Cyber-attack

Results: 386



#Item
361Epistemology / Ethology / Operations research / Simulation / Scientific modelling

Cyber Terror Exercise CYTEX Attack on Critical Infrastructrues[removed]November 2001 at IABG CYTEX.ppt

Add to Reading List

Source URL: www.cess-net.eu

Language: English - Date: 2008-09-04 04:32:07
362Spamming / Botnets / Cyberwarfare / Computer security / Malware / Computer crime / Denial-of-service attack / Storm botnet / FireEye /  Inc. / Computer network security / Computing / Multi-agent systems

National Cyber Investigative Joint Task Force Operation Clean Slate In the last several years, the use of malicious software (malware) by online criminals has emerged as a global cybersecurity threat. Of the available in

Add to Reading List

Source URL: www.wpcug.org

Language: English - Date: 2013-06-21 20:29:17
363Computing / Computer emergency response team / Emergency management / CERT Coordination Center / Q-CERT / Incident response team / Request Tracker / Attack / Cyber security and countermeasure / Carnegie Mellon University / Internet governance / Computer security

Activity Reports from APCERT Members

Add to Reading List

Source URL: www.apcert.org

Language: English - Date: 2008-05-20 02:31:19
364Hacking / Computer security / Computer network security / Cyber-security regulation / Advanced persistent threat / United States Department of Homeland Security / Attack / Operation Aurora / Cyberwarfare in the United States / Cyberwarfare / Security / Electronic warfare

Statement for the Record Richard Bejtlich Chief Security Officer Mandiant Corporation Before the

Add to Reading List

Source URL: docs.house.gov

Language: English - Date: 2013-03-18 10:01:48
365Internet governance / Computing / Software / CERT Coordination Center / Incident response team / Request Tracker / Attack / Cyber security and countermeasure / United States Computer Emergency Readiness Team / Carnegie Mellon University / Computer security / Computer emergency response team

Microsoft Word - APCERTDrill2013PressRelease_AP.doc

Add to Reading List

Source URL: www.apcert.org

Language: English - Date: 2013-01-27 23:57:26
366Computer network security / Hacking / Computer crimes / Software testing / Zero-day attack / Phishing / Vulnerability / Exploit / Cybercrime / Computer security / Cyberwarfare

C-SAWR 16 [Extract] This is an extract of the Cyber-security Information Sharing Partnership (CiSP) Situational Awareness Weekly Report (C-SAWR). CiSP members automatically receive access to the full product as well as o

Add to Reading List

Source URL: www.cert.gov.uk

Language: English - Date: 2014-05-12 05:10:41
367Computer emergency response team / Attack / International Multilateral Partnership Against Cyber Threats / Incident response team / Computer security / Computer crimes / Cyberwarfare / Crime

APCERT Secretariat: JPCERT/CC Japan Computer Emergency Response Team Coordination Center   Contact: [removed]

Add to Reading List

Source URL: www.apcert.org

Language: English - Date: 2008-12-04 03:57:53
368Computer network security / Computer security / Crime prevention / Hacking / Backdoor / Information security / Internet-related prefixes / Attack / Security / Cyberwarfare / National security

Cyber Security Summit 2013 – Arbeitsgruppe 1

Add to Reading List

Source URL: www.cybersecuritysummit.de

Language: English - Date: 2014-06-06 03:24:25
369Data security / Computer network security / Information Risk Management / Security controls / IT risk / Information security / Vulnerability / Threat / Attack / Computer security / Security / Cyberwarfare

TAKING CHARGE OF SECURITY IN A HYPERCONNECTED WORLD How Organizations Can Improve Breach Readiness and Cyber Security Maturity October 2013

Add to Reading List

Source URL: www.emc.com

Language: English
370Cyberwarfare / Electric power transmission systems / Computer network security / Computer security / SCADA / Smart grid / Critical infrastructure protection / Idaho National Laboratory / Electrical grid / Technology / Security / National security

Canvassing the Cyber Security Landscape: Why Energy Companies Need to Pay Attention TUESDAY, 18 MAY[removed]:00 BRUCE AVERILL AND ERIC A.M. LUIIJF Recent news of a “highly sophisticated and targeted” cyber attack on G

Add to Reading List

Source URL: www.fbiic.gov

Language: English - Date: 2010-09-22 12:57:09
UPDATE