Premium Essay

5 Reasons to Obfuscate Your Work

In:

Submitted By cokerocks
Words 591
Pages 3
Please use the NIST.org Forum to ask questions or discuss this document. Members can use the comment link below for short comments about this publication.

Annex 1 (.pdf)
Annex 2 (.pdf)
Annex 3 (.pdf)

The SP 800-53 rev. 3 document was created by the National Institute of Standards and Technology and is public domain (not subject to copyright).

(The below SP 800-53 rev.3 description is from NIST.gov, edited)

The implementation of appropriate security controls for an information system is an important task that can have major implications on the operations and assets of an organization. Security controls are the management, operational, and technical safeguards or countermeasures prescribed for an information system to protect the confidentiality, integrity, and availability of the system and its information. There are several important questions that should be answered by organizational officials when addressing the security considerations for their information systems:

What security controls are needed to adequately protect the information systems that support the operations and assets of the organization in order to accomplish its assigned mission, protect its assets, fulfill its legal responsibilities, maintain its day-to-day functions, and protect individuals?
Have the selected security controls been implemented or is there a realistic plan for their implementation?
What is the desired or required level of assurance (i.e., grounds for confidence) that the selected security controls, as implemented, are effective3 in their application?

An effective IT security program should include:
Periodic assessments of risk, including the magnitude of harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of information and information systems that support the operations and assets of the

Similar Documents

Free Essay

10 Fundamental Differences Between Linux and Windows

...Having access to the source code is probably the single most significant difference between Linux and Windows. The fact that Linux belongs to the GNU Public License ensures that users (of all sorts) can access (and alter) the code to the very kernel that serves as the foundation of the Linux operating system. You want to peer at the Windows code? Good luck. Unless you are a member of a very select (and elite, to many) group, you will never lay eyes on code making up the Windows operating system. You can look at this from both sides of the fence. Some say giving the public access to the code opens the operating system (and the software that runs on top of it) to malicious developers who will take advantage of any weakness they find. Others say that having full access to the code helps bring about faster improvements and bug fixes to keep those malicious developers from being able to bring the system down. I have, on occasion, dipped into the code of one Linux application or another, and when all was said and done, was happy with the results. Could I have done that with a closed-source Windows application? No. #2: Licensing freedom vs. licensing restrictions Along with access comes the difference between the licenses. I’m sure that every IT professional could go on and on about licensing of PC software. But let’s just look at the key aspect of the licenses (without getting into legalese). With a Linux GPL-licensed operating system, you are free to modify that software and...

Words: 1945 - Pages: 8

Premium Essay

Windows Linux Security

...stability, with each seeking to improve in their perceived weaker areas. Comparisons of the two operating systems tend to reflect their origins, historic user bases and distribution models. Index Term— Kernel, Linux, Operating Systems, Windows II. THE ESSENTIAL DIFFERENCES BETWEEN LINUX & WINDOWS (BEGINNERS LEVEL) 1- Drives don’t have letters, they have mountpoints The first thing that usually trips up people who come from Windows to Linux is that filesystems aren’t assigned letters the way they are in Windows. Instead, there is a single root filesystem whose path is “/”. If you must use the Windows analogy to help you conceptualize it, you can think of this as the C:\ drive; it’s the top of the filesystem. The Disk Analyzer Shows your Filesystem Usage and Layout Linux mounts new drives in folders inside the root filesystem. You’ll notice that if you plug in a USB key, it will be...

