JavaScriptMessages
APEC
Asia Pacific Economic Cooperation
.English
.Español
.tiếng Việt
.По-русски
.한국어
.日本語
.简体中文版
Home
News
Rss Feeds
SiteMap
Academics
Tools
Tool Downloads (Pg. 1)
Tool Downloads (Pg. 2)
Tool Downloads (Pg. 3)
Tool Downloads (Pg. 4)
Curriculum
CNSS Standards
Ethics and Law
K-12 Material
NSA Centers of Excellence
Teaching Materials
4012 Presentation
Course Modules
Module 1
01. (I) Corporate Resource
02. (II) Basic Problems
03. (III) Ethical Issues
04. (IV) Studies
Teaching Considerations
Module 2
01. (I) Ethics
02. (II) Environment
03. (III) Physical
04. (IV) Data
05. (V) Security Training
Teaching Considerations
Module 3
01. (I) Planning
02. (II) Organizational Policies & Procedures
03. (III) Ethics and Professionalism
04. (IV) Personnel Security
05. (V) Physical Security
06. (VI) System Security
07. (VII) Threats & Vulnerabilities
08. (VIII) Data Security & Recovery
09. (IX) Control and Audit
10. (X) Costs and Benefits
Teaching Considerations
Module 4
01. (I) Underlying Problem
02. (II) Laws as Tools for Information Security
03. (III) Laws and Legislation as Legal Options to
Teaching Considerations
Module 5
01. (I) Overview
02. (II) System Sensitivity
03. (III) Security Requirements
04. (IV) Levels of Security
05. (V) Data Life Cycles
06. (VI) Sample Protection Plan
Teaching Considerations
Module 6
01. (I) Overview
02. (II) Threats
03. (III) Countermeasures
04. (IV) Tradeoffs-Costs & Benefits
05. (V) Network Design
Teaching Considerations
Module 7
01. (I) Overview
02. (II) Development of Security Program
03. (III) Risk Analysis
04. (IV) Contingency Planning
05. (V) Legal Issues for Managers
06. (VI) System Validation & Verification (Accredi
07. (VII) Information Systems Audit
08. (VIII) Computer Security Check List
Teaching Considerations
Module 8
Course Modules Website
Course Videos
IA Videos
Videos (Pg. 1)
Videos (Pg. 2)
Videos (Pg. 3)
Videos (Pg. 4)
Videos (Pg. 5)
Videos (Pg. 6)
Videos (Pg. 7)
External Links
Academic Sites
Government Sites
Independent Organizations
Industry Sites
General Interest
Common Criteria
IA Activities
Professional Certification
Seminal Works
Seminal Papers
Glossary
Publications
Government Documents
Gov Docs (Pg. 1)
Gov Docs (Pg. 2)
Gov Docs (Pg. 3)
Gov Docs (Pg. 4)
Gov Docs (Pg. 5)
Gov Docs (Pg. 6)
IA Posters
IA Posters (Pg. 1)
IA Posters (Pg. 2)
IA Posters (Pg. 3)
IA Posters (Pg. 4)
IA Posters (Pg. 5)
IA Posters (Pg. 6)
Industry Documents
NIATEC Publications
Older Papers
Publisher Databases
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
N
N
Na∩ve adj.
NACAM
NACSEM
NACSI
NACSIM
Nadger
Nagware
Nailed To The Wall adj.
Nailing Jelly vi.
Naive User
NAK
Nak Attack
Nano
Nano- pref.
Nanoacre
Nanobot
Nanocomputer
Nanofortnight n.
