Skip to main content

Home/ CSIA 459/ Contents contributed and discussions participated by Amy Harding

Contents contributed and discussions participated by Amy Harding

Amy Harding

What is IPv6? - 3 views

shared by Amy Harding on 05 Aug 13 - No Cached
  •  
    This video is for your week 7 discussion.
Amy Harding

Big Ideas Big Data - 1 views

shared by Amy Harding on 05 Aug 13 - No Cached
  •  
    This video is for your week 7 discussion.
Amy Harding

Verizon 2013 Data Breach Invesitations Report - 6 views

  •  
    For your Week 6 discussions. This is the actual report. The other bookmark takes you to an article about the report.
Amy Harding

CAESARS Framework Extension: An Enterprise Continuous Monitoring Technical Reference Mo... - 7 views

  •  
    For Week 6
Amy Harding

Computer Visionary Who Invented the Mouse - NYTimes.com - 2 views

  •  
    Most of us would not consider the mouse emerging technology - but back in 1968 when the mouse was first introduced that technology was bleeding edge!
Amy Harding

The Worst Cloud Outages of 2013 (So Far) CIO.com - 2 views

  •  
    Potential Information for your class project.
Amy Harding

http://resources.idgenterprise.com/original/AST-0084883_2013_Threat_Report.pdf - 1 views

  •  
    2013 Threat Report
Amy Harding

Down the Security Rabbithole - 0 views

  •  
    If you like podcasts this is interesting - helping to understand that security does not really exist and instead we are just managing risk.
Amy Harding

How fraudulent blackhat SEO monetizers apply Quality Assurance (QA) to their DIY doorwa... - 0 views

  •  
    Scary when the criminals are fighting each other....
Amy Harding

UMUC Achiever Spring 2013 - 2 views

  •  
    This magazine published by UMUC is all about Cybersecurity. Thought you might enjoy reading it.
Amy Harding

Stop Fake Antivirus - 2 views

  •  
    This paper provides insight into where fake antivirus comes from and how it is distributed, what happens when a system is infected with fake antivirus, and how to stop this persistent threat from infecting your network and your users.
Amy Harding

Ransomware: A growing Menance - 1 views

  •  
    This malware is highly profitable, with as many as 2.9 percent of compromised users paying out.
Amy Harding

Tools of the Trade: Exploit Kits - 1 views

  •  
    Here is a recent article that discusses additional exploit kits besides the Blackhole kit discussed in the video.
Amy Harding

NIST sorting comments on cybersecurity framework - FierceGovernmentIT - 7 views

  •  
    Be careful what you ask for -- NIST is now sorting through all the public comments related to the cybersecurity executive order and 185 days to get the framework publish.
Amy Harding

McConnell: Cybersecurity framework will reduce risk, but not 'fix the problem' - Fierce... - 2 views

  •  
    Interesting thoughts from DHS about the recently signed cybersecurity framework.
Amy Harding

U.S. business groups worried by cybersecurity law aimed at China | Reuters - 0 views

  •  
    This article talks about buying technology products from China and whether the US should. The supply chain is an important part of emerging technologies. As you worked on your bibliography - did you question where the technology comes from?
Amy Harding

http://www.safegov.org/media/46155/measuring_what_matters_final.pdf - 3 views

  •  
    Agencies must establish a unique baseline threat assessment and automate monitoring to ensure good cybersecurity, says a SafeGov report released Tuesday.
Amy Harding

Ranking the Top 10 Cloud Startups - CIO.com - 3 views

  •  
    This ranking of cloud start ups could be helpful to you for your research project.
Amy Harding

Embrace the cloud computing revolution - with caution | Comment is free | guardian.co.uk - 1 views

  •  
    For your cloud computing assignment
1 - 20 of 44 Next › Last »
Showing 20 items per page