NIST Frequently Asked Questions and Answers
Do I have to pay a lot of money in order to secure my network?
No, there are many free and open source tools and technologies that serve different purposes to secure your network. They may (or may not) have the same features and capabilities, but are sufficient enough to use than not having anything.
What are some of the best open source network security monitoring tools?
Argus provides efficient, in-depth analysis of network data to track and report on the status and performance in real time. Argus also provides a format for reporting flow metrics such as connectivity, capacity, demand, loss, delay, and jitter on a per transaction basis.
Wireshark is a widely used network packet and traffic analyzer in real time. It is used for network troubleshooting, analysis, and education. Wireshark helps you explore network packets and unwrap each header to display their contents in human-readable format.
What is multi-factor authentication (MFA)?
MFA ensures that only authorized users can securely access the resources they need by providing two or more different authentication methods. Such methods include something that you are (biometrics, eye/fingerprint scanners), you have possession of (FOB key, PIV card, cell phone), or you know (password). Typically, “something that you know and have” is used since they’re usually the lowest cost options. For instance, a user is unable to log into their work laptop without inserting their assigned PIV card and entering their correct password for access.
What are the benefits of multi-factor authentication (MFA)?
Adopting a MFA system will definitely reduce the chance of becoming a victim of being hacked, identity theft, and adding protection to any sensitive data. For example, if your password is stolen, the perpetrator will also need to steal your PIV card to gain access to your work laptop.
What is one of the many ways to reduce web-based attacks?
How does the recent Capital One data breach impact consumers and businesses?
Fortunately, according to Capital One’s website, over 99 percent of Social Security numbers, credit card account numbers, and log-in credentials were compromised and were not compromised by the credit applications stolen from a rented cloud data server. However, names, billing and email addresses, dates of birth, phone numbers, and self-reported income information was stolen.
The breach was possible from improperly secured Amazon cloud instances and by an insider attack who used to work for the cloud provider. Additionally, the suspected hacker publicly documented the processes and tools used gain access which cloud providers can use to further secure their systems.
Do you have more questions about NIST?
ITG is NIST 800-171 Compliant and can assist your organization in anything related to NIST Standards.