Cyber Crime

Results: 2199



#Item
811Hacking / United States Department of Homeland Security / Military / Net-centric / United States Cyber Command / International Multilateral Partnership Against Cyber Threats / Cyber-security regulation / Department of Defense Cyber Crime Center / Cyberwarfare / Computer crimes / Military science

August[removed]Defense Horizons National Defense University David J. Kay is a Research Analyst

Add to Reading List

Source URL: inss.ndu.edu

Language: English - Date: 2014-03-06 11:49:14
812National security / Virtual reality / Crime prevention / Law enforcement / Cyberspace / Cyberwarfare / United States Cyber Command / E-society / Mass surveillance / Security / Technology / Internet ethics

“The aims of the Internet economy and those of state security converge around the same functional needs: collecting, monitoring, and analyzing as much data as possible.” The Geopolitics of Cyberspace After Snowden RO

Add to Reading List

Source URL: www.currenthistory.com

Language: English - Date: 2014-12-26 12:05:44
813Crime prevention / Data security / Computer network security / Information security / Business continuity planning / Penetration test / Risk management / Cyber security standards / NIST Special Publication 800-53 / Security / Computer security / Public safety

NEW YORK STATE DEPARTMENTof FINANCIAL SERVICES TO:

Add to Reading List

Source URL: dfs.ny.gov

Language: English - Date: 2014-12-10 09:08:37
814Government / Federal Bureau of Investigation / United States Secret Service / Organized crime / Computer fraud / U.S. Immigration and Customs Enforcement / IRS Criminal Investigation Division / Identity theft / United States Department of Homeland Security / Crime / Computer crimes / Law

William Noonan Deputy Special Agent in Charge United States Secret Service Criminal Investigative Division Cyber Operations Branch

Add to Reading List

Source URL: docs.house.gov

Language: English - Date: 2014-02-03 12:59:20
815Crime prevention / National security / Actuarial science / Contract law / Criminal law / Due diligence / Human rights / Risk / Computer security / Ethics / Security / Law

8232_cyber_report_op_Layout[removed]:15 Page 2 Cyber Growth Partnership Industry Guidance AssessInG Cyber

Add to Reading List

Source URL: www.techuk.org

Language: English - Date: 2014-11-25 05:28:34
816Crime / Spamming / Electronic commerce / Cybercrime / Phishing / Social engineering / Malware / Identity theft / Cyber Monday / Internet / Computer crimes / Computing

Cyber_Monday_Breeds_FINAL

Add to Reading List

Source URL: www.zerofox.com

Language: English - Date: 2014-11-26 15:16:08
817Computer crimes / Cyberwarfare / Public safety / Computer security / Computer network security / International Multilateral Partnership Against Cyber Threats / Audit committee / Comprehensive National Cybersecurity Initiative / Information security / Security / Crime prevention / National security

AUDIT COMMITTEE LEADERSHIP NETWORK IN NORTH AMERICA ViewPoints Issue 40: November 7, 2012

Add to Reading List

Source URL: www.tapestrynetworks.com

Language: English - Date: 2013-09-18 16:39:58
818Data security / Computer security / Crime prevention / Information security / Security controls / Chief information security officer / National Cyber Security Division / United States Department of Homeland Security / Competency-based development / Human resource management / Management / Security

State Government INFORMATION SECURITY WORKFORCE DEVELOPMENT

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2011-10-07 21:44:07
819Military technology / Crime / Security / Military science / Cyberwarfare / International Multilateral Partnership Against Cyber Threats / Computer security / U.S. Department of Defense Strategy for Operating in Cyberspace / Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Electronic warfare / Hacking

Research Paper Caroline Baylon International Security | December 2014 Challenges at the Intersection of Cyber Security and Space

Add to Reading List

Source URL: www.chathamhouse.org

Language: English - Date: 2015-01-05 06:37:21
820National security / Cyber-security regulation / Idaho / Idaho National Laboratory / Computer security / Next Magazine / International Multilateral Partnership Against Cyber Threats / Public safety / Security / Cyberwarfare / Crime prevention

1 CYBERSECURITY[removed]THE BROOKINGS INSTITUTION IMPROVING CRITICAL INFRASTRUCTURE CYBERSECURITY:

Add to Reading List

Source URL: www.brookings.edu

Language: English - Date: 2014-03-04 11:05:05
UPDATE