[416] in Intrusion Detection Systems
Re: Security policy
daemon@ATHENA.MIT.EDU (Phil Burg)
Tue Nov 21 06:38:59 1995
From: Phil Burg <phil@jcsmr.anu.edu.au>
To: ids@uow.edu.au
Date: Mon, 20 Nov 1995 13:31:11 +1100 (EST)
In-Reply-To: <199511171052.VAA15432@hestia.ccs.deakin.edu.au> from "David Leong"
Reply-To: ids@uow.edu.au
Thus spake David Leong:
>
> I will soon be working on a Security policy mainly for the unix systems
> Please can someone help by sending me an example policy.
> Thanks.
> I have seen some on the internet. I like to have a few more to get more
> examples.
> Regards
>
Here're some pointers I got from the firewalls list:
http://musie.phlab.missouri.edu/Policy/copies/tamu-collection1.html
http://csrc.ncsl.nist.gov
http://www.telstra.com.au/security.html
http://ciac.llnl.gov/ciac/CIACHome.html
http://www.rpi.edu/Internet/Guides/decemj/icmc/organizations-standards.html
Hope this helps
Phil
--
Phil Burg DoD#1151 TIP#057 "Riding on the highway..."
Network Programmer - The John Curtin School of Medical Research