1991
DOI: 10.17487/rfc1281
|View full text |Cite
|
Sign up to set email alerts
|

Guidelines for the Secure Operation of the Internet

Abstract: Guidelines for the Secure Operation of the Internet Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard. Distribution of this memo is unlimited. Preamble The purpose of this document is to provide a set of guidelines to aid in the secure operation of the Internet. During its history, the Internet has grown significantly and is now quite diverse. Its participants include government institutions and agencies, academic and research institutions, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

1991
1991
2018
2018

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 0 publications
0
10
0
Order By: Relevance
“…The IETF Security Policy Working Group (SPWG) is working on a set of recommended security policy guidelines for the Internet [23]. These guidelines may be adopted as policy by regional networks or owners of other resources.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The IETF Security Policy Working Group (SPWG) is working on a set of recommended security policy guidelines for the Internet [23]. These guidelines may be adopted as policy by regional networks or owners of other resources.…”
Section: Related Workmentioning
confidence: 99%
“…The Security Policy Working Group within the IETF is working on a document entitled, "Policy Guidelines for the Secure Operation of the Internet" [23]. It addresses the issue that the Internet is a cooperative venture and that sites are expected to provide mutual security assistance.…”
Section: What Are the Responsibilities To Our Neighbors And Othermentioning
confidence: 99%
See 1 more Smart Citation
“…Early work carried out on Internet security policy includes Pethia et al [28], who discussed policy for the entire Internet community. They recommended that user organizations specify: policies which make employees responsible and accountable for understanding and following security rules, policies for ensuring that employees used available mechanisms to protect their systems, and site-specific policies.…”
Section: User Organization Internet Security Policy Contentmentioning
confidence: 99%
“…These organizations have thus far largely ignored the need for Internet security policy. Pethia et al [28] wrote "There must be a clear statement of the local (Internet) security policy, and this policy must be communicated to the users and other relevant parties. The policy should be on file and available to users at all times, and should be communicated to users as part of providing access to the system.…”
Section: Introduction Media By Whimentioning
confidence: 99%