请输入您要查询的百科知识:

 

词条 Security Technical Implementation Guide
释义

  1. See also

  2. References

  3. External links

     Resources 

A Security Technical Implementation Guide (STIG) is a cybersecurity methodology for standardizing security protocols within networks, servers, computers, and logical designs to enhance overall security. These guides, when implemented, enhance security for software, hardware, physical and logical architectures to further reduce vulnerabilities.

Examples where STIGs would be of benefit is in the configuration of a desktop computer or an enterprise server. Most operating systems are not inherently secure.[1] which leaves them open to criminals such as identity thieves and computer hackers. A STIG describes how to minimize network-based attacks and prevent system access when the attacker is interfacing with the system, either physically at the machine or over a network. STIGs also describe maintenance processes such as software updates and vulnerability patching.

Advanced STIGs might cover the design of a corporate network, covering configurations of routers, firewalls, domain name servers and switches.

See also

  • Information Assurance
  • CIA triad
  • Security Content Automation Protocol

References

1. ^https://www.cvedetails.com/top-50-products.php

External links

Resources

  • NIST Security Configuration Checklists Repository
  • Security Technical Implementation Guides and Supporting Documents in the Public Area
  • [https://cyber.trackr.live/ Online STIG search]

3 : Configuration management|Computer security|Security compliance

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/9/24 14:34:51