Cyberwarfare in the United States

Results: 459



#Item
151Hacking / Military technology / Public safety / Computer security / United States Department of Homeland Security / International Cybercrime / Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Security / Electronic warfare

What is the Cyber Hygiene Campaign? While awareness of the increasing threat of cyber attacks has improved, we all recognize that online behavior has not kept pace--the vast majority of cyber attacks are successful due t

Add to Reading List

Source URL: www.cisecurity.org

Language: English - Date: 2014-09-17 11:48:30
152Education in the United States / Cyberwarfare / Personal life / Personally identifiable information / Family Educational Rights and Privacy Act / Data breach / Charter school / Internet privacy / Government procurement in the United States / Security / Computer security / Data security

MODEL STUDENT DATA PRIVACY AND SECURITY POLICY Drafted by the Data Management Council and adopted by the Idaho State Board of Education Effective August 14, 2014 The efficient collection, analysis, and storage of student

Add to Reading List

Source URL: www.idahoartscharter.org

Language: English - Date: 2014-08-22 16:14:08
153Military technology / Air Force Specialty Code / Military / Cyberwarfare / United States Cyber Command / Keesler Air Force Base / 318th Information Operations Group / United States Air Force / Electronic warfare / Hacking

New Cyber Operations Career Fields By Lt Col Stephen Bailey On April 11, 2014, Air Force Chief of Staff Gen. Mark A. Welsh III approved renaming one and creating a second Air Force Specialty Code (AFSC) in the Cyber Oper

Add to Reading List

Source URL: www.afc4a.org

Language: English - Date: 2014-11-02 06:56:30
154Hacking / Military technology / Public safety / Computer security / United States Department of Homeland Security / International Cybercrime / Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Security / Electronic warfare

What is the Cyber Hygiene Campaign? While awareness of the increasing threat of cyber attacks has improved, we all recognize that online behavior has not kept pace--the vast majority of cyber attacks are successful due t

Add to Reading List

Source URL: www.cisecurity.org

Language: English - Date: 2014-09-17 11:48:30
155United States Department of Homeland Security / Security engineering / Computer crimes / Cyberwarfare / National Institute of Standards and Technology / TechAmerica / Critical infrastructure protection / International Multilateral Partnership Against Cyber Threats / Computer security / National security / Security / Public safety

October 10, 2014 Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD[removed]RE: TechAmerica comments in response to NIST RFI: “Experience with the Framework

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-14 10:28:44
156Cyberwarfare / Computer crimes / Computer security / Government / National Cyber Security Alliance / National Cyber Security Awareness Month / International Multilateral Partnership Against Cyber Threats / Cyber-security regulation / National Cyber Security Division / United States Department of Homeland Security / Security / Public safety

/ :‘“ In Recognition of Cyber Security Awareness Month WHEREAS, Cyber Security Awareness Month reminds us that while the State of Hawaii was recognized this year as one of

Add to Reading List

Source URL: ags.hawaii.gov

Language: English - Date: 2014-10-01 19:09:03
157Drowned in Sound / United States Department of Homeland Security / Cyberwarfare / National Cyber Security Division

[removed]NCSD Weekly Update[removed]/14 Dear NCSD Members -We look forward to seeing many of you next week at the NCSD 2014 Annual Meeting! Please note that due to the

Add to Reading List

Source URL: www.ncsddc.org

Language: English - Date: 2014-10-24 15:07:28
158Hacking / War / Military technology / Military science / Cyberterrorism / Stuxnet / United States Cyber Command / The Pew Charitable Trusts / Cyber-security regulation / Cyberwarfare / Computer crimes / Electronic warfare

Embargoed for release at noon Eastern Tim e October 29, 2014 October 29, 2014 Digital Life in 2025

Add to Reading List

Source URL: www.elon.edu

Language: English - Date: 2014-10-25 16:16:35
159Cyberwarfare / Propaganda in the United States / Information warfare / Perception management / Psychological Operations / Cisco IOS / Computer network operations / Propaganda / Network-centric warfare / Military / War / Information operations

From Intelligence to Influence: The Role of Information Operations

Add to Reading List

Source URL: www.cfc.forces.gc.ca

Language: English - Date: 2013-12-12 15:28:16
160Cyberwarfare / Ethics / Computer network security / Personal life / Personally identifiable information / Data breach / Internet privacy / Government procurement in the United States / Privacy / Security / Computer security / Data security

Glenns Ferry School District No. 192 STUDENTS 3575

Add to Reading List

Source URL: www.glennsferryschools.org

Language: English - Date: 2014-12-10 18:24:32
UPDATE