JavaScriptMessages
APEC
Asia Pacific Economic Cooperation
.English
.Español
.tiếng Việt
.По-русски
.한국어
.日本語
.简体中文版
Home
News
Rss Feeds
SiteMap
Academics
Tools
Tool Downloads (Pg. 1)
Tool Downloads (Pg. 2)
Tool Downloads (Pg. 3)
Tool Downloads (Pg. 4)
Curriculum
CNSS Standards
Ethics and Law
K-12 Material
NSA Centers of Excellence
Teaching Materials
4012 Presentation
Course Modules
Module 1
01. (I) Corporate Resource
02. (II) Basic Problems
03. (III) Ethical Issues
04. (IV) Studies
Teaching Considerations
Module 2
01. (I) Ethics
02. (II) Environment
03. (III) Physical
04. (IV) Data
05. (V) Security Training
Teaching Considerations
Module 3
01. (I) Planning
02. (II) Organizational Policies & Procedures
03. (III) Ethics and Professionalism
04. (IV) Personnel Security
05. (V) Physical Security
06. (VI) System Security
07. (VII) Threats & Vulnerabilities
08. (VIII) Data Security & Recovery
09. (IX) Control and Audit
10. (X) Costs and Benefits
Teaching Considerations
Module 4
01. (I) Underlying Problem
02. (II) Laws as Tools for Information Security
03. (III) Laws and Legislation as Legal Options to
Teaching Considerations
Module 5
01. (I) Overview
02. (II) System Sensitivity
03. (III) Security Requirements
04. (IV) Levels of Security
05. (V) Data Life Cycles
06. (VI) Sample Protection Plan
Teaching Considerations
Module 6
01. (I) Overview
02. (II) Threats
03. (III) Countermeasures
04. (IV) Tradeoffs-Costs & Benefits
05. (V) Network Design
Teaching Considerations
Module 7
01. (I) Overview
02. (II) Development of Security Program
03. (III) Risk Analysis
04. (IV) Contingency Planning
05. (V) Legal Issues for Managers
06. (VI) System Validation & Verification (Accredi
07. (VII) Information Systems Audit
08. (VIII) Computer Security Check List
Teaching Considerations
Module 8
Course Modules Website
Course Videos
IA Videos
Videos (Pg. 1)
Videos (Pg. 2)
Videos (Pg. 3)
Videos (Pg. 4)
Videos (Pg. 5)
Videos (Pg. 6)
Videos (Pg. 7)
External Links
Academic Sites
Government Sites
Independent Organizations
Industry Sites
General Interest
Common Criteria
IA Activities
Professional Certification
Seminal Works
Seminal Papers
Glossary
Publications
Government Documents
Gov Docs (Pg. 1)
Gov Docs (Pg. 2)
Gov Docs (Pg. 3)
Gov Docs (Pg. 4)
Gov Docs (Pg. 5)
Gov Docs (Pg. 6)
IA Posters
IA Posters (Pg. 1)
IA Posters (Pg. 2)
IA Posters (Pg. 3)
IA Posters (Pg. 4)
IA Posters (Pg. 5)
IA Posters (Pg. 6)
Industry Documents
NIATEC Publications
Older Papers
Publisher Databases
Login
News Articles
30 Articles found between 14 Mar 2008 and 12 Sep 2008
Current Articles
<---- Newer Articles
Older Articles ---->
913 Weeks Ago
NYU-Poly's 5th annual Cyber Security Awareness Week (CSAW)
4 Sep 08
ISIS lab presents NYU-Poly's 5th annual CSAW where students can compete and win prizes.
920 Weeks Ago
The Insider Threat, and the New Program Offering Assessments.
21 Jul 08
The Identity Theft Resource Center reported this week that nearly 16 percent of breaches so far this year came from insiders, up from 6 percent in 2007, and 11.7 percent came from attackers outside the company -- down from 14.1 percent last year.
