Center for Internet Security

Results: 308



#Item
161Counter-terrorism / National Counterterrorism Center / Law enforcement / 9/11 Commission / Data mining / Director of National Intelligence / United States Department of Homeland Security / United States Intelligence Community / Internet privacy / National security / Government / Security

Office of the Director of National Intelligence Data Mining Report for Calendar Year 2013 Office of the Director of National Intelligence Data Mining Report for Calendar Year 2013

Add to Reading List

Source URL: www.dni.gov

Language: English - Date: 2014-10-01 15:26:56
162Crime prevention / Security / Internet privacy / Technology / Social engineering / Malware / Social media / Social networking service / Online shopping / Electronic commerce / Spamming / Human development

September 2014 Volume 9, Issue 9 Social Media Scams – Spot Them Beforehand! Center for Internet Security

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2014-09-29 13:47:41
163Microsoft / Cross-platform software / Windows Vista / Windows / Microsoft SQL Server / Linux / Standard Performance Evaluation Corporation / Computing / Software / Benchmark

Center for Internet Security Configuration Assessment Tool CIS-CAT Users Guide v3.0.05

Add to Reading List

Source URL: benchmarks.cisecurity.org

Language: English - Date: 2014-09-17 15:15:53
164ISAC / National Communications System / TRIUMF

Center for Internet Security Multi-State Information Sharing and Analysis Center (MS-ISAC) Charter Overview and Mission

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2013-06-06 13:06:21
165Email / Phishing / Email spam / Spam / Sender Policy Framework / Malware / Anti-spam techniques / Email authentication / Internet / Spamming / Computing

Traffic Light Protocol: WHITE Center for Internet Security Primer: Tips for Avoiding Scams Following Major Events William F. Pelgrin, CIS President and CEO

Add to Reading List

Source URL: iic.cisecurity.org

Language: English - Date: 2014-09-03 14:21:23
166Security / Computer crimes / Malware / Hacking / Attack / Spyware / Threat / Vulnerability / Trojan horse / Cyberwarfare / Computer network security / Computer security

Cyber Crime A Technical Desk Reference For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides © 2013 Center for Internet Security. All rights reserved.

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2013-09-06 07:37:02
167Law / Internet privacy / Consumer privacy / Surveillance / 80/20 Thinking / Electronic Privacy Information Center / Ethics / Privacy / Identity management

General Funding for Promotion of Online Privacy, Safety, and Security Letter of Interest Template Letter of Interest Deadline: October 31, 2014, by 11:59 PM PT This template is provided as a guide to the information we

Add to Reading List

Source URL: digitaltrustfoundation.org

Language: English - Date: 2014-10-22 12:53:10
168Crime prevention / Security / Internet privacy / Technology / Social engineering / Malware / Social media / Social networking service / Online shopping / Electronic commerce / Spamming / Human development

September 2014 Volume 9, Issue 9 Social Media Scams – Spot Them Beforehand! Center for Internet Security

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2014-09-29 13:47:41
169National security / Data security / Computer network security / Information security / Identity theft / Privacy / Internet privacy / Plaintext / Personally identifiable information / Security / Computer security / Crime prevention

Notification Requirements for Confidential Information Breaches for Regional Center Vendors California law requires all government agencies to protect the privacy of confidential, sensitive, and/or personal information c

Add to Reading List

Source URL: www.farnorthernrc.org

Language: English - Date: 2013-11-01 12:21:08
170Cyberwarfare / Kerberos / Computing / Cryptographic protocols / Key distribution center / Ticket Granting Ticket / Ticket / Needham–Schroeder protocol / Computer network security / Key management / Computer security

Kerberos for Internet-of-Things IETF89 Thomas Hardjono MIT Kerberos & Internet Trust Consortium February, 2014

Add to Reading List

Source URL: www.tschofenig.priv.at

Language: English - Date: 2014-03-04 10:40:45
UPDATE