security antivirus audits blues computer contact computer security crime cyber firewall homeland internet www.4terrorism.com 1� se terrorism tv un z-a

computer security

information security issues are complex and are often rooted in organizational and business concerns. information security requires far more than the latest tool or technology. organizations must understand exactly what they are trying to protect (and why) before selecting specific solutions. the vast majority of worms and other successful cyber-attacks are made possible by vulnerabilities in a small number of common services. attackers usually take the easiest and most convenient route and exploit the best-known flaws with the most effective and widely available attack tools.

security resources for computer systems

computer virus resources www.cert.org/other_sources
cybersecurity www.4terrorism.com/listtemp
cybersecurity for the homeland hsc.house.gov
dod 5200.1-r information security program www.fas.org/irp/doddir/
dod information assurance iase.disa.mil/policy#guides
gao cybersecurity www.gao.gov/new.items/
information standards limited www.informationstandards.com
information systems security www.nsa.gov
internet security alliance: www.isalliance.org/
iso/iec 17799:2000 information technology www.iso.org
microsoft security and privacy www.microsoft.com/security
microsoft windows update v4.windowsupdate.microsoft.com/
mil-standard 498 (on-line dids) www.pogner.demon.co.uk/mil_498
nasa software safety www.hq.nasa.gov/office/codeq/
national information assurance partnership (niap) niap.nist.gov/
praxiom research group limited www.praxiom.com/
qualysguard freescan identifies the top 20 threats network perimeter sans20.qualys.com/
sans top 20 internet security vulnerabilities www.sans.org/top20/
security links www.criticalsecurity.com
space and naval warfare systems center san diego (on-line documents) sepo.spawar.navy.mil/sepo/index2
subcommittee on cybersecurity, science, and research & development hsc.house.gov
symantec internet security www.symantec.com/
united states computer emergency readiness team (us-cert) www.us-cert.gov/
us-cert events www.uscert.gov/events
virus information mcafee us.mcafee.com
visa cardholder information security program (cisp) usa.visa.com/business/merchants/cisp_index.
antivirus
computer security
security audits

contact
cybersecurity
firewalls

software architecture
architecture by the hour
www.projectbailout.com

computer security is a branch of computer technology known as information security as applied to computers and networks. the objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. the term computer system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. the strategies and methodologies of computer security often differ from most other computer technologies because of its somewhat elusive objective of preventing unwanted computer behavior instead of enabling wanted computer behavior.

 

cissp - certified information system security professional

https://www.isc2.org

cissp examination

http://www.cccure.org

cissp studying information  

security+ certification program

http://www.comptia.org/certification

 

the security+ certification is a testing program sponsored by the computing technology industry association (comptia)

to add a site, to report a broken link, or to file a complaint: contact

security courses

cissp power point

cissp course

security + certification

security+ certification

security+certification security+certification.ppt

links