Forecast for July: Mostly sunny, 100% chance of spam
21 Jul 08
Spam accounted for 89 percent of all email in May and 87.6 percent of all email in June.
DC3 Digital Forensic Challenge
21 Jul 08
Pioneer new investigative tools, techniques, and methodologies.
Call for Papers
21 Jul 08
Registration for the DoD Cyber Crime Conference.
TCS thin client has been SABI-certified
21 Jul 08
The Coast Gaurd has accredited a thin client system for secure use of the Secret and Below Interoperability (SABI)
Telework's Weak Link
21 Jul 08
Teleworking is working from a home computer. It cuts down on commuting costs and times, it also boosts employee's morale.
Telework's Security Guidelines
21 Jul 08
Telework.gov has links to various tools, guidance, and legislation, they give the advise addressed in this column.
Government Secutity Guide For VMWare ESX, an Opinion
21 Jul 08
Edward L. Haletky gives his thoughts on the Govt. Security guide.
Microsoft inlists bots to "fuzz" for venerabilities
21 Jul 08
The Microsoft Office Security Team run their own "botnet" to "fuzz" for flaws. Fuzzing is popular among hackers as an area to start testing quickly For more information direct your browser to: Da
Firefox 3.0.1 has been released
21 Jul 08
This latest update fixes several security and compatibility issues. It is strongly recommended you update to the latest version for maximum security. For all the release notes on 3.0.1 check out:
Free software from DNSstuff detects vulnerabilities in DNS servers
21 Jul 08
On July 8th a flaw in DNS servers was identified that redirects internet traffic. DNSstuff.com has a new way to check if your domain has been affected. To test for vulnerability check out: DNSst
New worm Transcodes mp3 to try to infect PC's
21 Jul 08
Kaspersky labs has discovered a new malicious software that poses a threat to windows peer to peer (P2P) network users. This malware inserts links to dangerous Web pages within ASF (Advanced Systems
San Francisco's IT System Lockout Continues.
21 Jul 08
A former IT employee has been charged with tampering with sensitive government information on the FiberWAN and locking out the entire IT department from access to the system. To read more about th
Critical BlackBerry PDF bug
21 Jul 08
Research In Motion has Warned users of a critical PDF bug. Patch now available.
938 Weeks Ago
Mobile and Wireless World
14 Mar 08
13 & 14 May 08
“Digital Forensics - Pedagogy and Foundational Research Activity”
14 Mar 08
Jan 5-8, 2009
News, Technologies & Techniques
14 Mar 08
Agencies in Peril: Are We Doing Enough to Protect Federal IT and Secure Sensitive Information?
Cyber Crime
14 Mar 08
Hacker Steals Data on 18M Auction Customers in South Korea
Cyber Crime
14 Mar 08
West Palm Beach touts new wireless cameras for curbing crime
News, Technologies & Techniques
14 Mar 08
FIRST and Carnegie Mellon Software Engineering Institute CERT ... - Web Services Journal
News, Technologies & Techniques
14 Mar 08
Goolag security tool uses Google to scan sites for vulnerabilities
Security Alert
14 Mar 08
Diebold Leaks 2008 Election Results
News, Technologies & Techniques
14 Mar 08
Microsoft Trying to Appeal to the Unix Crowd?
Security Alert
14 Mar 08
Microsoft fixes massive site, service log-in glitch
Security Alert
14 Mar 08
SNMP Joins Dark Side in New XSS Attack
Security Alert
14 Mar 08
US-CERT Warns of Microsoft Windows CE Trojan
Conferences
14 Mar 08
Information Assurance Professional: April 28 - May 01
News, Technologies & Techniques
14 Mar 08
MacBook Air Resistant to Cold-Boot Encryption Attack
News, Technologies & Techniques
14 Mar 08
America on the Cyber Edge: National Symposium for Pulling Together Silos of Excellence in Information Assurance March 7, 2008
Current Articles
<---- Newer Articles
Older Articles ---->