Cyber Operations

Results: 233



#Item
191Electronic warfare / Hacking / Military technology / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Computer crimes / Military science

Cyber Learning Solutions Full-Spectrum Cybersecurity Training The only virtual full-spectrum cyber operations training capability for government and commercial

Add to Reading List

Source URL: www.raytheon.com

Language: English - Date: 2014-08-01 02:51:41
192Military technology / Military organization / Military / Cyberwarfare / Net-centric / United States Cyber Command / Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Department of Defense Strategy for Operating in Cyberspace / Military science / Electronic warfare / Hacking

Sustaining U.S. Global Leadership: Priorities for 21st Century Defense “Modern armed forces cannot conduct high-tempo, effective operations without reliable information and communication networks and assured access to

Add to Reading List

Source URL: www.public.navy.mil

Language: English - Date: 2012-11-28 15:57:46
193Internet / Computing / Internet security / Email address harvesting / HTML email / Email / Computer-mediated communication / Spamming

CYBER SECURITY OPERATIONS CENTRE (UPDATED) AUGUST 2012 Detecting socially engineered emails 1. Socially engineered emails present a significant threat to information security. This document

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2012-12-19 17:51:44
194Public safety / Mobile device management / Bring your own device / Computer security / Risk management / Risk / Mobile application management / Security / Technology / Actuarial science

    CYBER SECURITY OPERATIONS CENTRE   UPDATED FEBRUARY 2014 

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2014-08-20 03:19:33
195Canadian Cyber Incident Response Centre / Defence Research and Development Canada / Situation awareness / Canada / Prevention / Integrated Security Unit / Royal Canadian Mounted Police / Security

Cyber Security Information Sharing: A Case Study of Olympic Proportions Lynne Genik, Scientist, DRDC CSS Luc Beaudoin, Chief of Cyber Operations, CCIRC Presentation for CRHNet Symposium

Add to Reading List

Source URL: www.crhnet.ca

Language: English - Date: 2013-11-22 01:13:20
196Computer crimes / Technology / Malware / Webmail / Internet / Email / Digital media / Computing

CYBER SECURITY OPERATIONS CENTRE (UPDATED) AUGUST 2012 Cyber security advice for high profile events and visits 1.

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2012-12-19 17:53:48
197Information technology audit / Risk / Audit / Internal audit / Internal control / United Nations Office on Drugs and Crime / United Nations Office of Internal Oversight Services / International Multilateral Partnership Against Cyber Threats / Auditing / Accountancy / United Nations

Audit of UNODC operations in Colombia

Add to Reading List

Source URL: usun.state.gov

Language: English - Date: 2014-08-22 02:59:10
198Public safety / Security / Network security / Computer security

CYBER SECURITY OPERATIONS CENTRE JUNE[removed]U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL REFERENCES TO ASD SHO

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2014-06-18 01:34:28
199Computing / Personal firewall / Firewall / Network security / Internet security / Application firewall / Distributed firewall / Computer network security / Computer security / Cyberwarfare

References This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of many pr

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2011-10-07 21:43:51
200National security / Email / Computer network security / Internet / Password / Internet privacy / Malware / Computer security / Authorization / Security / Computing / Crime prevention

This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential business managers, office managers and operations managers. This appendix is one of many which is being pro

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2011-10-07 21:43:28
UPDATE