Back to Results
First PageMeta Content
Computer network security / Malware / Password / Computer insecurity / SQL injection / Denial-of-service attack / Vulnerability / Advanced persistent threat / Social engineering / Cyberwarfare / Computer security / Security


Defence AgainstTerrorism Terrorism Review Defence Against Review
Add to Reading List

Document Date: 2015-02-23 10:34:30


Open Document

File Size: 242,54 KB

Share Result on Facebook

City

Washington DC / New York / Chicago / /

Company

CBS / Virtual Private Networks / Google / Kroll Inc. / Microsoft / /

Country

United States / China / /

Currency

USD / /

Facility

The Institute / Pearl Harbor / /

IndustryTerm

Internet server / nbstat’tools / Online Debate / search request / information processing / hacker tools / secure tools / control site / communication systems / web browser / open source web application / classified and unclassified systems / classified military computer networks / automated banking / memory device / important tool / malicious software / involved disrupting military networks / Internet-connected computers / target networks / defense systems / online wire transfer system / technology community / database management systems / bank / Internet-interfacing systems / technology-based targets / targeted network / online publication / online research / network devices / web server / physical infrastructure / web address / information technology specialists / search engine / /

Organization

U.S. Air Force / National Intelligence / Interdisciplinary Center / American Academy of Forensic Sciences / U.S. Department of Defense / U.S. Central Command / Congress / al-Qaeda / U.S. intelligence / U.S. Justice Department / Council on Foreign Affairs / Institute for Counter-Terrorism / /

Person

Scott Charney / Obama / McConnell / Kevin Fogarty / Christopher Bronk / Lynn / DAT ISSN / Bob Woodward / Richard Garwin / Christopher Day / Barack Obama / /

PoliticalEvent

presidential elections / /

Position

investigator / computer technician / probable player / systems administrator / temporary worker / authorized financial officer / Corporate Vice President for Trustworthy Computing / Secretary / head / network administrator / Deputy Secretary of Defense / author / domain administrator / Director / designer / Admiral / Director / Secure Information Services / Managing Director / Secure Information Services / candidate / /

Product

SQL Injection / /

ProgrammingLanguage

SQL / DC / /

ProvinceOrState

Illinois / New York / /

PublishedMedium

Foreign Affairs Magazine / /

Region

Middle East / /

Technology

information technology / search engine / operating systems / encryption / firewall / encryption system / flash / web server / /

URL

www.google.com / http /

SocialTag