Verifying Cyber Implementation Best Practices With Malcolm
Conference
·
OSTI ID:2480663
- Idaho National Laboratory
Network traffic analysis can reveal a lot about what's right or wrong with a network's cybersecurity footing. Using Malcolm, a powerful open-source network traffic analysis tool suite for network security monitoring, cyber analysts and asset owners can validate cybersecurity best practices and uncover red flags in network configuration, including: proper network segmentation east-west (cross-segment) and north-south traffic unsecure or outdated network protocols authentication using clear text credentials rogue devices and services unexpected protocols (e.g., IPv6, DNS, DHCP, update checks, etc.) suspicious file transfers
- Research Organization:
- Idaho National Laboratory (INL), Idaho Falls, ID (United States)
- Sponsoring Organization:
- 58
- DOE Contract Number:
- AC07-05ID14517
- OSTI ID:
- 2480663
- Report Number(s):
- INL/CON-24-81229-Rev000
- Country of Publication:
- United States
- Language:
- English
Similar Records
Malcolm
Deconstructing the Nuclear Supply Chain Cyber-Attack Surface
Large-Scale Hydrogen Storage Cyber Risk Assessment
Software
·
Sun May 12 20:00:00 EDT 2019
·
OSTI ID:code-27142
Deconstructing the Nuclear Supply Chain Cyber-Attack Surface
Conference
·
Thu Jul 16 00:00:00 EDT 2020
·
OSTI ID:1845443
Large-Scale Hydrogen Storage Cyber Risk Assessment
Technical Report
·
Tue Oct 01 00:00:00 EDT 2024
·
OSTI ID:2480226