Latest Files for Download

F2876df2ad8d7e06cf5e558f74049bdd

The Chinese Government and PLA’s Use of Information Warfare

March 04, 2012

Conclusions of the research and analysis indicate that there is a direct and quantifiable historical linkage between the People’s Republic of China and cyber warfare. This correlation is divided into three sectors as a nation state information warfare initiative...

Comments  (3)

7fef78c47060974e0b8392e305f0daf0

NIST: Securing Wireless Local Area Networks

February 28, 2012

The purpose of this publication is to help organizations improve their WLAN security by providing recommendations for WLAN security configuration and monitoring. This publication supplements other NIST publications by consolidating their key recommendations...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Comprehensive Cyber Security Act of 2012 Introduced

February 14, 2012

The act was designed to provide the government with a clear structure for securing its own networks and those that run critical infrastructure - energy and water delivery systems, financial systems, nuclear and chemical, plants, and transportation networks...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

NIST Computer Security Incident Handling Guide Draft

February 09, 2012

This publication provides guidelines for incident handling, particularly for analyzing data and determining the appropriate response. The guidelines can be followed independently of particular hardware platforms, operating systems, protocols, or applications...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

NIST Recommendations for Trusted Identities in Cyberspace

February 08, 2012

The report lays out a path for implementing the National Strategy for Trusted Identities in Cyberspace, a White House initiative to bring together the private sector, advocacy groups, public-sector agencies to improve the privacy, security and convenience of online transactions...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

ICS-CERT Monthly Monitor for January 2012

February 02, 2012

The ICS-CERT Monthly Monitor offers a means of promoting preparedness, information sharing, and collaboration with the 18 critical infrastructure/key resource sectors and through sector briefings, meetings, conferences, and information product releases...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

NIST: Revised Technical Specifications for SCAP

February 01, 2012

In conducting business, organizations must manage many different and complex software components, including firmware, operating systems and applications. These components must be configured securely, patched when needed, and continuously monitored for security...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

ENISA Report on Network Information Security in Education

January 30, 2012

ENISA's Report on Network Information Security in Education comes at a time when education and ITC are interconnected more than ever. The challenge of the digitally active citizen is to remain informed on the news coming from the dynamic field of Information Security...

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

NIST Cloud Computing Guidelines on Security and Privacy

January 25, 2012

"Cloud computing and the other deployment models are a viable choice for many applications and services. However, accountability for security and privacy in cloud deployments cannot be delegated to a cloud provider and remains an obligation for the organization to fulfill..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

NIST Guidelines to Ensure Devices are Smart Grid Ready

January 24, 2012

Smart Grid technologies aim to transform the nation's aging power system into a network that integrates modern communication technologies with the power delivery infrastructure. Electrical devices will need to adhere to these standards if they are to function as desired...

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

American Defense Operations and Cyberspace

January 24, 2012

"Space and cyberspace operations likely will commence well in advance of other operations. In fact, even in the absence of open conflict, operations to gain and maintain cyberspace superiority and space control will be continuous requirements..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

ENISA Report on Trust and Reputation Models

January 23, 2012

Reputation systems are a key success factor of many websites, e.g. eBay, or Amazon, ranking hotels, films, or music, enabling users and customers to vote on products. However, by using reputation systems, citizens place themselves at additional risk...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

DHS to Take Over Pentagon Cyber Defense Program

January 19, 2012

The Joint Cybersecurity Services Pilot was designed to utilize NSA intelligence to protect information networks operated by companies in the Defense Industrial Base. The program shared emerging cyber threat data with defense contractors in an effort to better defend systems...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

CCSA Writing Competition for Cyber Conflict Case Studies

January 18, 2012

Case studies of particular quality may be considered for publication in future CCSA journals, an upcoming Comprehensive History of Cyber Conflict, or selected for presentation at a future cyber conflict history conference...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

DARPA Seeks Biometric Authentication Software Research

January 16, 2012

DARPA is seeking biometric authentication software research proposals for the Active Authentication Program that involve innovative biometric-based solutions that can be integrated into current DoD systems without the need for new hardware installations...

Comments  (0)

452458456956503c70c1888ff7567b88

Information Security and Data Protection in 2012

January 04, 2012

As we start 2012, we can expect to see a continuance of data breaches and increasing cyber attacks. It’s important for businesses and organizations to know what they need to be prepared for and to take steps to help minimize the threats that do not appear to be going away...

Comments  (0)


« < | 3 - 4 - 5 - 6 - 7 | > »

Most Liked