Information security awareness

Results: 620



#Item
11Physical geography / Extreme points of Earth / Arctic / United States Department of Homeland Security / Domain Awareness Center / Homeland Security Centers of Excellence / University of Alaska Anchorage / University of Alaska system / Arctic policy of the United States

Maritime Technology —AIFC— Arctic Information Fusion Capability ADAC Mission The Arctic Domain Awareness Center, led by the University of Alaska, develops and transitions technology solutions,

Add to Reading List

Source URL: adac.uaa.alaska.edu

Language: English - Date: 2016-04-19 04:55:02
12Identity theft / Social engineering / Cybercrime / Spamming / Misconduct / Crime / Phishing / Fraud / Internet fraud / Information security awareness / Anti-phishing software / Internet fraud prevention

Phishing Simulation Programs A Higher Education Information Security Council (HEISC) Resource AprilHigher Education Information Security Council

Add to Reading List

Source URL: library.educause.edu

Language: English - Date: 2016-04-07 15:30:18
13Security / Prevention / Computer security / Safety / Crime prevention / Cryptography / National security / Information security / Vulnerability / Security awareness / Attack / Security guard

Microsoft Word - Information Security Plan Verdoc

Add to Reading List

Source URL: security.sdsu.edu

Language: English - Date: 2013-03-13 15:56:21
14Data security / System administration / Information technology / Splunk / Computing / Information technology management / Infrastructure optimization

PROFESSIONAL SERVICES Enterprise Security Services — Medium Professional Services Offering to provide immediate awareness of the anomalies in

Add to Reading List

Source URL: www.splunk.com

Language: English - Date: 2016-08-20 10:27:44
15Economy / Business / E-commerce / Information privacy / Money / Payment cards / Payment systems / Heartland Payment Systems / Payment Card Industry Data Security Standard / Qualified Security Assessor / Data security / Debit card

The Voice of Georgia’s Restaurants Advocacy | Education | Awareness The ‘End’ of Data Breaches is in Sight 30 Aug:06 AM |Anonymous

Add to Reading List

Source URL: www.garestaurants.org

Language: English - Date: 2015-04-24 14:26:23
16Security / Prevention / Safety / Crime prevention / Criminal records / Computer security / Cryptography / FBI Criminal Justice Information Services Division / National Crime Information Center / Security awareness / Federal Bureau of Investigation / Information security

U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Criminal Justice Information Services (CJIS) Security Policy

Add to Reading List

Source URL: kentuckystatepolice.org

Language: English - Date: 2016-06-22 13:33:27
17Computer security / Security / Cybercrime / Data security / Cryptography / Security awareness / Information security / Phishing / Internet privacy / Social engineering / Internet Security Awareness Training / Outline of computer security

Information Technology Standard Information Security Education and Awareness Training Identifier: IT-STND-002

Add to Reading List

Source URL: supportcenter.ct.edu

Language: English - Date: 2015-09-02 12:29:33
18Mass surveillance / Privacy of telecommunications / Digital rights / Human rights / National security / Data mining / Privacy / Counter-terrorism / Total Information Awareness / Internet privacy

Government report: Data min...

Add to Reading List

Source URL: freedom-school.com

Language: English - Date: 2015-05-02 15:29:04
19Computer network security / Computer security / E-commerce / Cybercrime / National security / Forcepoint / Threat / Supply chain attack / Information security awareness

CP005_DATAISM_CS3_S-18_Green_DotsOnly

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2016-04-05 18:15:36
20Mass surveillance / Privacy / Human rights / Crime prevention / Internet privacy / Total Information Awareness / Information Awareness Office / Surveillance / Personally identifiable information / Patriot Act / Policy appliances / Right to privacy

Data Surveillance Countering Terrorism through Information and Privacy Protection Technologies Security and privacy aren’t dichotomous or conflicting

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English
UPDATE