Title |
Description |
The Business
Software Alliance |
As the foremost organization dedicated to
promoting a safe and legal digital world, represents the world's
commercial software industry and its hardware partners before
governments and in the international marketplace. Educates
consumers on software management and copyright protection,
cyber security, trade, e-commerce and other Internet-related
issues |
C3 Institute |
Provides outreach services and resourcs to the educational community about the ethical, legal, safety, and security implications of technology use. |
Campus IT Security Office: University of Colorado at Boulder |
Security awareness program that focuses on a different topic each month (passwords, privacy, AV, etc) September though May. |
Campus
Technology |
As the only monthly publication focusing exclusively on
the use of technology across all areas of higher education,
provides in-depth, aggressive coverage of specific technologies,
their uses and implementations, including enterprise resource
planning; e-Learning and course management systems; presentation
technologies; communication, portal, and security solutions – all
the important issues and trends for campus IT decision makers |
Center
for Safe and Responsible Internet Use |
Provides guidance to parents, educators,
librarians, policy-makers, and others regarding effective,
empowerment strategies to assist young people in gaining the
knowledge, skills, motivation, and self-control to use the
Internet and other information technologies in a safe and
responsible manner |
Central Intelligence Agency (CIA) Kids Homepage |
Helps kids explore careers in the CIA through online games and facts and resources |
CERIAS:
The Center for Education and Research on Information Assurance
and Security at Purdue University |
Provides information and programs for protecting critical
computing and communications infrastructure. |
CERT
Coordination Center |
The CERT Coordination Center (CERT/CC) is
a center of Internet security expertise operated by Carnegie
Mellon University. This Web site provides information and
resources to help guide you in establishing safe and secure
home computing methods. |
CNET
News: Security |
Provides extensive and updated news regarding
cyber attacks, privacy & data protection, enterprise security,
corporate & legal, software flaws, policy, law & crime,
and network archtecture |
COMPUTERWORLD |
Provides the most trusted source for the
critical information needs of senior IT management at medium-size
to large companies.
Covers news from the IT manager's perspective with a broad
analytical view of how that news affects the daily operations
of large technology enterprises. |
Consumer
Information Security |
A web portal by the U.S. Federal Trade Commission providing
information for consumers about cyber security and safeguarding
personal information. |
CoSN:
The Consortium for School Networking |
Non-profit association that promotes the
use of telecommunications to improve K-12 learning. |
Criminal
Justice CYBERSAFETY: Security in the 21st Century |
Provides overview of computer encryption. Introduces
Web sites for more detailed technical information, an explanation
of different types of encryption, a description of encryption
as used by the U.S. Congress, and information on international
uses of encryption. |
Carnegie Mellon CyLab |
A bold and visionary effort aimed at creating
a public-private partnership to develop new technologies for
measurable, available, secure, trustworthy, and sustainable
computing and communications systems and to educate individuals
at all levels |
Defense Intelligence Agency Kids Page (Just for Kids page) |
Integrity and Accountability in all of our actions and activities. - Commitment to inquiry, truth, and continuous learning. - Creativity and Innovation in solving problems, discovering facts and creating knowledge. |
Department
of Energy: National Security |
Department works to preserve the integrity,
reliability, availability, and confidentiality of important
information
while maintaining its information systems. |
Department of Homeland Security's National Cyber Security Division (NCSD) |
Provides for 24 x 7 functions, including conducting cyberspace analysis, issuing alerts and warning, improving information sharing, responding to major incidents, and aiding in national-level recovery efforts. Resource for frequently requested Homeland Security Fact Sheets [Creation] |
DISA IA Awareness Posters |
The Information Assurance Awareness posters were provided as a courtesy by Keesler Air Force Base. You may download the posters and submit to your graphics department to tailor to your organizations specifications |
EDUCAUSE |
EDUCAUSE is a nonprofit association whose
mission is to advance higher education by promoting the intelligent
use of information technology. Variety of materials and resources
on Cyberethics, safety and security found in their Resource
section. |
ETPRO
Cyberawareness Blog |
Blog related to Cyberethics, Cybersafety
and Cybersecurity (C3) issues |
The
Folder Workaround |
Provides a variety of ways to completely eliminate the browser
cache in Safari |
George Mason's humorous video clips on passwords |
Tips and tricks on creating safe and secure passwords |
GetNetWise.com |
Provides resources of keeping children safe online, stopping
unwanted e-mail and spam, protecting your computer from hackers
and viruses, and keeping your personal information private |
GetNetWise
Video Tutorials |
Provides tutorials of privacy,
browsing, sharing, security, spyware, filtering/reporting
spam, tools and includes ethics topics |
Global
Security Awareness Activities |
Voluntary project coordinating security awareness
activities worldwide |
Higher-Education
Organizations Plan a Coordinated Approach to Network
Security |
Introduces two higher-education technology
organizations, Educause and Internet 2, which intend to develop
a coordinated strategy to prevent information-security breaches and the ethics behind the breaches |
Home
