An overview paper from the US General Accounting Office describing state-of-the-art security technologies and practices that can be used to defend computer systems against cyber attacks.
The GAO has categorised 18 specific technologies according to the control functionality they provide and described what the technologies do, how they work, and their reported effectiveness. The five control categories identified include, access controls, systems integrity, cryptography, audit and monitoring, and configuration management and assurance.
The discussion of each technology is technical in nature and is intended to assist in the identification and selection of cyber security technologies for deployment.
Download the document now 1.1Mb - PDF