Latest Files for Download
March 04, 2012
Conclusions of the research and analysis indicate that there is a direct and quantifiable historical linkage between the People’s Republic of China and cyber warfare. This correlation is divided into three sectors as a nation state information warfare initiative...
February 28, 2012
The purpose of this publication is to help organizations improve their WLAN security by providing recommendations for WLAN security configuration and monitoring. This publication supplements other NIST publications by consolidating their key recommendations...
February 14, 2012
The act was designed to provide the government with a clear structure for securing its own networks and those that run critical infrastructure - energy and water delivery systems, financial systems, nuclear and chemical, plants, and transportation networks...
February 09, 2012
This publication provides guidelines for incident handling, particularly for analyzing data and determining the appropriate response. The guidelines can be followed independently of particular hardware platforms, operating systems, protocols, or applications...
February 08, 2012
The report lays out a path for implementing the National Strategy for Trusted Identities in Cyberspace, a White House initiative to bring together the private sector, advocacy groups, public-sector agencies to improve the privacy, security and convenience of online transactions...
February 02, 2012
The ICS-CERT Monthly Monitor offers a means of promoting preparedness, information sharing, and collaboration with the 18 critical infrastructure/key resource sectors and through sector briefings, meetings, conferences, and information product releases...
February 01, 2012
In conducting business, organizations must manage many different and complex software components, including firmware, operating systems and applications. These components must be configured securely, patched when needed, and continuously monitored for security...
January 30, 2012
ENISA's Report on Network Information Security in Education comes at a time when education and ITC are interconnected more than ever. The challenge of the digitally active citizen is to remain informed on the news coming from the dynamic field of Information Security...
January 25, 2012
"Cloud computing and the other deployment models are a viable choice for many applications and services. However, accountability for security and privacy in cloud deployments cannot be delegated to a cloud provider and remains an obligation for the organization to fulfill..."
January 24, 2012
Smart Grid technologies aim to transform the nation's aging power system into a network that integrates modern communication technologies with the power delivery infrastructure. Electrical devices will need to adhere to these standards if they are to function as desired...
January 24, 2012
"Space and cyberspace operations likely will commence well in advance of other operations. In fact, even in the absence of open conflict, operations to gain and maintain cyberspace superiority and space control will be continuous requirements..."
January 23, 2012
Reputation systems are a key success factor of many websites, e.g. eBay, or Amazon, ranking hotels, films, or music, enabling users and customers to vote on products. However, by using reputation systems, citizens place themselves at additional risk...
January 19, 2012
The Joint Cybersecurity Services Pilot was designed to utilize NSA intelligence to protect information networks operated by companies in the Defense Industrial Base. The program shared emerging cyber threat data with defense contractors in an effort to better defend systems...
January 18, 2012
Case studies of particular quality may be considered for publication in future CCSA journals, an upcoming Comprehensive History of Cyber Conflict, or selected for presentation at a future cyber conflict history conference...
January 16, 2012
DARPA is seeking biometric authentication software research proposals for the Active Authentication Program that involve innovative biometric-based solutions that can be integrated into current DoD systems without the need for new hardware installations...
January 04, 2012
As we start 2012, we can expect to see a continuance of data breaches and increasing cyber attacks. It’s important for businesses and organizations to know what they need to be prepared for and to take steps to help minimize the threats that do not appear to be going away...
Wanna Buy Some Dumps?... Biniohs Chekcer on 06-19-2013
Student Pleads Guilty to Counterfeiting Coup... on 06-18-2013