What is Information Security

advertisement
Network Security for Managers and Supervisors, course # 3260407
Hyperlink References to Additional Resources
Legal Issues in Information Security
TITLE 18 > PART I > CHAPTER 47 > Sec. 1029. - Fraud and related activity in
connection with access devices
TITLE 18 > PART I > CHAPTER 47 > Sec. 1030. - Fraud and related activity in
connection with computers
TITLE 18 > PART I > CHAPTER 113 > Sec. 2319. - Criminal infringement of a
copyright
TITLE 18 > PART I > CHAPTER 119 > Sec. 2511. - Interception and disclosure of wire,
oral, or electronic communications prohibited
TITLE 18 > PART I > CHAPTER 121 > Sec. 2701. - Unlawful access to stored
communications
TITLE 15 > CHAPTER 91 > Sec. 6502. - Regulation of unfair and deceptive acts and
practices in connection with collection and use of personal information from and about
children on the Internet
Medical Privacy - National Standards to Protect the Privacy of Personal Health
Information
State Listing by Jurisdiction
Revision of Export Controls for General Purpose Microprocessors
Code of Federal Regulations from the International Traffic in Arms Regulations:
Commercial Encryption Export Controls
TITLE 22 > Chapter 39 > SUBCHAPTER III >Sec. 2778. - Control of arms exports and
imports
National Infrastructure Protection Center (Infrastructure Analysis, Information Assurance
(IAIP) directorate of the Department of Homeland Security)
InfraGuard
Lawyers see security suit-riddled future
Policy
The SANS Security Policy Project
The SANS Security Policy Project (Security Policy Templates)
IETF Site Security handbook
Incident Response Forms
Intrusion Detection
Pre-Testing: EICAR
Internet Architecture
ISP software tracks down spammers
Microsoft takes spam fight to court
Have antispammers gone too far?
SPAM FAQ
Bypassing Content Filtering Software
The Cisco Internal Implementation of an Enterprise Content Delivery Network to
Support E-Learning
Akamai Accelerated Network Program
Internet Bottlenecks: The Case for Edge Delivery services
EdgeSuite Service Description
Virtual private Networks
Access VPNs and IP Security Protocol Tunneling Technology Overview
E-Commerce Security Needs
How Web Servers' Cookies Threaten Your Privacy
The Cookie Concept
Encryption
3.6.1 What is Diffie-Hellman?
CALEA: A Precedent for Domestic Encryption Controls?
The Risks of Key Recovery, Key Escrow, and Third Party Encryption
Key Escrow
Hacker Techniques
The Word Spy
Wikipedia, The Free Encyclopedia
McAfee Security
Symantec Security
Security Response at Symantec
Electronic Privacy Information Center
The Gator Corporation
Comet Cursor
TopText iLookup
XupiterToolbar Uninstaller
Kazaa
Orbitz campaign to use high-tech switcheroo
Peer-to-peer exchanges court advertisers
Harvard study wrestles with Gator
Spyware Info – Home of the Spyware Weekly
Double Click
Specific Pop
Hit Box
Ad Tech
Web Trends Live
Lavasoft Software
Major Geeks
Hoaxbusters
Security Response Hoaxes
PUBLIC AWARENESS ADVISORY REGARDING "4-1-9" OR "ADVANCE FEE
FRAUD" SCHEMES
FROGAPULT, ELFBOWL, Y2KGAME Virus Hoax
Security Tools Overview
Secure Password Storage
SANS/FBI Top 20 List
ICAT Metabase – Vulnerability Search Engine
American Registry for Internet Numbers
Network Solutions
Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted
Computer Outlaw-By the Man Who Did It
It's over -- Mitnick finally sentenced
Hacker Mitnick released Friday
Legendary computer hacker released from prison
Mitnick: You can trust a hacker
Pros, cons of hiring ex-criminal hackers
Do hackers have a role in corporate security?
Intrusion Detection
Cisco Secure Intrusion Detection System
Download