Skip to main content

Home/ CSIA 459/ Contents contributed and discussions participated by Amy Harding

Contents contributed and discussions participated by Amy Harding

1More

What is IPv6? - 3 views

shared by Amy Harding on 05 Aug 13 - No Cached
  •  
    This video is for your week 7 discussion.
1More

Big Ideas Big Data - 1 views

shared by Amy Harding on 05 Aug 13 - No Cached
  •  
    This video is for your week 7 discussion.
1More

Verizon 2013 Data Breach Invesitations Report - 6 views

  •  
    For your Week 6 discussions. This is the actual report. The other bookmark takes you to an article about the report.
1More

CAESARS Framework Extension: An Enterprise Continuous Monitoring Technical Reference Mo... - 7 views

  •  
    For Week 6
1More

Computer Visionary Who Invented the Mouse - NYTimes.com - 2 views

  •  
    Most of us would not consider the mouse emerging technology - but back in 1968 when the mouse was first introduced that technology was bleeding edge!
1More

The Worst Cloud Outages of 2013 (So Far) CIO.com - 2 views

  •  
    Potential Information for your class project.
1More

http://resources.idgenterprise.com/original/AST-0084883_2013_Threat_Report.pdf - 1 views

  •  
    2013 Threat Report
1More

Down the Security Rabbithole - 0 views

  •  
    If you like podcasts this is interesting - helping to understand that security does not really exist and instead we are just managing risk.
1More

How fraudulent blackhat SEO monetizers apply Quality Assurance (QA) to their DIY doorwa... - 0 views

  •  
    Scary when the criminals are fighting each other....
1More

UMUC Achiever Spring 2013 - 2 views

  •  
    This magazine published by UMUC is all about Cybersecurity. Thought you might enjoy reading it.
1More

Stop Fake Antivirus - 2 views

  •  
    This paper provides insight into where fake antivirus comes from and how it is distributed, what happens when a system is infected with fake antivirus, and how to stop this persistent threat from infecting your network and your users.
1More

Ransomware: A growing Menance - 1 views

  •  
    This malware is highly profitable, with as many as 2.9 percent of compromised users paying out.
1More

Tools of the Trade: Exploit Kits - 1 views

  •  
    Here is a recent article that discusses additional exploit kits besides the Blackhole kit discussed in the video.
1More

NIST sorting comments on cybersecurity framework - FierceGovernmentIT - 7 views

  •  
    Be careful what you ask for -- NIST is now sorting through all the public comments related to the cybersecurity executive order and 185 days to get the framework publish.
1More

McConnell: Cybersecurity framework will reduce risk, but not 'fix the problem' - Fierce... - 2 views

  •  
    Interesting thoughts from DHS about the recently signed cybersecurity framework.
1More

U.S. business groups worried by cybersecurity law aimed at China | Reuters - 0 views

  •  
    This article talks about buying technology products from China and whether the US should. The supply chain is an important part of emerging technologies. As you worked on your bibliography - did you question where the technology comes from?
1More

http://www.safegov.org/media/46155/measuring_what_matters_final.pdf - 3 views

  •  
    Agencies must establish a unique baseline threat assessment and automate monitoring to ensure good cybersecurity, says a SafeGov report released Tuesday.
1More

Ranking the Top 10 Cloud Startups - CIO.com - 3 views

  •  
    This ranking of cloud start ups could be helpful to you for your research project.
1More

Embrace the cloud computing revolution - with caution | Comment is free | guardian.co.uk - 1 views

  •  
    For your cloud computing assignment
1 - 20 of 44 Next › Last »
Showing 20 items per page