Words: 5726 - Pages: 23

Premium Essay

Business Communication

...April 18,2012 Afrins Farid Shafi Department Of Business Administration University of Information Technology and Sciences  Subject: Submission of term paper  Dear Sir, With due respect it is my pleasure to present the term paper entitled Corporate Social Responsibility. While preparing the report I have tried my level best to focus closely on the topic and try to focus most complete and updated information available. I strongly believe that it will provide a clear idea about Barriers of effective business communication and ways to overcome them.  To prepare this report, we have given best effort to accumulate needed information.           We will be available to answer any question for clarification. Thank you for your sincere support.  Sincerely Yours,                                                            1.Nazia Hasan Shaity 3.Nayeem Jahan Id-11310159 Id-11310115 2.Abu Taleb 4.Helena Akter Id-10510713 Id-10510647 Acknowledgement: It is our concession to thank Afrins Farid, lecturer of Department of Business Administration, University of Information Technology and Sciences for rendering us her expertise through this assignment.     Practical knowledge is fundamental for the application of theoretical intelligence. Being this in mind the course...

Words: 4248 - Pages: 17

Free Essay

Us and the Io War

...Why the United States is losing the Information War Matt Apel CMR 592 Howard Kleinberg Introduction Cyber Warfare and cyber security have been on the rise for several years now. However, when these topics are discussed amongst government officials, business owners, and civilians the focus has been assaults on personal privacy, hacking into government computers systems, and denial of services. Rarely, is the focus on how armed groups and terrorist organizations are using Information Operations (social media and propaganda) to affect political, economic, and social systems all over the world. Information Operations is defined as, The integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military deception and operations security, in concert with specified supporting and related capabilities, to influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own. Also called IO (Air University 2006). Former Defense Advanced Research Projects Agency (DARPA) member Rand Waltzman states, “I recently concluded a $50 million program, Social Media in Strategic Communication, which led to the release of more than 200 publications and to the creation of a science of social media. What we learned is that “bullsh..t” is a weapon that is being used worldwide to fundamentally attack the medium of the press, and that the issue of freedom of the press is, in fact, a diversion....

Words: 4464 - Pages: 18

Premium Essay

Bhjbb

...------------------------------------------------- General conditions ------------------------------------------------- Assignment 1 – International Law 2 Santiago Palacios 500733 & Stijn Derksen 497290 Summary Resemblances and differences between 3 sets of general conditions. Table of Contents Apple 3 1. Scope and definitions 3 2. Orders 3 3. Delivery and Shipment 3 4. Risk and Title 3 5. Acceptance 4 6. Price 4 7. Payment 4 8. Data protection 4 9. Proprietary rights 5 10. Software license 5 11. Export control 5 12. Warranty 5 13. Telephone Support / Contacting Apple 6 14. Limitation of Liability 6 15. Governing law / Jurisdiction 6 16. General Terms 6 16.4. Modification – No modification to this Agreement shall be binding unless in writing and signed by an authorized representative of each party. 7 IKEA Terms and Conditions for Sale of Products 7 Article 1. Definitions 7 Article 2. Application of the Terms and Conditions 7 Article 3. Place of Sale / Performance of Obligations 7 Article 4. Products Subject to Purchase and Sale Contract of Products 7 Article 5. Steps Before Entering into Purchase and Sale Contract 8 Article 6. Entering into Purchase and Sale Contract 8 Article 7. Payment of Purchase Price 8 Article 8. Delivery and Transportation of Products 8 Article 9. Assembly and Installation of Products 9 Article 10. Guaranty of the Quality of Products 9 Article 11. Return Within 90 Days of Purchase 10 Article 12. Repair and...

