Network Security for Managers and Supervisors, course # 3260407 Hyperlink References to Additional Resources Legal Issues in Information Security TITLE 18 > PART I > CHAPTER 47 > Sec. 1029. - Fraud and related activity in connection with access devices TITLE 18 > PART I > CHAPTER 47 > Sec. 1030. - Fraud and related activity in connection with computers TITLE 18 > PART I > CHAPTER 113 > Sec. 2319. - Criminal infringement of a copyright TITLE 18 > PART I > CHAPTER 119 > Sec. 2511. - Interception and disclosure of wire, oral, or electronic communications prohibited TITLE 18 > PART I > CHAPTER 121 > Sec. 2701. - Unlawful access to stored communications TITLE 15 > CHAPTER 91 > Sec. 6502. - Regulation of unfair and deceptive acts and practices in connection with collection and use of personal information from and about children on the Internet Medical Privacy - National Standards to Protect the Privacy of Personal Health Information State Listing by Jurisdiction Revision of Export Controls for General Purpose Microprocessors Code of Federal Regulations from the International Traffic in Arms Regulations: Commercial Encryption Export Controls TITLE 22 > Chapter 39 > SUBCHAPTER III >Sec. 2778. - Control of arms exports and imports National Infrastructure Protection Center (Infrastructure Analysis, Information Assurance (IAIP) directorate of the Department of Homeland Security) InfraGuard Lawyers see security suit-riddled future Policy The SANS Security Policy Project The SANS Security Policy Project (Security Policy Templates) IETF Site Security handbook Incident Response Forms Intrusion Detection Pre-Testing: EICAR Internet Architecture ISP software tracks down spammers Microsoft takes spam fight to court Have antispammers gone too far? SPAM FAQ Bypassing Content Filtering Software The Cisco Internal Implementation of an Enterprise Content Delivery Network to Support E-Learning Akamai Accelerated Network Program Internet Bottlenecks: The Case for Edge Delivery services EdgeSuite Service Description Virtual private Networks Access VPNs and IP Security Protocol Tunneling Technology Overview E-Commerce Security Needs How Web Servers' Cookies Threaten Your Privacy The Cookie Concept Encryption 3.6.1 What is Diffie-Hellman? CALEA: A Precedent for Domestic Encryption Controls? The Risks of Key Recovery, Key Escrow, and Third Party Encryption Key Escrow Hacker Techniques The Word Spy Wikipedia, The Free Encyclopedia McAfee Security Symantec Security Security Response at Symantec Electronic Privacy Information Center The Gator Corporation Comet Cursor TopText iLookup XupiterToolbar Uninstaller Kazaa Orbitz campaign to use high-tech switcheroo Peer-to-peer exchanges court advertisers Harvard study wrestles with Gator Spyware Info – Home of the Spyware Weekly Double Click Specific Pop Hit Box Ad Tech Web Trends Live Lavasoft Software Major Geeks Hoaxbusters Security Response Hoaxes PUBLIC AWARENESS ADVISORY REGARDING "4-1-9" OR "ADVANCE FEE FRAUD" SCHEMES FROGAPULT, ELFBOWL, Y2KGAME Virus Hoax Security Tools Overview Secure Password Storage SANS/FBI Top 20 List ICAT Metabase – Vulnerability Search Engine American Registry for Internet Numbers Network Solutions Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw-By the Man Who Did It It's over -- Mitnick finally sentenced Hacker Mitnick released Friday Legendary computer hacker released from prison Mitnick: You can trust a hacker Pros, cons of hiring ex-criminal hackers Do hackers have a role in corporate security? Intrusion Detection Cisco Secure Intrusion Detection System