Cyber Operations

Results: 233



#Item
91Computing / Personal firewall / Firewall / Network security / Internet security / Application firewall / Distributed firewall / Computer network security / Computer security / Cyberwarfare

References This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of many pr

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2011-10-07 21:43:51
92National security / Email / Computer network security / Internet / Password / Internet privacy / Malware / Computer security / Authorization / Security / Computing / Crime prevention

This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential business managers, office managers and operations managers. This appendix is one of many which is being pro

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2011-10-07 21:43:28
93Military technology / Cyberwarfare / War / Attack / Productivity / Technology / Electronic warfare / Hacking

ABSTRACT FOR A PRESENTATION ON Assessing the Contribution of Cyber-Attacks to Military Operations: Applying the Value Creation / Value Destruction Model in a Non-Monetary Context by Scott Borg Director and Chief Economi

Add to Reading List

Source URL: usacac.army.mil

Language: English - Date: 2008-10-02 13:11:53
94Cyberinfrastructure / Net-centric / United States Cyber Command / Military / Cyberwarfare / Cyberspace / United States Army War College / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Military organization / Military science / Staff colleges

Executive Summary Strategic Studies Institute and U.S. Army War College Press ARMY SUPPORT OF MILITARY CYBERSPACE OPERATIONS: JOINT CONTEXTS AND GLOBAL ESCALATION IMPLICATIONS Jeffrey L. Caton

Add to Reading List

Source URL: www.strategicstudiesinstitute.army.mil

Language: English - Date: 2014-12-29 08:12:38
95Public safety / Computer crimes / Cyberwarfare / International Multilateral Partnership Against Cyber Threats / Computer security / United States Computer Emergency Readiness Team / National Cyber Security Division / Department of Defense Strategy for Operating in Cyberspace / United States Department of Homeland Security / Security / National security

Oral Statement Brigadier General Gregory J. Touhill, USAF, Retired Deputy Assistant Secretary for Cybersecurity Operations and Programs U.S. Department of Homeland Security

Add to Reading List

Source URL: docs.house.gov

Language: English - Date: 2015-01-12 13:39:21
96United States Computer Emergency Readiness Team / Emergency management / Government / National Cyber Security Division / Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Public safety / United States Department of Homeland Security

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and Healthy Students Hamed Negron-Perez, U.S. De

Add to Reading List

Source URL: rems.ed.gov

Language: English - Date: 2014-11-20 09:46:48
97Operations security / HTTP cookie / Computer security / Opera / Password manager / Password policy / Software / Computer network security / Password

Cyber Opsec Protecting Yourself Online Think. Protect. OPSEC. www.ioss.gov

Add to Reading List

Source URL: www.uscg.mil

Language: English - Date: 2014-07-28 16:28:46
98United States Secret Service / Special agent / Security / Bureau of Diplomatic Security / Hillard Heintze / Defense Criminal Investigative Service / Law enforcement / Law / Money forgery

William Noonan U.S. Secret Service Deputy Special Agent in Charge Criminal Investigative Division Cyber Operations

Add to Reading List

Source URL: docs.house.gov

Language: English - Date: 2014-02-03 12:59:43
99Government / Federal Bureau of Investigation / United States Secret Service / Organized crime / Computer fraud / U.S. Immigration and Customs Enforcement / IRS Criminal Investigation Division / Identity theft / United States Department of Homeland Security / Crime / Computer crimes / Law

William Noonan Deputy Special Agent in Charge United States Secret Service Criminal Investigative Division Cyber Operations Branch

Add to Reading List

Source URL: docs.house.gov

Language: English - Date: 2014-02-03 12:59:20
100Military / War / Computer network operations / Hacking / Military technology / CNO / Information warfare / Computer science / Cyber Operations / Military science / Electronic warfare / Cyberwarfare

Developing a Reliable Methodology for Assessing the Computer Network Operations Threat of North Korea

Add to Reading List

Source URL: www.fas.org

Language: English - Date: 2014-05-06 20:16:30
UPDATE