Windows 2000 Active Directory (430KB)

  7. Guide to the Secure Configuration and Administration of Microsoft Internet Information Services 5.0 (949KB)

  8. Guide to the Secure Configuration and Administration of Microsoft Windows 2000 Certificate Services (1,178KB)

  9. Guide to the Secure Configuration and Administration of Microsoft Windows 2000 Certificate Services (Checklist Format) (966KB)

  10. Guide to Securing Microsoft Windows 2000 Encrypting File System (199KB)

  11. Guide to Securing Microsoft Windows 2000 Schema (86KB)

  12. Microsoft Windows 2000 Router Configuration Guide (1,159KB)

  13. Guide to Windows 2000 Kerberos Settings (369KB)

  14. Group Policy Reference (789KB)

  15. Guide to Securing Windows NT/9x Clients in a Windows 2000 Network (143KB)

  16. Guide to Using DoD PKI Certificates in Outlook 2000 (256KB)





  Router Security Configuration Guide

Internal  

"Principles and guidance for secure configuration of IP routers, with detailed instructions for Cisco Systems routers"

NSA Router Security



  Denial of Service Papers

Posted 09.16.01  




  Maximum Security - The Book Online

External  

A Hacker's Guide to Protecting Your Internet Site and Network

The Book



  User's Security Handbook

Internal  

This is rfc2504. I have added this to the site for informational purposes as it is good reading. enjoy - gattaca

User's Security Handbook



  What are the Basic Security Problems?

External  

This paper is an overall list of questions that a company or even personal comuter user needs to be aware of in order to best secure their system(s). This paper was written and published by Securitywatch.com, an excellent security news and information site.

Basic Security Problems



  David Dittrich's Analysis of Stacheldraht

Internal  

This paper is an analysis of the distributed denial of service tool called "stacheldraht" or "barbed wire". This analysis was written by David Dittrich from the University of Washington.

Stacheldraht Analysis



  SANS Ten Most Critical Internet Security Threats

External  

This a compilation of the 10 most readily identifiable security threats on the internet today. Follow the link below.

SANS Top Ten



  SANS Salary Survey 1999

Internal Download  

A salary survey for security professionals. This local download is in .pdf format. 1999 SURVEY

If you need ADOBE Acrobat reader, it can be downloaded here.





  Other Papers...

Posted 02.03.02