Nanotechnology
NAR
NARA
Narrative Traffic
Narrowband Modem
Nasal Demons
Nastygram
NAT (network address translation)
Nathan Hale
National Communications System
National Computer Security Assessment Program
National Computer Security Center
National Coordinating Center (NCC)
National Electric Code(r)
National Information Infrastructure
National Information Infrastructure Protection Act of 1996
National Security
National Security /or Emergency Preparedness Telecommunications
National Security And Emergency Telecommunications
National Security Decision Directive
National Security Decision Directive 145
National Security Decision Directive 145 (NSDD 145)
National Security Information
National Security Systems
National Telecommunications And Information System Security Advisory/Information
NATO
Nature
NBH
NCA
NCC
NCCD
NCS
NCSC
NCSC Bulletin
NCSC-TG-001
NCSC-TG-002
NCSC-TG-003
NCSC-TG-004
NCSC-TG-006
NCSC-TG-007
NCSC-TG-008
NCSC-TG-009
NCSC-TG-010
NCSC-TG-011
NCSC-TG-013
NCSC-TG-014
NCSC-TG-015
NCSC-TG-016
NCSC-TG-017
NCSC-TG-018
NCSC-TG-019
NCSC-TG-021
NCSC-TG-022
NCSC-TG-023
NCSC-TG-024
NCSC-TG-025
NCSC-TG-026
NCSC-TG-027
NCSC-TG-028
NCSC-TG-029
NCSC-TG-030
Neat Hack
Neats Vs. Scruffies
NEC
Necessary Bandwidth
Need To Know
Need-To-Know Controls
Need-To-Know Violation
Neep-Neep
Negative-Acknowledge Character
N-Entity
Neophilia
Net
Net Control Station
Net Operation
Net. God
Net. Personality
Net. Police
NetBIOS
NetBOLLIX
Netburp
Nethack
Netiquette
Netlag n.
Netnews
Netrock
NETS
Netsplit
Netstat
Netter
Network
Network address translation (NAT)
Network Architecture
Network Busy Hour
Network Communications Protocols
Network Connectivity
Network Control System
Network Firewalls
Network Front End
Network IDSs (NIDSs)
Network Interface
Network Interface Device
Network Interface Unit (NIU)
Network Layer
Network login key
Network Manager
Network mask
Network Meltdown
Network Monitoring
Network monitoring tools
Network part
Network Reference
Network Reference Monitor
Network Security
Network Security Manager (NSM)
Network Security Officer
Network Security Software
Network Switching
Network System
Network Terminal Number
Network Time Protocol (NTP)
Network Topology
Network Trusted
Network Trusted Computing Base (NTCB)
Network Utility
Network Weaving
Network, The
New Testament
Newbie
Newgroup Wars
Newline
News
Newsfroup
Newsgroup
N-Function
Nibble
Nick
NID
NIDS
Night Mode
Nightmare File System
NII
NIL
Nimda
Ninety-Ninety Rule
NISAC
NIST
NIU
NKSR
NM
No Addtional Requirements
No Contract
No opt
Noddy
Node
NOFORN
Noise
No-Lone Zone
NOMEX Underwear
Nominal Bit Stuffing Rate
Nominal Semidestructor
Nonce
Noncentralized Operation
Noncooperative
Noncooperative Remote Rekeying
Non-Discretionary Security
Nonferrous Shielding
Non-Inference Model
Non-Kernel Security-Related Software (NKSR)
Nonlinear
Non-Maskable Interrupt
Non-Optimal Solution
Nonprocedural Language
Non-Processing Input And Output Devices
Non-Removable Storage Media
Nonrepudiation
Non-Repudiation
Non-Return-To-Zero Code
Non-Return-To-Zero, Change-On-Ones
Non-Secret Encryption
Nonsynchronous Network
Nonsynchronous System
Nontrivial
Nontunable
Nonvolatile Memory
Non-Volatile Memory
No-Op
Not Ready For Prime Time
Notarization
Notebook Computer
Notes
Notices
Notwork
NP
Nroff
NRZ
NRZ1
NSA
NSA Line Eater n.
NSAD
NSA's Ratings Maintenance Phase
NSD
NSDD
NSDD 145
NSEP
NSI
NSM
NSO
NSP
NSRP
NSTAC
NSTISSAM
NSTISSC
NSTISSD
NSTISSI
NSTISSP
NT LAN Manager (NTLM)
NTCB
NTI
NTIA
NTIS
NTISS
NTISSAM
NTISSC
NTISSD
NTISSI
NTISSP
NTLM (NT LAN Manager)
NTM
NTN
NTSC Standard
N-Tuple
Nude
Nuke
Null
Number-Crunching
Numbers
NUXI Problem
NXX
Nybble
Nyetwork
Network Weaving
Network weaving is a technique using different communication networks to gain access to an organization's system. For example, a perpetrator [. ] makes a call through AT&T, jumps over to Sprint, then to MCI, and then to Tymnet. The purpose is to avoid detection and trace-backs to the source of the call. (TC;)