Cyber-attack

Results: 386



#Item
301Structure / Object-oriented programming / Software design / Pattern language / Attack patterns / Data mining / Security Patterns / Design Patterns / Frame language / Software engineering / Software design patterns / Design

Future Directions for Research on Cyberpatterns Clive Blackwell and Hong Zhu Abstract As patterns in cyberspace, cyberpatterns shed light on research on the development of cyber systems from a new angle. They can help us

Add to Reading List

Source URL: cms.brookes.ac.uk

Language: English - Date: 2014-01-26 12:38:10
302Cyberwarfare / Computer crimes / Hacking / United States Department of Homeland Security / Cyberterrorism / Computer security / National Cyber Security Division / National Strategy to Secure Cyberspace / Attack / Cybercrime / Security / National security

Order Code RL32114 CRS Report for Congress Received through the CRS Web Computer Attack and Cyber Terrorism:

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2004-01-28 13:55:43
303Cyberwarfare / Hacking / Computer network security / Cybercrime / Military technology / United States Computer Emergency Readiness Team / International Multilateral Partnership Against Cyber Threats / Zero-day attack / Convention on Cybercrime / Computer crimes / Computer security / Crime

FINAL – SUBJECT TO BSC APPROVAL – November 9, 2006 GBDe 2006 Issue Group Cyber Security “Threats and Countermeasures”

Add to Reading List

Source URL: www.gbd-e.org

Language: English - Date: 2008-05-23 17:17:44
304Security / Malware / Antivirus software / Software testing / Vulnerability / Computer virus / Common Criteria / Attack / Computer worm / Computer security / Cyberwarfare / Computer network security

FINAL – SUBJECT TO BSC APPROVAL – November 8, 2007 GBDe 2007 Issue Group Cyber Security Issue Group Leader:

Add to Reading List

Source URL: www.gbd-e.org

Language: English - Date: 2008-05-23 17:18:10
305Spamming / FireEye /  Inc. / Computing / Antivirus software / Malware / Threat / Phishing / Computer security / Computer network security / Cybercrime

Case Study Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye Key Component • FireEye Web Malware

Add to Reading List

Source URL: www.fireeye.com

Language: English - Date: 2014-08-11 22:30:03
306Social psychology / Bullying / Behavioural sciences / Persecution / Injustice / Cyber-bullying / Violence / Victimisation / School bullying / Ethics / Abuse / Behavior

Understanding Bullying Fact Sheet Bullying is a form of youth violence. Although definitions of bullying vary, most agree that bullying includes: 1 • Attack or intimidation with the intention to cause fear,

Add to Reading List

Source URL: www.ped.state.nm.us

Language: English - Date: 2012-04-26 13:03:25
307Malware / Computer security / Attack / Situation awareness / Computer network security / Security / Cyberwarfare

Cyber Observable eXpression – CybOX™A Standardized Language for Cyber Observables

Add to Reading List

Source URL: measurablesecurity.mitre.org

Language: English - Date: 2013-07-08 10:01:54
308Software / Denial-of-service attacks / Internet privacy / Spamming / Routing / Denial-of-service attack / Load balancing / Internet security / Tor / Computing / Internet / Computer network security

CYBER SECURITY OPERATIONS CENTRE (UPDATED) SEPTEMBER 2012 Denial of service attacks: Strategies for Mitigation 1.

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2012-12-19 17:57:39
309Software testing / Vulnerability / Attack / National Strategy to Secure Cyberspace / Information Security Automation Program / Computer security / Cyberwarfare / Hacking

TACIT Security Institutionalizing Cyber Protection for Critical Assets Joint Federal Cyber Summit December 4, 2013 Dr. Ron Ross

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-01-30 13:43:02
310Computer network security / Malware / Denial-of-service attack

C-SAWR 15 [Extract] This is an extract of the Cyber-security Information Sharing Partnership (CiSP) Situational Awareness Weekly Report (C-SAWR). CiSP members automatically receive access to the full product as well as o

Add to Reading List

Source URL: www.cert.gov.uk

Language: English - Date: 2014-05-07 08:18:25
UPDATE