Cyber-attack

Results: 386



#Item
281Cyberwarfare / Hacking / Computer crimes / National Cyber Security Division / Chief information officer / International Multilateral Partnership Against Cyber Threats / Attack / United States Department of Homeland Security / Security controls / Computer network security / Computer security / Security

Sixth Annual Cyber Security and Information Intelligence Research Workshop April 21-23, 2010 CYBER SECURITY AND INFORMATION

Add to Reading List

Source URL: www.csiir.ornl.gov

Language: English - Date: 2010-10-04 09:26:42
282Crime prevention / National security / Cyberwarfare / Public safety / Chief information security officer / Federal Information Security Management Act / Attack / Information security / National Cyber Security Division / Security / Computer security / Computer network security

UNITED S TATES DEPARTMENT OF COMMERCE Office of Inspector General Washington . D.C[removed]March I, 20 13

Add to Reading List

Source URL: www.oig.doc.gov

Language: English - Date: 2015-01-26 12:34:24
283Security / Hacking / Software testing / Carnegie Mellon University / Computer emergency response team / Vulnerability / Request Tracker / Attack / Exploit / Computer security / Cyberwarfare / Computer network security

Microsoft PowerPoint - BENELUX Cyber Sec Conf November 2011 CERT Workshop FINAL v5.pptx [Read-Only]

Add to Reading List

Source URL: www.mediacom.public.lu

Language: English - Date: 2014-04-14 03:02:34
284Malware / Computer security / Attack / Situation awareness / Computer network security / Security / Cyberwarfare

Cyber Observable eXpression – CybOX™A Standardized Language for Cyber Observables

Add to Reading List

Source URL: makingsecuritymeasurable.mitre.org

Language: English - Date: 2013-07-08 10:01:54
285Spamming / Botnets / Cyberwarfare / Zeus / Netflow / Denial-of-service attack / Storm botnet / Srizbi botnet / Computer network security / Computing / Multi-agent systems

    Detecting  BotNet  Traffic  with  the  Cisco   Cyber  Threat  Defense  Solution  1.0  

Add to Reading List

Source URL: www.cisco.com

Language: English
286Security / Computer network security / Hacking / Australian National Audit Office / Cyberterrorism / International Multilateral Partnership Against Cyber Threats / Attack / National Cyber Security Division / Cyber-security regulation / Computer crimes / Cyberwarfare / Computer security

PDF Document

Add to Reading List

Source URL: www.anao.gov.au

Language: English - Date: 2013-04-14 21:54:35
287Electronic warfare / Hacking / Military technology / International Multilateral Partnership Against Cyber Threats / Computer security / U.S. Securities and Exchange Commission / Crime / War / Computer crimes / Security / Cyberwarfare

SEC MAKES CLEAR THAT CYBERSECURITYIS A FOCUS AREA By Susan D. Resley, Linda L. Griggs, Sean M. Donahue, Kate M. Emminger and Jenny Harrison The threat of a cybersecurity attack looms larger than ever. Almost every month,

Add to Reading List

Source URL: www.morganlewis.com

Language: English - Date: 2014-08-01 14:34:57
288Computer network security / Hacking / Crime prevention / National security / Threat / Network security / Vulnerability / Attack / Information security / Cyberwarfare / Computer security / Security

Cyber Security: Pay Now or Pay More Later A Report on Cyber Security in Kentucky December 19, 2013

Add to Reading List

Source URL: www.klc.org

Language: English - Date: 2013-12-26 14:17:26
289Computer security / Malware / Botnet / Internet security / Spyware / Computer worm / Rogue security software / Cloud computing / Attack / Computer network security / Cyberwarfare / Computing

Cyber Security Trends for 2010

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2010-01-26 16:06:06
290Public safety / Computer network security / Data security / Disaster preparedness / National security / Attack / Vulnerability / Emergency management / Security controls / Security / Computer security / Cyberwarfare

STATE OF ALABAMA Information Technology Procedure PROCEDURE 604P2-02: CYBER SECURITY INCIDENT HANDLING Rapid response and collective action are required to counteract security violations and activities that lead to secur

Add to Reading List

Source URL: cybersecurity.alabama.gov

Language: English - Date: 2012-08-10 10:34:30
UPDATE