Derek Simmel
Software Engineering Institute
Publications by Derek Simmel
-
Securing Network Servers (2000)
April 01, 2000 • Security Improvement Module
Julia H. AllenKlaus-Peter KossakowskiGary Ford
The practices recommended in this report from 2000 are designed to help administrators configure and deploy network servers that satisfy organizational security requirements.
read -
Information Assurance Curriculum and Certification: State of the Practice
September 01, 1999 • Technical Report
Barbara LaswellDerek SimmelSandra Behrens
This 1999 report describes the state of the practice in information assurance and security curriculum and certification.
read -
Securing Desktop Workstations
February 01, 1999 • Security Improvement Module
Derek SimmelGary FordJulia H. Allen
The practices recommended in this 1999 report are designed to help you configure and deploy networked workstations that satisfy your organization‰s security requirements. The practices may also be useful in examining the configuration of previously deployed workstations.
read -
Securing Network Servers (1999)
February 01, 1999 • Security Improvement Module
Gary FordDerek SimmelDwayne Vermeulen
The practices recommended in this 1999 report are designed to help administrators configure and deploy network servers that satisfy organizational security requirements.
read -
An Approach for Selecting and Specifying Tools for Information Survivability
July 01, 1998 • Technical Report
Robert FirthBarbara FraserSuresh Konda
This paper proposes a lexicon of functionalities to characterize survivable systems activities, and an approach to analyze networked systems environments.
read -
Detecting Signs of Intrusion
June 01, 1998 • Security Improvement Module
Lisa CunninghamRobert FirthBarbara Fraser
The 1998 report provides guidance to help organizations improve the security of their networked computer systems.
read -
Preparing to Detect Signs of Intrusion
June 01, 1998 • Security Improvement Module
John KochmarJulia H. AllenChristopher J. Alberts
The practices contained in this 1998 report identify advance preparations you must make to enable you to obtain evidence of an intrusion or an intrusion attempt.
read -
Security for Information Technology Service Contracts
January 01, 1998 • Security Improvement Module
Julia H. AllenGary FordBarbara Fraser
This 1998 document is one of a new series of publications of the Software EngineeringInstitute at Carnegie Mellon University,security improvement modules.They are intended to provide concrete, practical guidance that will help organizationsimprove the security of their networked computer systems.
read