Cyber Operations

Results: 233



#Item
71Internet / Computing / Internet security / Email address harvesting / HTML email / Email / Computer-mediated communication / Spamming

CYBER SECURITY OPERATIONS CENTRE (UPDATED) AUGUST 2012 Detecting socially engineered emails 1. Socially engineered emails present a significant threat to information security. This document

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2012-12-19 17:51:44
72Computer network security / Web hosting / Cloud storage / Cyberwarfare / Denial-of-service attack / Denial-of-service attacks / Cloud computing / Web hosting service / Online shopping / Computing / Concurrent computing / Distributed computing

CYBER SECURITY OPERATIONS CENTRE OCTOBER 2014 Preparing for and Responding to Denial of Service Activities Introduction

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2014-10-24 01:16:48
73Public safety / Security / Network security / Computer security

CYBER SECURITY OPERATIONS CENTRE JUNE[removed]U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL REFERENCES TO ASD SHO

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2014-06-18 01:34:28
74Crime / Computer network security / Antivirus software / Malware / Identity management / Computer security / Identity theft / Phishing / Keystroke logging / Cybercrime / Security / Computer crimes

CYBER SECURITY OPERATIONS CENTRE (UPDATED) AUGUST 2012 Personal computing and the implications for agency networks

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2012-12-19 17:55:03
75Public safety / Mobile device management / Bring your own device / Computer security / Risk management / Risk / Mobile application management / Security / Technology / Actuarial science

    CYBER SECURITY OPERATIONS CENTRE   UPDATED FEBRUARY 2014 

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2014-08-20 03:19:33
76Linux / AppArmor / Whitelist / Security-Enhanced Linux / Software / System software / Computing

    CYBER SECURITY OPERATIONS CENTRE   NOVEMBER 2013 

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2014-01-07 01:09:55
77Computing / Public safety / Data loss / Information security / Email / Data breach / Backup / Data security / Computer security / Security

CYBER SECURITY OPERATIONS CENTRE AUGUST 2012 Data Spill Management Guide 1.

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2012-12-19 17:48:36
78Computer crimes / Computer security / Cyberwarfare / Public safety / International Multilateral Partnership Against Cyber Threats / Information security / Cyber-security regulation / United States Cyber Command / Security / Crime prevention / National security

UNCLASSIFIED    CYBER SECURITY OPERATIONS CENTRE  SEPTEMBER 2012

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2013-01-14 21:04:07
79Computing / Cyberwarfare / Computer security / Virtual private network / Split tunneling / Internet security / Avaya VPN Router / Mobile virtual private network / Computer network security / Network architecture / Internet privacy

       CYBER SECURITY OPERATIONS CENTRE  APRIL 2013 

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2013-07-17 23:49:01
80

“The Art of Cyberwar” -[removed]Speaker: Kenneth Geers, PhD CISSP Computer Investigations & Operations Analyst and Cyber Subject Matter Expert,

Add to Reading List

Source URL: www.salisbury.edu

- Date: 2012-10-08 09:16:42
    UPDATE