Cyber Crime

Results: 2199



#Item
891National security / Crime prevention / International Multilateral Partnership Against Cyber Threats / Information security / Security controls / Information assurance / Vulnerability / Framework Programmes for Research and Technological Development / Risk management / Security / Computer security / Data security

Motorola SolutionsExperience with the Framework for Improving Critical Infrastructure Cybersecurity Motorola Solutions (MSI) offers feedback to the National Institute of Standards and Technology (NIST) about the level

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-14 10:53:42
892Computer security / Crime prevention / National security / Secure communication / Cyber-security regulation / Public safety / National Cyber Security Division / Cyberwarfare / Security / Computer network security

October 10, 2014 Submitted electronically to [removed] Comments of the Communications Sector Coordinating Council Re: “Experience with the Framework for Improving Critical Infrastructure Cybersecurity”

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-23 14:08:46
893Internet / Crime / Internet fraud / Panix / Phishing / Password / Identity theft / Troll / Online shopping / Cybercrime / Social engineering / Spamming

Cyber Security Consumer Tip Sheet Socializing and Interacting Online For most of us, the Internet has become an indispensable part of our social lives: we use it to keep up with old friends, keep in touch with our famili

Add to Reading List

Source URL: mediasmarts.ca

Language: English - Date: 2012-09-20 08:57:08
894Crime prevention / National security / Information technology audit / Computer network security / Public safety / Computer forensics / Certified Information Systems Security Professional / Information security / Department of Defense Cyber Crime Center / Security / Data security / Computer security

Computer Forensics in a LAN Environment Michael J. Corby, CCP, CISSP M Corby & Associates, Inc. Audience: Security Knowledgeable with varying backgrounds The industry has, at long last, accepted Computer Security as a ke

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
895Computer security / Crime prevention / Electronic commerce / National security / Internet of Things / Computing / Internet / Cyber-security regulation / Cyberwarfare / Security / Computer network security

What “REALLY” matters in Cyber? RE: Internet of things, privacy – security and beyond… Not sure HOW it can affect you (as it HAS already)? AND… what is a “thing” – is that MORE we have to do??? Circa 201

Add to Reading List

Source URL: www.sciap.org

Language: English - Date: 2014-07-08 00:05:17
896Cyberwarfare / Internet safety / Identity theft / Cyber-bullying / Cyber-security regulation / Department of Defense Cyber Crime Center / Computer crimes / Crime / Criminology

Government Response House of Representatives Standing Committee on Communications Report on the Inquiry into Cyber Crime Hackers, Fraudsters and Botnets: Tackling the Problem of Cyber Crime The Government welcomes the re

Add to Reading List

Source URL: www.communications.gov.au

Language: English - Date: 2010-11-25 02:30:33
897Quality assurance / Software assurance / Software quality / Public safety / Cyberwarfare / National Cyber Security Division / Computer security / Open-source software / Information security / Security / Crime prevention / National security

Software Assurance (SwA) Forum and Working Group Sessions Fact Sheet BACKGROUND The Software Assurance (SwA) stakeholder community serves an essential role in protecting government applications, systems, and information

Add to Reading List

Source URL: buildsecurityin.us-cert.gov

Language: English - Date: 2013-05-28 09:20:31
898National security / Public safety / Data security / Risk management framework / Information security / National Cyber Security Division / Security / Computer security / Crime prevention

Current Awareness of the Cybersecurity Framework Recognizing the critical importance of widespread voluntary usage of the Framework in order to achieve the goals of the Executive Order, and that usage initially depends u

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-10 21:21:53
899Public safety / Electronic warfare / Hacking / Military technology / Kevin Mitnick / Cyberwarfare / United States Senate Committee on Homeland Security and Governmental Affairs / Joe Lieberman / Social engineering / Security / National security / Crime prevention

S. Hrg. 106–486 CYBER ATTACK: IS THE GOVERNMENT SAFE? HEARING BEFORE THE

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2012-10-25 14:51:13
900Computing / Data security / Public safety / Computer network security / Malware / Password / Computer security / Backup / Antivirus software / Security / Crime prevention / National security

The top cyber security tips for small to medium business These are the tips that CERT Australia considers to be the most critical for businesses to use to reduce cyber security risks. The tips are listed in the priority

Add to Reading List

Source URL: www.cert.gov.au

Language: English - Date: 2015-01-04 05:16:17
UPDATE