Cyber Operations

Results: 233



#Item
171Privacy law / FBI Buffalo Field Office / U.S. Air Force Office of Special Investigations / Spies / Federal Bureau of Investigation / Robert Hanssen

The FBI-Priorities Protect the United States from terrorist attack Protect the United States against foreign intelligence operations and espionage Protect the United States against cyber-based

Add to Reading List

Source URL: www.youth202.org

Language: English - Date: 2014-03-14 12:03:24
172National security / Hacking / Electronic warfare / Espionage / Industrial espionage / United States Cyber Command / Cyber spying / Computer security / Chinese intelligence operations in the United States / Cyberwarfare / Security / Cybercrime

Cyber Naïveté First Washington ignored the al Qaeda threat. Now they’re doing the same with the cyber threat. It’s time to wake up.

Add to Reading List

Source URL: wolf.house.gov

Language: English - Date: 2014-01-03 10:07:42
173Mass surveillance / National Security Agency / United States government secrecy / United States Cyber Command / Central Intelligence Agency / United States Intelligence Community / William B. Black /  Jr. / Australian Intelligence Community / United States Department of Defense / National security / Military

William P. Marshall Managing Director Areas of Focus:  Cyber security and Information Assurance  General intelligence community matters  Information Operations and Computer Network Operations

Add to Reading List

Source URL: chertoffgroup.com

Language: English - Date: 2014-01-24 09:00:09
174War / National Cybersecurity Center / Comprehensive National Cybersecurity Initiative / Cyber-security regulation / Howard Schmidt / United States Department of Homeland Security / National Strategy to Secure Cyberspace / National Cyber Security Division / Melissa Hathaway / Cyberwarfare / Computer security / Security

. Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress Catherine A. Theohary Analyst in National Security Policy and Information Operations

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2010-11-10 20:49:56
175War / National Cybersecurity Center / Comprehensive National Cybersecurity Initiative / Cyber-security regulation / United States Department of Homeland Security / National Strategy to Secure Cyberspace / National Cyber Security Division / Melissa Hathaway / Cyberwarfare / Computer security / Security

. Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress Catherine A. Theohary Analyst in National Security Policy and Information Operations

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2009-10-26 20:42:19
176Linux / AppArmor / Whitelist / Security-Enhanced Linux / Software / System software / Computing

    CYBER SECURITY OPERATIONS CENTRE   NOVEMBER 2013 

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2014-01-07 01:09:55
177Public safety / Computer security / Data security / Information security / Malware / Security / Crime prevention / National security

CYBER SECURITY OPERATIONS CENTRE MARCH[removed]U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL REFERENCES TO ASD SH

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2014-05-01 02:41:51
178United States Air Force / United States Department of Defense / Unified Combatant Command / United States Strategic Command / Air Force Space Command / Net-centric / United States Cyber Command / Joint Task Force-Global Network Operations / Military organization / Military / The Pentagon

nd[removed]THE SECRETARY OF THE AIR FORCE CHIEF OF STAFF, UNITED STATES AIR FORCE

Add to Reading List

Source URL: www.24af.af.mil

Language: English - Date: 2011-10-03 11:36:03
179Network architecture / DNS spoofing / Domain Name System Security Extensions / Name server / DNS zone / OpenDNS / Time to live / Pharming / Microsoft DNS / Domain name system / Internet / Computing

CYBER SECURITY OPERATIONS CENTRE (UPDATED) AUGUST 2012 Domain Name System: Security strategies 1.

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2012-12-19 17:49:50
180Software / Denial-of-service attacks / Internet privacy / Spamming / Routing / Denial-of-service attack / Load balancing / Internet security / Tor / Computing / Internet / Computer network security

CYBER SECURITY OPERATIONS CENTRE (UPDATED) SEPTEMBER 2012 Denial of service attacks: Strategies for Mitigation 1.

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2012-12-19 17:57:39
UPDATE