Related information

Section 2: Methods of Countering the Threats
UCISA: Information Security Toolkit
UCISA: Model Regulations
SANS: Critical Security Controls
Section 3: Computer Security
Janet: Securing Networked Computers
NIST: secure configuration checklists
Microsoft: Baseline Security Analyser
CIO Council: BYOD toolkit
Janet Logfiles
Janet: Effective Incident Response
Janet CSIRT: Malware
Boston University: Host-based firewalls
OWASP: Secure Software Development
Wikipedia: Cross-site Scripting
Janet CSIRT: DNS resolver security
ITSPA: IP telephony security
Janet Passwords: Threats and Counter-measures
Section 4: Network Security
Team Cymru: list of bogon IP ranges
Janet: Firewall Implementation
Janet CSIRT: blocking LAN service ports
IANA: well-known ports list
SANS ISC: protecting DHCP and Router Advertisements
Section 5: Security Measures within the Janet Backbone
Janet Security Policy
Section 6: Requirements on Organisations Connecting to Janet
Janet Eligibility Policy
Janet Security Policy
Janet Acceptable Use Policy