Center for Internet Security

Results: 308



#Item
141Malware / Technology / Denial-of-service attacks / Computer crimes / Extortion / Ransomware / Denial-of-service attack / Antivirus software / Near field communication / Computer network security / Cyberwarfare / Computer security

From the Desk of [Insert Name Here] For this year’s outlook newsletter edition, we’ve asked experts at the Center for Internet Security (CIS) to share their thoughts on what issues we’ll be talking about and dealin

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2015-01-13 12:29:35
142Center for Advanced Security Research Darmstadt / Border Gateway Protocol / Computer security / Routing / Internet / Network architecture / Digital media

Information and Communication Technology CRITIS ‘08 Information Infrastructure Protection by Technology driven Policy Semir Daskapan, Jolien Ubacht, Wim Vree

Add to Reading List

Source URL: critis08.dia.uniroma3.it

Language: English - Date: 2008-10-30 13:06:17
143United States Department of Homeland Security / Surveillance / Information Sharing Environment / Fusion center / Internet privacy / Critical infrastructure protection / Counter-terrorism / Emergency management / United States Intelligence Community / National security / Security / Government

National Strategy for Information Sharing

Add to Reading List

Source URL: www.fas.org

Language: English - Date: 2014-05-06 15:11:00
144Family Educational Rights and Privacy Act / Internet privacy / Social Security / Education / Oklahoma / Gifted education / Oklahoma School of Science and Mathematics / Privacy law

Print Form OSSM Northeast Regional Center Please return the following: Application for Admission (Section 1&2) Completed Essay

Add to Reading List

Source URL: www.netech.edu

Language: English - Date: 2014-08-28 10:48:43
145Data privacy / United States Department of Homeland Security / Internet privacy / Electronic Privacy Information Center / FTC Fair Information Practice / Information privacy / Surveillance / Chief privacy officer / Automated Targeting System / Privacy / Ethics / Law

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to THE OFFICE OF SCIENCE AND TECHNOLOGY POLICY Request for Information: Big Data and the Future of Privacy April 4, 2014

Add to Reading List

Source URL: epic.org

Language: English - Date: 2014-04-07 10:00:38
146Internet / Computer security / Traffic analysis / Tor / Onion routing / Crowds / Voice over IP / Proxy server / Denial-of-service attack / Computing / Internet privacy / Computer network security

Modern Traffic Analysis and its Capabilities Riccardo Bettati Department of Computer Science and Center for Information Assurance and Security Texas A&M University

Add to Reading List

Source URL: usacac.army.mil

Language: English - Date: 2008-09-10 12:50:06
147National security / Computer security / Electronic warfare / Hacking / Military technology / National Security Agency / Department of Defense Cyber Crime Center / Cyber-security regulation / Computer crimes / Security / Cyberwarfare

Cyber Security Strategy MINISTER’S FOREWORD Australians have been quick to embrace the Internet in their lives and businesses. For most of us it is now part of our daily routine for talking to our friends and family,

Add to Reading List

Source URL: www.enisa.europa.eu

Language: English
148Data privacy / United States Department of Homeland Security / Internet privacy / Electronic Privacy Information Center / FTC Fair Information Practice / Information privacy / Surveillance / Chief privacy officer / Automated Targeting System / Privacy / Ethics / Law

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to THE OFFICE OF SCIENCE AND TECHNOLOGY POLICY Request for Information: Big Data and the Future of Privacy April 4, 2014

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2014-04-07 10:00:38
149Security / Secure communication / Computing / Internet marketing / Web analytics / HTTP cookie / Privacy / HTTP Secure / Computer security / HTTP / Internet privacy / Ethics

THE BUTTE CENTER FOR THE PERFORMING ARTS, INC. Privacy and Security Policy and Disclosure of Personal Information Effective, September 29, 2010 This Privacy and Security Policy and Disclosure of Personal Information (“

Add to Reading List

Source URL: www.buttearts.org

Language: English - Date: 2014-10-16 16:37:22
150Security / 110th United States Congress / America COMPETES Act / Information security / Computer science / Office of Science / Public safety / Center for Information Technology / Cloud computing / Computing / Computer security / Science and technology in the United States

The High-Performance Computing Act of[removed]Public Law[removed]as amended by the Next Generation Internet Research Act of[removed]P.L[removed]and the America COMPETES Act of[removed]P.L[removed]An Act

Add to Reading List

Source URL: www.nitrd.gov

Language: English - Date: 2011-09-01 14:37:19
UPDATE