JavaScriptMessages
APEC
Asia Pacific Economic Cooperation
.English
.Español
.tiếng Việt
.По-русски
.한국어
.日本語
.简体中文版
Home
News
Rss Feeds
SiteMap
Academics
Tools
Tool Downloads (Pg. 1)
Tool Downloads (Pg. 2)
Tool Downloads (Pg. 3)
Tool Downloads (Pg. 4)
Curriculum
CNSS Standards
Ethics and Law
K-12 Material
NSA Centers of Excellence
Teaching Materials
4012 Presentation
Course Modules
Module 1
01. (I) Corporate Resource
02. (II) Basic Problems
03. (III) Ethical Issues
04. (IV) Studies
Teaching Considerations
Module 2
01. (I) Ethics
02. (II) Environment
03. (III) Physical
04. (IV) Data
05. (V) Security Training
Teaching Considerations
Module 3
01. (I) Planning
02. (II) Organizational Policies & Procedures
03. (III) Ethics and Professionalism
04. (IV) Personnel Security
05. (V) Physical Security
06. (VI) System Security
07. (VII) Threats & Vulnerabilities
08. (VIII) Data Security & Recovery
09. (IX) Control and Audit
10. (X) Costs and Benefits
Teaching Considerations
Module 4
01. (I) Underlying Problem
02. (II) Laws as Tools for Information Security
03. (III) Laws and Legislation as Legal Options to
Teaching Considerations
Module 5
01. (I) Overview
02. (II) System Sensitivity
03. (III) Security Requirements
04. (IV) Levels of Security
05. (V) Data Life Cycles
06. (VI) Sample Protection Plan
Teaching Considerations
Module 6
01. (I) Overview
02. (II) Threats
03. (III) Countermeasures
04. (IV) Tradeoffs-Costs & Benefits
05. (V) Network Design
Teaching Considerations
Module 7
01. (I) Overview
02. (II) Development of Security Program
03. (III) Risk Analysis
04. (IV) Contingency Planning
05. (V) Legal Issues for Managers
06. (VI) System Validation & Verification (Accredi
07. (VII) Information Systems Audit
08. (VIII) Computer Security Check List
Teaching Considerations
Module 8
Course Modules Website
Course Videos
IA Videos
Videos (Pg. 1)
Videos (Pg. 2)
Videos (Pg. 3)
Videos (Pg. 4)
Videos (Pg. 5)
Videos (Pg. 6)
Videos (Pg. 7)
External Links
Academic Sites
Government Sites
Independent Organizations
Industry Sites
General Interest
Common Criteria
IA Activities
Professional Certification
Seminal Works
Seminal Papers
Glossary
Publications
Government Documents
Gov Docs (Pg. 1)
Gov Docs (Pg. 2)
Gov Docs (Pg. 3)
Gov Docs (Pg. 4)
Gov Docs (Pg. 5)
Gov Docs (Pg. 6)
IA Posters
IA Posters (Pg. 1)
IA Posters (Pg. 2)
IA Posters (Pg. 3)
IA Posters (Pg. 4)
IA Posters (Pg. 5)
IA Posters (Pg. 6)
Industry Documents
NIATEC Publications
Older Papers
Publisher Databases
Login
News Articles
64 Articles found between 13 Sep 2007 and 14 Mar 2008
Current Articles
<---- Newer Articles
Older Articles ---->
938 Weeks Ago
ICIW 2008 - 3rd International Conference on Information Warfare and Security
14 Mar 08
24 & 25 Apr 08
Security Alert
14 Mar 08
Finjan Finds Database of 8,700 Stolen FTP Credentials
941 Weeks Ago
America On the Cyber Edge
21 Feb 08
March 7 2008
942 Weeks Ago
I3P Scholar Program
15 Feb 08
for students graduating with a baccalaureate degree
Call for Applications
Applications must be received by April 4, 2008.
