Skip to main content

Home/ CSIA 459/ Contents contributed and discussions participated by Amy Harding

Contents contributed and discussions participated by Amy Harding

Amy Harding

Video: Flame: Trying to Unravel the Mystery of Spying Malware | Watch PBS NewsHour Onli... - 4 views

  •  
    "Flame: Trying to Unravel the Mystery of Spying Malware"
Amy Harding

Stuxnet 3.0 ,Malcon 2011, Nima Bagheri - YouTube - 13 views

shared by Amy Harding on 06 Mar 13 - No Cached
  •  
    For Week 6.
Amy Harding

What should we expect from next cyber weapon? Hypothesis on Stuxnet 3 | Security Affairs - 28 views

  •  
    For your Week 6 discussion.
Amy Harding

Verizon's '2013 Data Breach Investigations Report' Expands Types of Threats Analyzed to... - 23 views

  •  
    For your Week 6 discussion. "Verizon's '2013 Data Breach Investigations Report' Expands Types of Threats Analyzed to Present Even Broader, More Extensive Picture of Cybercrime"
Amy Harding

Biometrics and Cyber Security - 8 views

  •  
    Review the presentation.
Amy Harding

Anonymous attacks against the DNS Root Servers. What's true and what's not? - 28 views

  •  
    (ISC)2 Blog: for Week 5
Amy Harding

Cyber War! - 32 views

shared by Amy Harding on 06 Mar 13 - No Cached
  •  
    Click through this Cyber War website.
Amy Harding

National Webcast: Cyber Security Emerging Trends and Threats for 2013 - 40 views

  •  
    This webcast is part of your Week 4 required reading/watching. Click on Archived Recording Now Available link and the video will open. On the right side of the screen you will see segments and you can click through the video and/or have to break the video down into smaller chunks.
Amy Harding

WiMAX Forum - 26 views

  •  
    In Week 4 you will click around this website and select on area to talk about during the discussion questions.
Amy Harding

Security Requirements for Cryptographic Modules - 4 views

  •  
    This standards publication (FIPS 140-2) is a key standard's document. Skim through it and see if you can find some ideas for emerging threats against the standard(s).
Amy Harding

The Security Content Automation Protocol (SCAP) - NIST - 5 views

shared by Amy Harding on 06 Mar 13 - Cached
  •  
    Using the links to the left of the screen, click around the SCAP website and think about how this protocol could help organizations manage their security vulnerabilities. Does your organization use SCAP?
Amy Harding

Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats ... - 22 views

  •  
    When you access this web resource you can select to download the full PDF file or you can click to read online.
Amy Harding

Lecture Notes on Cryptography - 37 views

  •  
    This document is part of your Week 2 DQ. It is 289 pages so I do not expect you to read the entire document. However, open the Voicethread to see the key areas for the DQ and you can search the document for those key words.
Amy Harding

Hackers - 3 views

shared by Amy Harding on 06 Mar 13 - No Cached
  •  
    Optional web resource for week 2.
Amy Harding

Video - Digital Nation Life on the Virtual Frontier - 25 views

shared by Amy Harding on 06 Mar 13 - No Cached
  •  
    This video is 90 minutes long. However, if you open the link, the video is separated by nine chapters. You can put your cursor on the bottom of the video and see each of the chapters and the topic. Find at least one chapter of interest to you and watch it. Each chapter tells you how long it is after you start it.
‹ Previous 21 - 40 of 44 Next ›
Showing 20 items per page