Network security

Monitoring and preventing unauthorised access to a computer network, and network-accessible end user devices.
Showing 1 - 25 of 48 results
Sort by: A-Z|Date
  • DoS Guidance - Scaling

    Guidance31 Jan 2018TopicsIT infrastructure, Network security

    Ensure your service can scale to deal with surges in concurrent sessions.

  • DoS Guidance - Upstream defences

    Guidance31 Jan 2018TopicsIT infrastructure, Network security

    Ensure your service providers are ready to deal with resource exhaustion in places where they are uniquely placed to help.

  • DoS Guidance - Understand your service

    Guidance31 Jan 2018TopicsIT infrastructure, Network security

    Understand the points in your service where resources can be overloaded or exhausted. Determine whether you, or a supplier, are responsible for each.

  • DoS Guidance - Testing and monitoring

    Guidance31 Jan 2018TopicsIT infrastructure, Network security

    Gain confidence in your defenses by testing them, and gain confidence you'll notice when attacks start by having the right tooling in place.

  • DoS Guidance - Response plan

    Guidance31 Jan 2018TopicsIT infrastructure, Network security

    You should design your service, and plan your response to an attack, so that the service can continue to operate, albeit in a degraded fashion.

  • Denial of Service (DoS) guidance collection

    Guidance31 Jan 2018TopicsIT infrastructure, Network security

    Guidance to help organisations understand and mitigate against DoS attacks.

  • Understanding denial of service (DoS) attacks

    Guidance31 Jan 2018TopicsIT infrastructure, Network security

    An introduction to denial of service (DoS) attacks.

  • B1. Service protection policies and processes

    Guidance28 Jan 2018TopicsNetwork security, NIS Directive
  • A4. Supply chain

    Guidance28 Jan 2018TopicsOperational security, Network security, NIS Directive
  • A3. Asset management

    Guidance28 Jan 2018TopicsIT infrastructure, Network security, NIS Directive
  • Advisory: Turla group malware

    18 Jan 2018TopicsNetwork security, The NCSC

    The NCSC has identified a new version of the Neuron malware so an update report has been added to this page.

    This report provides new intelligence derived from NCSC investigations into two tools used by the Turla group to target the UK, known as Neuron and Nautilus.

  • Becoming a CHECK provider

    Information15 Jan 2018TopicsRisk management, Network security, Cloud security
  • Using a CHECK provider

    Information15 Jan 2018TopicsRisk management, Network security, Cloud security

    Information for organisations considering using a CHECK service provider.

  • Composition of a CHECK team

    Information15 Jan 2018TopicsRisk management, Network security, Cloud security
  • CHECK provider application - company methodology

    Information15 Jan 2018TopicsRisk management, Network security, Cloud security
  • TLS VPN Client: CPA SC

    Document18 Dec 2017TopicsIT infrastructure, Network security, Assurance

    Provides secure corporate network connectivity over a less-trusted network.

  • Using TLS to protect data

    Guidance18 Dec 2017TopicsNetwork security, Digital services

    How to configure the services that must be able to receive incoming connections from unknown clients or services.

  • CHECK Fundamental Principles

    Information13 Nov 2017TopicsRisk management, Network security

    This is a summary of the principles which form the basis of the CHECK service.

  • CHECK Reports

    Information13 Nov 2017TopicsRisk management, Network security, Cloud security

    Details on the reports that must be submitted by CHECK service providers to the NCSC

  • CHECK provider feedback

    Information13 Nov 2017TopicsRisk management, Network security, Cloud security

    Giving customer feedback on work carried out by a CHECK service provider

  • 'Krack' Wi-Fi guidance

    Guidance30 Oct 2017TopicsNetwork security, Vulnerabilities

    Updated at 08:30, 30 October. 

    Guidance for enterprise administrators, small businesses and home users in relation to the recently published 'Krack' vulnerability in Wi-Fi networks protected by WPA2.

  • ROCA: Infineon TPM and Secure Element RSA Vulnerability Guidance

    Guidance20 Oct 2017TopicsNetwork security, Vulnerabilities

    Guidance updated 12:30 on October 24.

    Guidance for those who want to understand and reduce the impact of the ROCA vulnerability.

  • Penetration Testing

    Guidance09 Aug 2017TopicsOperational security, Network security

    Advice on how to get the most from penetration testing

  • pens

    Penetration testing - what is it and who is it for?

    Blog post09 Aug 2017AuthorHarry WTopicsOperational security, Network security

    A primer for anyone interested in reading our new penetration testing guidance

  • virtual private networks

    Introducing new guidance on Virtual Private Networks (VPNs)

    Blog post01 Aug 2017AuthorAndy PTopicsIT infrastructure, Network security, End user technology

    An introduction to our new guidance on virtual private networks