Computer Security |
Addresses the issue of home computer security
and provides essential information, steps to take for securing
computer, additional resources, examples, and glossary. Produced
by CERT Coordination Center of Carnegie Mellon University. |
How
Computer Viruses Work |
Provides information about viruses so that you can learn
how they work and also understand how to protect yourself |
How
to Enable the Debug menu |
Provides a variety of ways to enable the
Safari debug menu |
IASO online tutorial |
This course provides individuals an understanding of the information systems security policies, roles, responsibilities, practices, procedures, and concepts necessary to perform the functions of an Information Assurance Security Officer (IASO) Certification Course Level 1 Certification - from the School of Information Technology, Fort Gordon, Georgia |
The Institute of Internal Auditors IT Security Resource
Site |
Resources will assist your various
internal audit efforts. |
Internet
Security Systems (ISS) |
Provides portals in order to give the trusted security advice
to global enterprises and world governments. Protects the
availability, confidentiality and integrity of your information
systems with the multi-layered, end-to-end intrusion prevention
and vulnerability management solutions of the Proventia Enterprise
Security Platform (ESP). |
IT
Security |
Provides services and support to enhance
IT: basic security tips, resourceful websites, e-mail risks,
identity theft, scams and phishing, spam, spyware and adware,
viruses, and web risks |
IT
Security World |
Provides portals of analyst briefings, white papers, and
news, and resources which cover the issues of spam, policy
and standards, defensive measures, threats, and vulnerabilities |
Minnesota
Intrusion Detection System (MINDS) |
Provides information about a research project,
which is being conducted as a part of MINDS (Minnesota Intrusion
Detection System) project that is developing a suite of data
mining techniques to automatically detect attacks against
computer networks and systems |
My
Netwatchman |
Provides updated news and resources of internet security |
MySecureCyberspace.com |
MySecureCyberspace gives you security solutions
for the way you use the Internet |
National
Cyber Security Alliance |
Provides the go-to resource for cyber security
awareness and education for home user, small business, and
education audiences |
National Security Agency (NSA) |
- Community Outreach
- Education and Training - NSA/CSS values continual learning and development for its most important resource – its People. Technology changes at the speed of light and techniques that are cutting edge today will quickly become antiquated tomorrow. Keeping the NSA/CSS workforce in peak intellectual shape and keeping their skills sharply honed are critical components to the Agency’s success
- Kids Page - CryptoKids page has fun exercises for kids to learn about cryptology and NSA/CSS while promoting ethical & safe use of technology
- National Cryptologic Museum - The National Cryptologic Museum is the National Security Agency’s principal gateway to the public. It shares the Nation’s, as well as NSA’s, cryptologic legacy and place in world history.
|
NIST Computer Security Resource Center (CSRC) |
Sharing of information security tools and practices, providing one-stop shopping for information security standards and guidelines, and identifying and linking web resources to support the industry |
NIST National Vulnerability Database |
The database allows vendors to discuss the impact of vulnerabilities on their products |
OnGuardOnline.gov |
Provides practical tips from the federal government and the technology industry to help you be on guard against Internet fraud, secure your computer, and protect your personal information. |
The
Online Safety Toolkit |
Created in response to findings from the Online Safety for
Women Project funded by Status of Women Canada and the National
Crime Prevention Strategy. |
Project
RainbowCrack |
Provides information about a project, RainbowCrack,
which is a general propose implementation of Philippe Oechslin's
faster time-memory trade-off technique: The RainbowCrack tool
is a hash cracker. |
Refdesk.com |
Provides free pop-up, spyware, browser hijacking, spam blockers
and identity theft resources |
SANS'
Information Security Reading Room |
Provides white papers on the computer security which have
been mostly written by students seeking GIAC certification
to fulfill part of their certification requirements and have
been provided by SANS as a resource to benefit the security
community at large |
Schneier on Security |
A weblog covering security and security technology. |
StopBadware.org |
Provides reliable, objective information about downloadable
applications in order to help consumers to make better choices
about what they download on to their computers |
Symantec |
Provides glossary which contains definition of terms in
relation to Internet security |
Truth
About Computer Virus Myths & Hoaxes |
Produced by Rhode Island Soft Systems, Inc. Provides portals
of virus myths, hoaxes, and urban legends that can cause hysteria
in Internet users, giving tips for spotting and reducing such
unethical e-mail communications |
UMCP
OIT Project NEThics |
Initiated by the Office of Information Technology
at the University of Maryland. Provides portals of ethical
uses of the Internet and brings an identity to the team of
individuals who are responsible for managing incidents of
misuse of University computing resources. |
VNUNET |
Provides portals of UK technology news, reviews, downloads,
white papers, forums, jobs, blogs, and shopping |
Want
D Best. Com |
Provides free resources directory such as
free anti-spyware, anti-spam, cookie deleters, web bug detectors,
and web filters |
Zisman
's tutorials |
Provides links to tutorials and workshop
handouts written by Alan Zisman, computer teacher at Vancouver's
Chief Maquinna Elementary School and 1999-2001 Vancouver School
District technology mentor teacher |