Cyber-attack

Results: 386



#Item
291Cyberwarfare / Public safety / Crime prevention / National security / Threat / Attack / Information security / Malware / Computer emergency response team / Computer network security / Security / Computer security

STATE OF ALABAMA Information Technology Procedure PROCEDURE 604P1-00: CYBER SECURITY INCIDENT REPORTING Effective response to cyber security incidents requires quick recognition of problems, fast mobilization of skilled

Add to Reading List

Source URL: cybersecurity.alabama.gov

Language: English - Date: 2012-09-24 16:24:04
292Crime prevention / Cyberwarfare / Computer network security / Information security / Attack / Cyber-security regulation / Security / Computer security / National security

Dynamics and Equilibria of Information Security Investment Brian CARINI, Heinz School of Public Policy and Management Benoit MOREL, Engineering and Public Policy Carnegie Mellon University [removed]_, _bm1v@andre

Add to Reading List

Source URL: www2.sims.berkeley.edu

Language: English - Date: 2002-05-19 11:15:35
293Computer security / Malware / Botnet / Internet security / Spyware / Computer worm / Attack / Rogue security software / Cloud computing / Computer network security / Cyberwarfare / Computing

Microsoft Word - January[removed]Cyber Security Trends.docx

Add to Reading List

Source URL: www.esrmo.scio.nc.gov

Language: English - Date: 2010-02-26 07:44:00
294Software / Metasploit Project / Penetration test / Attack / Password / Computer network security / Computer security / Cyberwarfare

The Open Cyber Challenge Platform

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-16 21:56:35
295Deep packet inspection / Radware / WAN optimization / Dedicated hosting service / Cloud computing / Denial-of-service attack / Prolexic Technologies / Computing / Web hosting / World Wide Web

Case Study: Hosting Service Provider Brinkster Selects Radware’s Attack Mitigation System to Protect its Cloud and Hosting Customers Against Cyber Attacks

Add to Reading List

Source URL: www.brinkster.com

Language: English - Date: 2013-01-23 10:46:32
296Privacy law / FBI Buffalo Field Office / U.S. Air Force Office of Special Investigations / Spies / Federal Bureau of Investigation / Robert Hanssen

The FBI-Priorities Protect the United States from terrorist attack Protect the United States against foreign intelligence operations and espionage Protect the United States against cyber-based

Add to Reading List

Source URL: www.youth202.org

Language: English - Date: 2014-03-14 12:03:24
297Computer network security / Hacking / National security / Vulnerability / Information security / Attack / Computer insecurity / Cyber-security regulation / Stuxnet / Security / Cyberwarfare / Computer security

The US-CCU Cyber-Security Check List By John Bumgarner and Scott Borg FINAL VERSION 2007

Add to Reading List

Source URL: www.usccu.us

Language: English - Date: 2007-09-09 21:33:02
298Computer security / National security / Computer crimes / United States Department of Homeland Security / International Multilateral Partnership Against Cyber Threats / Vulnerability / Malware / Attack / Critical infrastructure / Cyberwarfare / Security / Computer network security

Office of Emergency Communications (OEC) Mobile Applications for Public Safety (MAPS) PSCR Public Safety Broadband Stakeholder Conference June 4th, 2014 Alex Kreilein

Add to Reading List

Source URL: www.pscr.gov

Language: English - Date: 2014-06-02 16:30:50
299Targeted threat / Computing / FireEye /  Inc. / Malware / Aximili-Esgarrouth-Isthill

DATASHEET AX Series Forensic Analysis Platforms that Provide a Full 360-degree View of a Cyber Attack

Add to Reading List

Source URL: www.fireeye.com

Language: English - Date: 2014-08-12 15:43:50
300Cyberwarfare / FireEye /  Inc. / Cloud computing / Threat / Defense Intelligence Agency / Advanced persistent threat / Malware / Multi-agent systems / Computer security / Computing / Computer network security

Dynamic Threat Intelligence— Transforming Data into Intelligence Every cyber attack has a silver lining: it generates valuable new threat intelligence. This information elevates our understanding of not only the attack

Add to Reading List

Source URL: www.fireeye.com

Language: English - Date: 2014-08-11 22:15:26
UPDATE