Title |
Description |
The Business
Software Alliance |
As the foremost organization dedicated to promoting a safe and
legal digital world, represents the world's commercial software
industry and its hardware partners before governments and in the
international marketplace. Educates consumers on software management
and copyright protection, cyber security, trade, e-commerce and
other Internet-related issues |
C3 Institute |
Provides outreach services and resourcs to the educational community about the ethical, legal, safety, and security implications of technology use. |
Campus IT Security Office: University of Colorado at Boulder |
Security awareness program that focuses on a different topic each month (passwords, privacy, AV, etc) September though May. |
Campus
Technology |
As the only monthly publication focusing exclusively on the use
of technology across all areas of higher education, provides in-depth,
aggressive coverage of specific technologies, their uses and implementations,
including enterprise resource planning; e-Learning and course management
systems; presentation technologies; communication, portal, and
security solutions – all the important issues and trends
for campus IT decision makers |
Center for Safe and Responsible
Internet Use |
Provides guidance to parents, educators, librarians, policy-makers,
and others regarding effective, empowerment strategies to assist
young people in gaining the knowledge, skills, motivation, and
self-control to use the Internet and other information technologies
in a safe and responsible manner |
Central Intelligence Agency (CIA) Kids Homepage |
Helps kids explore careers in the CIA through online games and facts and resources |
CERIAS:
The Center for Education and Research on Information Assurance
and Security at Purdue University |
Provides information and programs for protecting critical computing
and communications infrastructure. |
CERT
Coordination Center |
The CERT Coordination Center (CERT/CC) is a center of Internet
security expertise operated by Carnegie Mellon University. This
Web site provides information and resources to help guide you in
establishing safe and secure home computing methods. |
CNET
News: Security |
Provides extensive and updated news regarding cyber attacks,
privacy & data protection, enterprise security, corporate & legal,
software flaws, policy, law & crime, and network archtecture |
COMPUTERWORLD |
Provides the most trusted source for the critical information
needs of senior IT management at medium-size to large companies.
Covers news from the IT manager's perspective with a broad analytical
view of how that news affects the daily operations of large technology
enterprises. |
Consumer
Information Security |
A web portal by the U.S. Federal Trade Commission providing information
for consumers about cyber security and safeguarding personal information. |
CoSN: The Consortium
for School Networking |
Non-profit association that promotes the use of telecommunications
to improve K-12 learning. |
Criminal
Justice CYBERSAFETY: Security in the 21st Century |
Provides overview of computer encryption. Introduces Web sites
for more detailed technical information, an explanation of different
types of encryption, a description of encryption as used by the
U.S. Congress, and information on international uses of encryption. |
Carnegie
Mellon CyLab |
A bold and visionary effort aimed at creating a public-private
partnership to develop new technologies for measurable, available,
secure, trustworthy, and sustainable computing and communications
systems and to educate individuals at all levels |
Defense Intelligence Agency Kids Page (Just for Kids page) |
Integrity and Accountability in all of our actions and activities. - Commitment to inquiry, truth, and continuous learning. - Creativity and Innovation in solving problems, discovering facts and creating knowledge. |
Department
of Energy: National Security |
Department works to preserve the integrity, reliability, availability,
and confidentiality of important information while maintaining
its information systems. |
Department of Homeland Security's National Cyber Security Division (NCSD) |
Provides for 24 x 7 functions, including conducting cyberspace analysis, issuing alerts and warning, improving information sharing, responding to major incidents, and aiding in national-level recovery efforts. Resource for frequently requested Homeland Security Fact Sheets [Creation] |
DISA IA Awareness Posters |
The Information Assurance Awareness posters were provided as a courtesy by Keesler Air Force Base. You may download the posters and submit to your graphics department to tailor to your organizations specifications |
EDUCAUSE |
EDUCAUSE is a nonprofit association whose mission
is to advance higher education by promoting the intelligent use
of information technology. Variety of materials and resources on
Cyberethics, safety and security found in their Resource section. |
ETPRO Cyberawareness
Blog |
Blog related to Cyberethics, Cybersafety and Cybersecurity (C3)
issues |
The
Folder Workaround |
Provides a variety of ways to completely eliminate
the browser cache in Safari |
George Mason's humorous video clips on passwords |
Tips and tricks on creating safe and secure passwords |
GetNetWise.com |
Provides resources of keeping children safe online, stopping
unwanted e-mail and spam, protecting your computer from hackers
and viruses, and keeping your personal information private |
GetNetWise
Video Tutorials |
Provides tutorials of privacy,
browsing, sharing, security, spyware, filtering/reporting
spam, tools and includes ethics topics |
Global
Security Awareness Activities |
Voluntary project coordinating security awareness
activities worldwide |
Higher-Education
Organizations Plan a Coordinated Approach to Network
Security |
Introduces two higher-education technology
organizations, Educause and Internet 2, which intend to develop
a coordinated strategy to prevent information-security breaches and the ethics behind the breaches |
Home
