======================================================== |
======================================================== |
Associations |
|
Federation
of American Scientist |
|
======================================================== |
======================================================== |
BioMetrics /
authentication-access |
eEye
Digital Security |
BioNetrix |
|
Eye
Ticket |
|
======================================================== |
======================================================== |
Consumer Fraud /
Internet crime |
|
IFCC
/ Internet Fraud Complaint Center / types of fraud |
|
======================================================== |
======================================================== |
Consumer Privacy |
EPIC
/ Electronic Privacy Information Center |
Privacy
threats / tracking consumers |
ZipLip
/ secure data exchange platform |
|
Anonymous
E-mail remailer |
======================================================== |
======================================================== |
Contamination / Breaches |
CAIDA
/ scalable global Internet infrastructure |
CAIDA
/ dynamic graphs of Code Red Worm |
CiHost
Network Status |
======================================================== |
======================================================== |
Corporate Privacy |
|
======================================================= |
======================================================= |
Corporate Security
Management |
netForensics |
90East
/managed network security specialists / infrastructure |
WebWasher
/ Corporate Content Security |
CERT
Coordination Center |
SecuritySpace
/ network security auditing services |
Comodo
Group/ Cryptographic Lab Expertise/ branded solutions |
|
CyberSoft
/ estb. 1988 |
|
Exodus
Worldwide / CATT |
|
=============================================== |
================================================ |
Data Preservation |
|
======================================================= |
======================================================== |
Disclosure Policy |
|
Privacy
Issues |
|
======================================================== |
======================================================== |
Encryption Orientation |
|
Zixit...Just
Zixit / email encryption |
|
======================================================== |
======================================================== |
Enterprise Solutions |
TCPA
/ Trusted Computing Platform Alliance |
DynCorp
/ technology & services / Outsourcing |
Security
Space / Networks Audits, Analyzer, tools, etc. |
======================================================== |
======================================================== |
Firewalls |
CiHost
Network Status |
======================================================== |
======================================================== |
Glossary |
|
======================================================== |
======================================================== |
Hacking Systems /
issues |
iDefense |
THC
/ The Hacker's Choice / security weaknesses-reports |
|
================================================ |
================================================ |
Identity Theft |
Identity
Theft |
US
Federal Trade Commission / comprehensive resources |
|
======================================================== |
======================================================== |
Inoculation/
Security / Viruses |
ICSA
/International Computer Security Assoc. |
Antivirus
/ Virus Advisories |
InfoWar
/ Current Activity / broad subject coverage |
Antivirus
/ Virus Primer |
ISM
/ Information Security Services |
CERT/
Advisories 1988 - 2001 |
Linux
Security News |
CERT
/Advisory CA-2001-20 /threats
to Home Users |
McAfee
/ virus detection |
CERT
/ Home Network Security / what you can do |
NRM
/ Network Rating Model / National Security Agency |
CERT
/ Advisory CA-1999-02 / Trojan Horses |
Norton
/ Symantec |
CERT
/ Current Activity -
frequent, high-impact incidents . |
Symantec
/ Security Updates / top threats |
CERT
/ security expertise |
Scam
Busters |
CERT
/ Sources of Security Information |
Sophos
/ Types of Computer Viruses |
CERT
/ Incident Response Teams Globally |
Sophos
/ Virus info |
CERT
/ Computer Virus Resources |
Sophos
/ Top Ten Viruses |
National
Security Agency / Guides-Windows,Cisco, @Mail |
Firewall
Protection / CiHost Network Status |
White
Papers / Virus Information Library / AVERT-McAfee |
CIAC
/ Hoaxes / Computer Incident Advisory Capability |
Virus
Information Library / From A - Z |
CIAC
/ Bulletin Releases |
ICSA
Labs / databases,developers, investigators |
SherpaSoft
/ info on Mac Viruses |
Association
of anti Virus Asia Researchers |
White
Paper on Prevalent Viruses |
NIST
/ National Institute of Standards & Technology / USA |
Counterpane
/ Managed Security Monitoring |
NIST
/ Links to valuable resources |
Myths
& Hoaxes / A - Z |
|
The
Wildlist Organization
International / list of viruses |
======================================================== |
======================================================== |
Miscellaneous |
|
Federation
of American Scientist |
|
======================================================== |
======================================================== |
Optical Scanners /
identification / Video |
Rockwell
Collins /Aircraft Cabin Video-Alert Security Cam |
Eye
Ticket |
BioNetrix |
======================================================== |
======================================================== |
Privacy Policy |
|
======================================================== |
======================================================== |
Public Safety
Issues |
Assoc.
of Public-Safety Communications Officials International |
National
Law Enforcement & Security Institute |
Royal
Canadian Mounted Police /Public Safety Portal |
======================================================== |
======================================================== |
Records storage /
dissemination |
|
Police
records checks |
|
======================================================== |
======================================================== |
Regulatory Issues |
|
======================================================== |
======================================================= |
Research |
Information
Technology Research & Development |
The
IP Security Architecture / Helsinki Univ. of Technology |
|
US
House of Representative/ 1997 / enhancing security |
|
======================================================== |
======================================================== |
Security Structures /
categories / functions... |
...federal , state ,
local , & international |
Business
Executives for National Security |
In-Q-Tel
/technology integrator for CIA-Intelligence- Government |
CIAC
/Computer Incident Advisory Capability / DOE |
InfraGard
/ Business - Edu. - FBI - NIPC - "alert network" |
CompuDyne
/ design, integration, installation of systems |
US
Dept. of Homeland Security |
CCIPS
/Computer Crime & Intellectual Property Section USDOJ |
Military-National
Defense resources / local & global |
DERA
-Disaster Preparedness & Emergency Response Assn. |
National
Security Agency / Information Systems Security |
EPIC
/ Critical Infrastructure Protection / organizations |
NIPC
/National Infrastructure Protection Center |
FEMA
/ Federal Emergency Management Agency |
NNSA
- National Nuclear Security Administration / DOE |
|
Transportation
Security Administration |
|
Trilogy
/ FBI program to modernize communications system |
======================================================== |
======================================================== |
Transactions / secure
e-payment processing |
VeriSign
/ global transaction infrastructure |