Cyber-collection

Results: 30



#Item
1Computing / Security / Secure communication / Cyberwarfare / Computer security / Information privacy / Human rights / Data protection / Internet privacy / Privacy / Data mining / Internet security

Large-Scale Collection and Sanitization of Network Security Data: Risks and Challenges∗ (position paper) Phillip Porras Vitaly Shmatikov

Add to Reading List

Source URL: www.cyber-ta.org

Language: English - Date: 2006-07-31 13:42:23
2Cyberwarfare / Computing / Security / Hacking / Computer network security / Malware / Server / Computer security / CSC Version 6.0 / Cyber-collection

THE PROJECTSAURON APT Global Research and Analysis Team VersionAugust 9, 2016) The ProjectSauron APT

Add to Reading List

Source URL: cdn.securelist.com

Language: English - Date: 2016-08-09 10:39:42
3Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Ciphertext / Secure multi-party computation / Cryptosystem / Data anonymization / ElGamal encryption

Efficient Anonymity-Preserving Data Collection Justin Brickell and Vitaly Shmatikov Department of Computer Sciences The University of Texas at Austin Austin, TX, USA

Add to Reading List

Source URL: www.cyber-ta.org

Language: English - Date: 2007-02-22 22:55:51
4Cybercrime / National security / Cyberwarfare / Computer security / Hacking / United States Cyber Command / United States Army Cyber Command / Cyber / Cyberwarfare in the United States / Military-digital complex

THE FACTS: CYBERSECURITY RESOURCES A collection of resources to help you protect yourself online. Free antivirus software is available online for DoD employees to download and use at home (authentication required) Websit

Add to Reading List

Source URL: www.arcyber.army.mil

Language: English - Date: 2016-03-15 15:31:42
5Legal aspects of computing / Telephone tapping / Privacy / Ethics / Westby / Internet privacy

Legal Issues Associated With Data Collection & Sharing Jody R. Westby, Esq. CEO, Global Cyber Risk LLC Chair, American Bar Association Privacy & Computer Crime Committee (Section of Science & Technology Law)

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-14 13:46:13
6Cyber-bullying / Crime / Ethics / Law enforcement / Computer crimes / Donna Rice Hughes / Internet safety

Event Flyer-Collection of Teens grayscale.pub

Add to Reading List

Source URL: www.internetsafety101.org

Language: English - Date: 2010-05-10 10:31:40
7Security / Computer crimes / Military intelligence / Computer security / Booz Allen Hamilton / Cyberwarfare / International Multilateral Partnership Against Cyber Threats / Open-source intelligence / Threat / National security / Intelligence / Data collection

Predictive Intelligence PI Actionable Insight for the Digital Enterprise AUGUST 2014

Add to Reading List

Source URL: www.boozallen.com

Language: English - Date: 2015-04-23 21:39:28
8Data collection / Military intelligence / Central Intelligence Agency / Counter-terrorism / National security / Espionage / Intelligence

The Analytical Units consists of the following: The Central Analysis Research Unit The Demographics Unit The Cyber Intelligence Unit The Gang Assessment Unit

Add to Reading List

Source URL: enemieswithinbook.com

Language: English - Date: 2013-08-31 14:43:45
9Computer network security / Crime prevention / National security / Secure communication / Institute for Information Infrastructure Protection / U.S. Department of Defense Strategy for Operating in Cyberspace / Security / Computer security / Cyberwarfare

Oxford University Cyber Security Centre Techniques to combat these threats draw upon longstanding research in communications security – and also upon careful design so that systems and data collection are security-posi

Add to Reading List

Source URL: www.cybersecurity.ox.ac.uk

Language: English - Date: 2015-02-04 08:27:13
10Data collection / Standards / International Association of Law Enforcement Intelligence Analysts / Intelligence analysis / Professional certification / Central Intelligence Agency / Intelligence cycle / Intelligence analysis management / Department of Defense Cyber Crime Center / Intelligence / National security / Military intelligence

IALEIA Professional Certification Program Intelligence Analysis Training Course Review – Requirements Purpose

Add to Reading List

Source URL: ialeia.org

Language: English - Date: 2014-05-26 06:59:42
UPDATE