Words: 6977 - Pages: 28

Premium Essay

Gentile.Anderson2003.Pdf

...CHAPTER 7 Violent Video Games: The A COMPLETE GUIDE FOR PARENTS AND Newest Media Violence Hazard PROFESSIONALS Douglas A. Gentile and Craig A. Anderson Hazard Edited by Douglas A. Gentile In creating this electronic reprint, we have attempted to keep the style, pagination, and format as close to the published form as possible. Nonetheless, some errors may have occurred. If you discover a substantial error, please contact Craig Anderson using the following email address: caa@iastate.edu. Please note that this electronic reprint is provided as a courtesy. Please do not post or distribute this reprint in any fashion that may violate the copyright of the original publisher or the authors. Thank you for your interest in this work. In 1972, a new form of entertainment became commercially available with the release of the video game Pong. In Pong, two players tried to "hit" an electronic "ball" back and forth. From these humble beginnings, a revolution in the entertainment industry was born. Interactive game revenues are now significantly greater than the domestic film industry ("Industrial Strengths," 2000). Worldwide video games sales are now at $20 billion annually (Cohen, 2000). The PlayStation video game console, which began as a side project at Sony, now represents $6 billion of the company's $20 billion in annual sales (Cohen, 2000). It is reasonable to question whether video games may have similar effects to the effects of other entertainment...

Words: 11640 - Pages: 47

Premium Essay

Opsec and Terrorism

...OPSEC in Warfare and Terrorism “The enemy aggressively "reads" our open source and continues to exploit such information for use against our forces. Some soldiers continue to post sensitive information to internet websites and blogs, e.g., photos depicting weapon system vulnerabilities and tactics, techniques, and procedures. Such OPSEC violations needlessly place lives at risk and degrade the effectiveness of our operations.” Peter Schoomaker (1). Operations Security (OPSEC), while a relatively recent term, is an operations enabler that has been practiced in varying degrees throughout history. This document will explore the history of OPSEC as it’s known today, discuss the process and its role in disrupting the capabilities of adversarial forces using multiple collection and planning models and examine the rapidly advancing technical capabilities of threat vectors. OPSEC as a concept was developed during the Vietnam War under the command of Admiral Ulyssess Sharp. The mission of the newly-established “Purple Dragon” team was to determine how the enemy was able to gather information on military operations (2). The team was able to understand the need to alter tactics and procedures to reduce an adversary's ability to make educated predictions based on the knowledge of routines (3). Post-war OPSEC was formally established as a national program when President Ronald Regan signed the National Security Decision Directive Number...

Words: 5936 - Pages: 24

Premium Essay

Hehehe

...Pretotyping@Work Invent Like A Startup, Invest Like A Grownup Jeremy Clark Co-Founder, PretotypeLabs First Edition ! Copyright © Jeremy Clark 2012 PretotypeLabs.com AUTHOR’S NOTE This is an economics book. Before you drop it like it’s on fire and run screaming from the room, let me explain. Economics is the study of resource scarcity and choice; it helps clarify the trade-offs we face when we make decisions about where to put our time and money, when and how much we should spend or save. In the context of innovation, economics informs the type and number of innovations attempted in a given period - how bold, how aggressively pursued, and how funded. This book describes an approach to innovation decision making that can break enormously wasteful historical trade-offs in resources. The goal of this book is to enable the practical application of that approach - pretotyping - within mature companies looking to improve the effectiveness of their front-end innovation processes. My colleague and friend Alberto Savoia is the originator of the term pretotype and much of the theoretical foundation for pretotyping. For an entertaining and rapidly-digestible primer on the method, I commend his excellent book Pretotype It1. I owe Alberto - and his many collaborators at Google, where pretotyping abounds - a profound debt, and I heartily acknowledge his prior art. This book is based upon the Pretotyping@Work workshop materials I developed with Alberto that makes pretotyping...

