Suggested reading and resources for understanding cyber security and countering cyberterrorism
A multidisciplinary, multi-institution project to facilitate debate around a series of core questions relating to cyberterrorism. Learn about terrorist actors who operate online exploit vulnerabilities within software, hardware, and in the internet’s architecture. Terrorists use the internet to enact or make threats designed to influence the government, intimidate the public, and compromise public security.
The Defense Cyber Crime Center (DC3) provides digital and multimedia (D/MM) forensics, cyber investigative training, research, development, test and evaluation (RDT&E), and cyber analytics for the following DoD mission areas: information assurance (IA) and critical infrastructure protection (CIP), law enforcement and counterintelligence (LE/CI), document and media exploitation (DOMEX), and counterterrorism (CT).
IntelLink provides cyber training and digital forensics tools at no cost to authorized LE agency members.
MS-ISAC is the focal point for cyber threat prevention, protection, response and recovery for the nation’s state, local, tribal, and territorial (SLTT) governments. The MS-ISAC 24×7 cyber security operations center provides real-time network monitoring, early cyber threat warnings and advisories, vulnerability identification and mitigation and incident response
The Korean National Police Agency hosts the annual International Symposium on Cybercrime Response (ISCR). ISCR 2014 is scheduled for June 18-20 at the Grand Hall & Council Chamber Room, The Korea Chamber of Commerce & Industry (Seoul).
NCSA’s mission is to educate and therefore empower a digital society to use the Internet safely and securely at home, work, and school, protecting the technology individuals use, the networks they connect to, and our shared digital assets.
The Department of Homeland Security’s United States Computer Emergency Readiness Team (US-CERT) leads efforts to improve the nation’s cybersecurity posture, coordinate cyber information sharing, and proactively manage cyber risks to the Nation while protecting the constitutional rights of Americans. US-CERT strives to be a trusted global leader in cybersecurity – collaborative, agile, and responsive in a dynamic and complex environment.
Remember your fundamental cybersecurity practices
Count: Know what’s connected to and running on your network;
Configure: Implement key security settings to help protect your systems;
Control: Limit and manage those who have admin privileges to change, bypass, or override your security settings;
Patch: Regularly update all apps, software and operating systems; and
Repeat: Regularize the Top Priorities to form a solid foundation of cybersecurity for your organization.
Find your 2015 Cyber Security Calendar [pdf] here.
Recommended Reading “North Korea’s Cyber Warfare and Challenges for the U.S.-ROK Alliance” by Dr. Alexandre Mansourov [pdf]: kei_aps_mansourov_final.
- A Guide to Computer Crime
- Berkman Center For Internet Safety
- Be Specific – Cybercrime
- Computer Crime Research Center
- Computerworld – Cybercrime and Hacking
- Council of Europe – Cybercrime
- CSO Data Protection
- Cyber Crime 101
- Cybercrime Law
- Cyber Criminals Most Wanted
- Euractiv – Cybercime
- FBI – Cyber Crime
- Hoax Busters
- HTCIA – High Tech Crime Investigation Association
- IC3 – US Internet Crime Complaint Center
- RSA CyberCrime Intelligence Service
- Safer Internet
- US CERT – Carnegie Mellon Software Engineering Institute
- US DOD Cyber Crime Center