Please note that this is a page from a previous version of Continuity Central and is no longer being updated.

To see the latest business continuity news, jobs and information click here.

Business continuity information

NIST seeks comments on updates to guidance on network attacks and malware

The US National Institute of Standards and Technology (NIST) is requesting comments on two updated guides on malicious computer attacks: one on preventing, detecting, and responding to attacks and one on preventing and mitigating the effects of malware.

The publications are being revised to reflect the changes in threats and incidents.

The updated Guide to Intrusion Detection and Prevention Systems describes software that has become a necessary addition to the security infrastructure of many organizations.

The guidance describes the characteristics of IDPS technologies and provides recommendations for designing, implementing, configuring, securing, monitoring and maintaining them. The publication discusses four types of IDPS technologies: network-based, wireless, network behavior analysis and host-based.

The Guide to Intrusion Detection and Prevention Systems (Special Publication 800-94, Rev. 1) can be found at http://csrc.nist.gov/publications/drafts/800-94-rev1/draft_sp800-94-rev1.pdf. Comments should be sent to 800-94comments@nist.gov by August 31.

The Guide to Malware Incident Prevention and Handling for Desktops and Laptops (Special Publications 800-83, Rev. 1) can be found at http://csrc.nist.gov/publications/drafts/800-83-rev1/draft_sp800-83-rev1.pdf. Comments should be sent to 800-83comments@nist.gov by August 31.

•Date: 26th July 2012 • US •Type: Article • Topic: ISM

Business Continuity Newsletter Sign up for Continuity Briefing, our weekly roundup of business continuity news. For news as it happens, subscribe to Continuity Central on Twitter.

How to advertise How to advertise on Continuity Central.

To submit news stories to Continuity Central, e-mail the editor.

Want an RSS newsfeed for your website? Click here