Words: 12513 - Pages: 51

Premium Essay

Clean Code

...Clean Code Robert C. Martin Series The mission of this series is to improve the state of the art of software craftsmanship. The books in this series are technical, pragmatic, and substantial. The authors are highly experienced craftsmen and professionals dedicated to writing about what actually works in practice, as opposed to what might work in theory. You will read about what the author has done, not what he thinks you should do. If the book is about programming, there will be lots of code. If the book is about managing, there will be lots of case studies from real projects. These are the books that all serious practitioners will have on their bookshelves. These are the books that will be remembered for making a difference and for guiding professionals to become true craftsman. Managing Agile Projects Sanjiv Augustine Agile Estimating and Planning Mike Cohn Working Effectively with Legacy Code Michael C. Feathers Agile Java™: Crafting Code with Test-Driven Development Jeff Langr Agile Principles, Patterns, and Practices in C# Robert C. Martin and Micah Martin Agile Software Development: Principles, Patterns, and Practices Robert C. Martin Clean Code: A Handbook of Agile Software Craftsmanship Robert C. Martin UML For Java™ Programmers Robert C. Martin Fit for Developing Software: Framework for Integrated Tests Rick Mugridge and Ward Cunningham Agile Software Development with SCRUM Ken Schwaber and Mike Beedle Extreme Software Engineering: A Hands on Approach Daniel H. Steinberg...

Words: 20864 - Pages: 84

Free Essay

Worl Analogy

...language—Synonyms and antonyms—Problems, exercises, etc. 2. Vocabulary—Problems, exercises, etc. I. LearningExpress (Organization) PE1591 .A24 2002 428.1'076—dc21 2002006843 Printed in the United States of America 9 8 7 6 5 4 3 2 First Edition ISBN 1-57685-422-1 For more information or to place an order, contact LearningExpress at: 55 Broadway 8th Floor New York, NY 10006 Or visit us at: www.learnatest.com The LearningExpress Skill Builder in Focus Writing Team is comprised of experts in test preparation, as well as educators and teachers who specialize in language arts and math. LearningExpress Skill Builder in Focus Writing Team Brigit Dermott Freelance Writer English Tutor, New York Cares New York, New York Sandy Gade Project Editor LearningExpress New York, New York Kerry McLean Project Editor Math Tutor Shirley, New York William Recco Middle School Math Teacher, Grade 8 Shoreham/Wading River School District Math Tutor St. James, New York Colleen Schultz Middle School Math Teacher, Grade 8 Vestal Central School District Math Tutor Vestal, New York Contents Introduction ix 1 Word Analogy Practice 1 2 Word Analogy Practice 9 3 Word Analogy Practice 17 4 Word Analogy Practice 25 5 Word Analogy Practice 33 6 Word Analogy Practice 41 7 Word Analogy Practice 49 8 Word Analogy Practice 57 9 Word Analogy Practice 65 10...

Words: 17361 - Pages: 70

Premium Essay

The Right to a Trial by Jury

...(ADR) forums that are evolving to an ever-increasing degree. The American Jury Project (AJP) of 2005, a national symposium of the American Bar Association, was held to establish the standards and principles for juries and jury trials. Principle 1 states that “the right to a jury trial should be preserved; however, the lack of available jurors and the rules and procedures used in the jury selection process have reduced its effectiveness and have made this means of seeking justice a slow, unpredictable, and expensive gamble that is driving parties to seek ADR through other forums. One author described a powerful contradiction in the jury system that confronts people in America: “We love the idea of the jury but hate the way it works. We celebrate the juror’s democratic power but no longer trust the decisions they reach. We say we have the best system in the world, but when called to serve, most of us do everything we can to duck out.” Owing to the fact that the right to a jury trial is enshrined in the Constitution and is a time-honored component of the American Court System, the following discussion explores methods...

Words: 7026 - Pages: 29

Premium Essay

Forensics

...Abstract The purpose of this research paper was to analyze three anti-forensic techniques for potential methods of mitigating their impact on a forensic investigation. Existing research in digital forensics and anti-forensics was used to determine how altered metadata, encryption, and deletion impact the three most prominent operating systems. The common file systems for these operating systems were analyzed to determine if file system analysis could be used to mitigate the impact of the associated anti-forensic technique. The countermeasures identified in this research can be used by investigators to reduce the impact of anti-forensic techniques on an investigation. Also, the results could be used as a basis for additional research. File system analysis can be used to detect and mitigate the impact of the three methods of anti-forensics researched under the right circumstances. Some areas of anti-forensics and file systems have been relatively well-researched. However continued research is necessary to keep pace with changes in file systems as well as anti-forensic techniques. Keywords: Cybersecurity, Albert Orbinati, Windows, Linux, Macintosh, file table. MITIGATING THE IMPACT OF ANTI-FORENSIC TECHNIQUES THROUGH FILE SYSTEM ANALYSIS by Gabriel A. Flynn A Capstone Project Submitted to the Faculty of Utica College August 2012 in Partial Fulfillment of the Requirements for the Degree of Master of Science Cybersecurity – Intelligence & Forensics © Copyright 2012...

