Skip to main content

Home/ Groups/ CSIA 459
Dan Schulman

DoD posts 1 millionth user to email system - 0 views

  •  
    I wonder if they had cake... DoD/DISA's email system signed-up its 1 millionth user last week. Now that's a lot of Exchange mailboxes. This article has it listed as a cloud service... is it? It's true that DISA doesn't keep it's cloud presence a secret, a quick google search will tell you the URL is https://web.disa.mil - but since you can't get very far without a CAC.. is this truly cloud? What is the definition of cloud?
Brandon Kennedy

Web Resource - 0 views

  •  
    I don't know how fancy we are supposed to be with sharing these web resources, but I enjoy twitter because of how fast and easy current events are presented.
Dexter Foster

shiftsys - 5 views

Cloud Complexity and Authentication Challenges

http:__shiftsys.com_

started by Dexter Foster on 17 Mar 13 no follow-up yet
Amy Harding

Anonymous attacks against the DNS Root Servers. What's true and what's not? - 28 views

  •  
    (ISC)2 Blog: for Week 5
Amy Harding

Cyber War! - 32 views

shared by Amy Harding on 06 Mar 13 - No Cached
  •  
    Click through this Cyber War website.
Amy Harding

National Webcast: Cyber Security Emerging Trends and Threats for 2013 - 40 views

  •  
    This webcast is part of your Week 4 required reading/watching. Click on Archived Recording Now Available link and the video will open. On the right side of the screen you will see segments and you can click through the video and/or have to break the video down into smaller chunks.
Amy Harding

WiMAX Forum - 26 views

  •  
    In Week 4 you will click around this website and select on area to talk about during the discussion questions.
Amy Harding

The Security Content Automation Protocol (SCAP) - NIST - 5 views

shared by Amy Harding on 06 Mar 13 - Cached
  •  
    Using the links to the left of the screen, click around the SCAP website and think about how this protocol could help organizations manage their security vulnerabilities. Does your organization use SCAP?
Amy Harding

Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats ... - 22 views

  •  
    When you access this web resource you can select to download the full PDF file or you can click to read online.
Amy Harding

Lecture Notes on Cryptography - 37 views

  •  
    This document is part of your Week 2 DQ. It is 289 pages so I do not expect you to read the entire document. However, open the Voicethread to see the key areas for the DQ and you can search the document for those key words.
Amy Harding

Blueprint for a Secure Cyber Future - 30 views

  •  
    This document is used for your Week 1 discussion questions.
« First ‹ Previous 321 - 336 of 336
Showing 20 items per page