Computer Security |
Addresses the issue of home computer security and provides essential
information, steps to take for securing computer, additional resources,
examples, and glossary. Produced by CERT Coordination Center of
Carnegie Mellon University. |
How
Computer Viruses Work |
Provides information about viruses so that you
can learn how they work and also understand how to protect yourself |
How
to Enable the Debug menu |
Provides a variety of ways to enable the Safari debug menu |
The
Institute of Internal Auditors IT Security Resource Site |
Resources will assist your various internal audit
efforts. |
IASO online tutorial |
This course provides individuals an understanding of the information systems security policies, roles, responsibilities, practices, procedures, and concepts necessary to perform the functions of an Information Assurance Security Officer (IASO) Certification Course Level 1 Certification - from the School of Information Technology, Fort Gordon, Georgia |
Internet
Security Systems (ISS) |
Provides portals in order to give the trusted security advice
to global enterprises and world governments. Protects the availability,
confidentiality and integrity of your information systems with
the multi-layered, end-to-end intrusion prevention and vulnerability
management solutions of the Proventia Enterprise Security Platform
(ESP). |
IT
Security |
Provides services and support to enhance IT:
basic security tips, resourceful websites, e-mail risks, identity
theft, scams and phishing, spam, spyware and adware, viruses, and
web risks |
IT
Security World |
Provides portals of analyst briefings, white papers, and news,
and resources which cover the issues of spam, policy and standards,
defensive measures, threats, and vulnerabilities |
Minnesota
Intrusion Detection System (MINDS) |
Provides information about a research project,
which is being conducted as a part of MINDS (Minnesota Intrusion
Detection System) project that is developing a suite of data mining
techniques to automatically detect attacks against computer networks
and systems |
My
Netwatchman |
Provides updated news and resources of internet security |
MySecureCyberspace.com |
MySecureCyberspace gives you security solutions
for the way you use the Internet |
National
Cyber Security Alliance |
Provides the go-to resource for cyber security
awareness and education for home user, small business, and education
audiences |
National Security Agency (NSA) |
- Community Outreach
- Education and Training - NSA/CSS values continual learning and development for its most important resource – its People. Technology changes at the speed of light and techniques that are cutting edge today will quickly become antiquated tomorrow. Keeping the NSA/CSS workforce in peak intellectual shape and keeping their skills sharply honed are critical components to the Agency’s success
- Kids Page - CryptoKids page has fun exercises for kids to learn about cryptology and NSA/CSS while promoting ethical & safe use of technology
- National Cryptologic Museum - The National Cryptologic Museum is the National Security Agency’s principal gateway to the public. It shares the Nation’s, as well as NSA’s, cryptologic legacy and place in world history.
|
NIST Computer Security Resource Center (CSRC) |
Sharing of information security tools and practices, providing one-stop shopping for information security standards and guidelines, and identifying and linking web resources to support the industry |
NIST National Vulnerability Database |
The database allows vendors to discuss the impact of vulnerabilities on their products |
OnGuardOnline.gov |
Provides practical tips from the federal government and the technology industry to help you be on guard against Internet fraud, secure your computer, and protect your personal information. |
The Online
Safety Toolkit |
Created in response to findings from the Online Safety for Women
Project funded by Status of Women Canada and the National Crime
Prevention Strategy. |
Project
RainbowCrack |
Provides information about a project, RainbowCrack,
which is a general propose implementation of Philippe Oechslin's
faster time-memory trade-off technique: The RainbowCrack tool is
a hash cracker. |
Refdesk.com |
Provides free pop-up, spyware, browser hijacking, spam blockers
and identity theft resources |
SANS'
Information Security Reading Room |
Provides white papers on the computer security which have been
mostly written by students seeking GIAC certification to fulfill
part of their certification requirements and have been provided
by SANS as a resource to benefit the security community at large |
Schneier on Security |
A weblog covering security and security technology. |
StopBadware.org |
Provides reliable, objective information about
downloadable applications in order to help consumers to make better
choices about what they download on to their computers |
Symantec |
Provides glossary which contains definition of terms in relation
to Internet security |
Truth
About Computer Virus Myths & Hoaxes |
Produced by Rhode Island Soft Systems, Inc. Provides
portals of virus myths, hoaxes, and urban legends that can cause
hysteria in Internet users, giving tips for spotting and reducing
such unethical e-mail communications |
UMCP
OIT Project NEThics |
Initiated by the Office of Information Technology at the University
of Maryland. Provides portals of ethical uses of the Internet and
brings an identity to the team of individuals who are responsible
for managing incidents of misuse of University computing resources. |
VNUNET |
Provides portals of UK technology news, reviews,
downloads, white papers, forums, jobs, blogs, and shopping |
Want
D Best. Com |
Provides free resources directory such as free anti-spyware,
anti-spam, cookie deleters, web bug detectors, and web filters |
Zisman
's tutorials |
Provides links to tutorials and workshop handouts
written by Alan Zisman, computer teacher at Vancouver's Chief Maquinna
Elementary School and 1999-2001 Vancouver School District technology
mentor teacher |