JavaScriptMessages
APEC
Asia Pacific Economic Cooperation
.English
.Español
.tiếng Việt
.По-русски
.한국어
.日本語
.简体中文版
Home
News
Rss Feeds
SiteMap
Academics
Tools
Tool Downloads (Pg. 1)
Tool Downloads (Pg. 2)
Tool Downloads (Pg. 3)
Tool Downloads (Pg. 4)
Curriculum
CNSS Standards
Ethics and Law
K-12 Material
NSA Centers of Excellence
Teaching Materials
4012 Presentation
Course Modules
Module 1
01. (I) Corporate Resource
02. (II) Basic Problems
03. (III) Ethical Issues
04. (IV) Studies
Teaching Considerations
Module 2
01. (I) Ethics
02. (II) Environment
03. (III) Physical
04. (IV) Data
05. (V) Security Training
Teaching Considerations
Module 3
01. (I) Planning
02. (II) Organizational Policies & Procedures
03. (III) Ethics and Professionalism
04. (IV) Personnel Security
05. (V) Physical Security
06. (VI) System Security
07. (VII) Threats & Vulnerabilities
08. (VIII) Data Security & Recovery
09. (IX) Control and Audit
10. (X) Costs and Benefits
Teaching Considerations
Module 4
01. (I) Underlying Problem
02. (II) Laws as Tools for Information Security
03. (III) Laws and Legislation as Legal Options to
Teaching Considerations
Module 5
01. (I) Overview
02. (II) System Sensitivity
03. (III) Security Requirements
04. (IV) Levels of Security
05. (V) Data Life Cycles
06. (VI) Sample Protection Plan
Teaching Considerations
Module 6
01. (I) Overview
02. (II) Threats
03. (III) Countermeasures
04. (IV) Tradeoffs-Costs & Benefits
05. (V) Network Design
Teaching Considerations
Module 7
01. (I) Overview
02. (II) Development of Security Program
03. (III) Risk Analysis
04. (IV) Contingency Planning
05. (V) Legal Issues for Managers
06. (VI) System Validation & Verification (Accredi
07. (VII) Information Systems Audit
08. (VIII) Computer Security Check List
Teaching Considerations
Module 8
Course Modules Website
Course Videos
IA Videos
Videos (Pg. 1)
Videos (Pg. 2)
Videos (Pg. 3)
Videos (Pg. 4)
Videos (Pg. 5)
Videos (Pg. 6)
Videos (Pg. 7)
External Links
Academic Sites
Government Sites
Independent Organizations
Industry Sites
General Interest
Common Criteria
IA Activities
Professional Certification
Seminal Works
Seminal Papers
Glossary
Publications
Government Documents
Gov Docs (Pg. 1)
Gov Docs (Pg. 2)
Gov Docs (Pg. 3)
Gov Docs (Pg. 4)
Gov Docs (Pg. 5)
Gov Docs (Pg. 6)
IA Posters
IA Posters (Pg. 1)
IA Posters (Pg. 2)
IA Posters (Pg. 3)
IA Posters (Pg. 4)
IA Posters (Pg. 5)
IA Posters (Pg. 6)
Industry Documents
NIATEC Publications
Older Papers
Publisher Databases
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
O
O&M
OADR
Ob
Obfuscated C Contest
Obi-Wan Error
Object
Object Labeling
Object Reuse
Object Sharing
Objectionable-C
Obscure
Observables
OCR
Octal Forty
Octet
Odd Parity
Odd-Even Check
OEM
Oersted
Off The Trolley
Off-By-One Error
Office Of Information And Regulatory Affairs
Office Of Personnel Management
Official Use Only (OUO)
Offline
Offline Crypto-Operation
Off-Line Crypto-Operation
Off-Line Cryptosystem
Off-Site Security (Information, Processing)
Off-The-Shelf Item
Ogg /og/ v. [CMU]
Old Fart n.
Old Testament n.
OMB
OMB A-130
OMB CIR
OMB CIRC
OMB Circular A-127
ONA
One-Banana Problem n.
One-Line Fix n.
One-Liner Wars
One-Part Code
One-Time
One-Time Cryptosystem
One-Time Pad (OTP)
One-time password
One-Time Passwords
One-Time Tape (OTT)
One-Way Function
Ongoing communication
Online Crypto-Operation
On-Line Crypto-Operation
On-Line Cryptosystem
Ooblick
Op /op/ n.
OPCODE
Open DeathTrap n.
Open n.
Open Security
Open Security Environment
Open Source Information
Open Sources
Open Storage
Open Switch
Open System
Open Systems Interconnect Model OSI
Open Systems Interconnection
Open Systems Interconnection - Protocol Specifications
Open Systems Interconnection - Service Definitions
Open Systems Interconnection - Systems Management
Open Systems Interconnection Architecture
Open Systems Interconnection Protocol Specifications
Open Systems Interconnection Service Definitions
Open Systems Interconnection Systems Management
Open Systems Interconnection--Reference Model (OSI-RM)
Open Systems Security
OpenBSD
OpenPGP
Operand
Operating System
Operating System Integrity
Operating system lockdown
Operating system monitor
Operating System Security Features
Operating Systems
Operation
Operational Data
Operational Data Security
Operational Key
Operational Procedures Review
Operational Security Indicators
Operational Site Security Manual
Operational Waiver
Operations Code (OPCODE)
Operations Security (OPSEC)
Operations Security Appraisal
Operations Security Assessment
Operations Security Indicators
Operations Security Measures
Operations Security Monitoring
Operations Security Planning Guidance
Operations Security Process
Operations Security Survey
Operations Security Vulnerability
Operations Security Working Group
Operator
Operator Of A Federal Computer System
OPI
OPM
OPNAVINST
OPNAVINST 5239. 1A
OPSEC
OPT
Opt in
Opt out
Optical Character Reader
Optical Character Recognition
Optical Diff
Optical Grep
Optical Intelligence
Optical/Imaging Systems Security
Optimism
OPTINT
Optional Modification
Options
OR
OR/D2
Orange Book
Orange Book Terminology
ORCON
ORD
Organization C4 Systems Security Office
Organizational
Organizational Culture
Organizational Maintenance
Organizational Placement Of The IS/IT Security Function
Oriental Food
Orientation
Originating User
Orphan
Orphaned I-Node
Orthogonal adj. [from mathematics]
OS
OS/2
OSI
OSI (Reference Model of Open Systems Interconnection)
OSINT
OSU
OT&E
OTAD
OTAR
OTAT
OTOH
OTP
OTT
OUSDR&E
Outage
Outage Duration
Outage Probability
Outlook
Outlook Express
Out-Of-Band
Out-Of-Band Emission
Out-Of-Band Signaling
Output
Output-Only Devices
Outside Plant
Outsourced antivirus protection
Overall Security
Overflow
Overflow Bit n.
Overflow Pdl
Overhead Bit
Overhead Communications
Overrun n.
Oversight
Overt Channel
Overt Collection
Over-The-Air Key
Over-The-Air Key Distribution
Over-The-Air Key Transfer (OTAT)
Over-The-Air Rekeying (OTAR)
Overwrite
Overwrite Procedure
Overwriting
Owner
Owner Access Mode
Owner Of Data
Organizational
Limited maintenance performed by a maintenance user organization.