Words: 11835 - Pages: 48

Premium Essay

Enron and Use of Special Purpose Entites

...discovered that Enron had perpetrated a very sophisticated form of accounting fraud through its repeated use of what are referred to as Special Purpose Entities (“SPEs”). In their most basic forms, SPEs are business entities formed for the purpose of conducting a well specified activity such as construction of a gas pipeline, or collection of a specific group of accounts receivable. However, because of their complex nature, SPEs can be used to manipulate a corporation’s financial results, which was the primary use for which Enron employed the SPE structure. As a result, the investment and financial community has cast a dark cloud over the special purpose entity, depicting the SPE as an inherently evil structure whose only purpose is to defraud, obfuscate and manipulate a company’s financial results. The purpose of this piece is to challenge this assumption and conclusion as incorrect. This article shows how the SPE abuse Enron perpetrated was neither an indictment of the SPE or the accounting regime under which Enron was operating, but of individuals who intentionally ran afoul of the accounting and disclosure rules that were...

Words: 25798 - Pages: 104

Free Essay

Alchemist

...Ben Jonson (1572–1637).  The Alchemist. The Harvard Classics.  1909–14. | | |  | |Introductory Note | |  | |  | |BEN JONSON was born of poor parents at Westminster in 1573. Through the influence of Camden, the antiquary, he got a good |  1| |education at Westminster School; but he does not seem to have gone to a University, though later both Oxford and Cambridge gave | | |him degrees. In his youth he practised for a time his stepfather’s trade of bricklaying, and he served as a soldier in Flanders. | | |  It was probably about 1595 that he began to write for the stage, and within a few years he was recognized as a distinguished |  2| |playwright. His comedy of “Every Man in His Humour” was not only a great immediate success, but founded a school of satirical | | |drama in England. “Sejanus” and “Catiline” were less popular, but are impressive pictures of Roman life, less interesting but more| | |accurate than the Roman plays of Shakespeare. ...

Words: 30021 - Pages: 121

Free Essay

Cheating

...CHEATING Definition Cheating is defined as the intentional act of breaking the rules, or attempting to achieve personal gain through fraud or deceit.16 To cheat is to deprive of something valuable by the use ofdeceit or fraud, to influence or lead by deceit, trick, or artifice, to practice fraud or trickery, to violate rules dishonestly, or to be sexually unfaithful.11 A cheater (sometimes called acheat) gets something by dishonesty or deception; or by depriving one of his or her rights and usually connotes deliberate perversion of the truth; or by large-scale cheating bymisrepresentation or abuse of confidence.11 Cheating is an act of lying, deception, fraud, trickery, imposture, or imposition. Cheating characteristically is employed to create an unfair advantage, usually in one's own interest, and often at the expense of others. Cheating implies the breaking of rules. Cheating is a primordial economic act: getting more for less, often used when referring to marital infidelity.3 Cheating is when a person misleads, deceives, or acts dishonestly on purpose.17  Cheating fundamentally includes several elements of both lying and stealing, with specific motivations to gain something of value by illegitimate means. That is why lying and stealing are discussed before cheating. Cheating is lying and/or stealing with the intention for acquiring something for more than merely the "pleasure" of fooling or depriving others.  Children Cheating as a concept is not understood by children...

Words: 19938 - Pages: 80