946 Weeks Ago
Conferences
16 Jan 08
InfoWarCon 2007 (02-04 Mar 2008)
Secure Border Initiative (SBI) Conference
16 Jan 08
20-22 Feb 08
Secure Border Initiative (SBI) Conference
16 Jan 08
20-22 Feb 08
2008 Department of Defense Cyber Crime Conference - CALL FOR PAPERS
16 Jan 08
13 Jan - 18 Jan 2008
951 Weeks Ago
UMUC ASSOCIATE Provost Announcement
17 Dec 07
UMUC Job Announcement for Associate Provost
954 Weeks Ago
Conferences
26 Nov 07
Intelligence Support Systems for Lawful Interception, Criminal Investigations, Intelligence Gathering and Information Sharing Conference (10-12 Dec 2007)
Future of Unmanned Ariel Vehicles
26 Nov 07
28 & 29 Nov 07
NextGens Technologies
26 Nov 07
05 & 06 Dec 07
IEEE Global Communications Conference 2007
26 Nov 07
26-30 Nov 07
Dallas SecureWorld Expo
26 Nov 07
14 & 15 Nov 07
956 Weeks Ago
TechNet North 2007
7 Nov 07
14 & 15 Nov 07
TechNet North 2007
7 Nov 07
14&15 Nov 07
957 Weeks Ago
Cyber Crime Article
30 Oct 07
Hackers Attack Apps While Still in Development
Cyber Crime Article
30 Oct 07
Former IT Admin Convicted of Sabotage
Legal Article
30 Oct 07
AT&T, Calif. AG Settle Over Stolen Cell Phone Charges
News, Technologies & Techniques Article
30 Oct 07
Pentagon asks for insights on transport tracking system
News, Technologies & Techniques Articles
30 Oct 07
California state site can't shake porn problems
News, Technologies & Techniques Article
30 Oct 07
Fifth generation of Google Search Appliance launched
News, Technologies & Techniques Article
30 Oct 07
Like-Named Group Can Keep Web Address
News, Technologies & Techniques Article
30 Oct 07
Drug Dealers' New Favorite Medium
News, Technologies & Techniques Article
30 Oct 07
New York to test bridge monitoring system
Security Alert Article
30 Oct 07
Word for Mac Exploit Released
Security Alert Article
30 Oct 07
Fake Microsoft AntiSpyware Site Aims For Credit Card Numbers
Security Alert Article
30 Oct 07
State supervisor docked 1 week of vacation over data theft
Security Alert Article
30 Oct 07
Air Force to get 'cyber sidearms'
Conferences
30 Oct 07
CSI 2007 (3-9 Nov 2007)
959 Weeks Ago
Military Information Assurance Conference
22 Oct 07
24-26 Oct 07
3rd Annual Techno Forensics Conference
19 Oct 07
29 & 30 Oct 07
Seattle Secureworld Expo
19 Oct 07
30 & 31 Oct 07
CSI 34th Annual Computer Security Conference
19 Oct 07
05-07 Nov 07
Air Intelligence Agency Internal Information Assurance & IT Conference
19 Oct 07
05-07 Nov 07
Infotech 2007
19 Oct 07
23-25 Oct 07
RSA Conference Europe 2007
19 Oct 07
22-24 Oct 07
11th Annual Small Business Conference
19 Oct 07
07 & 08 Nov 07
Global MilSatCom 2007
19 Oct 07
05-07 Nov 07
CSI 2007
19 Oct 07
03-09 Nov 07
The 2007 Techno Forensics Conference
19 Oct 07
29-31 Oct 07
MILCOM 2007 The World's Premier Military Communications Conference.
19 Oct 07
29-31 Oct 07
DRM 2007 Digital Rights Management
19 Oct 07
29 Oct 07
Federal Information Assurance Conference (FIAC) 2007
19 Oct 07
23-25 Oct 07
Intelligence Analysis & Processing
19 Oct 07
22-24 Oct 07
Advanced EW Course
19 Oct 07
08-12 Oct 07
EC2ND
19 Oct 07
04 & 05 Oct 07
25th Annual Communications, Computers Communications, Computers & Intelligence Systems Technology (C
19 Oct 07
02-04 Oct 07
3rd Annual Techno Forensics Conference
19 Oct 07
29 & 30 Oct 07
Biometrics 2007
19 Oct 07
17-19 Oct 07
RFID Technology in the Supply Chain Course #08521A
19 Oct 07
02-04 Oct 07
960 Weeks Ago
Security Alert Article
12 Oct 07
Microsoft to fix URI security flaw after criticism
961 Weeks Ago
Implementing IPv6 Course #08360-A
5 Oct 07
09-12 Oct 07
Intelligence Analysis & Processing
5 Oct 07
22-24 Oct 07
Military Satellite Communications
5 Oct 07
01-05 Oct 07
RFID Technology in the Supply Chain Course #08521A
5 Oct 07
02-04 Oct 07
20th Annual UIST Symposium UIST (ACM Symposium on User Interface Software and Technology)
5 Oct 07
07-10 Oct 07
Detroit Secureworld Expo
5 Oct 07
09 & 10 Oct 07
ISC '2007
5 Oct 07
09-12 Oct 07
Implementing IPv6 Course #08360-A.
5 Oct 07
09-12 Oct 07
Enabling Joint Interoperability in a Coalition Environment
5 Oct 07
10 & 11 Oct 07
The NebraskaCERT Conference at the Peter Kiewit Institute's, Scott Conference Center.
5 Oct 07
14-16 Oct 07
TechNet Europe 2007
5 Oct 07
17-19 Oct 07
Biometrics 2007
5 Oct 07
17-19 Oct 07
Current Articles
<---- Newer Articles
Older Articles ---->