Outline of computer security explained

The following outline is provided as an overview of and topical guide to computer security:

Essence of computer security

Computer security can be described as all of the following:

Areas of computer security

Authentication

Computer security threats

Methods of Computer Network Attack and Computer Network Exploitation

Social engineering is a frequent method of attack, and can take the form of phishing, or spear phishing in the corporate or government world, as well as counterfeit websites.

Computer defenses and security measures

Access control

Access control  - selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.

Application security

Application security

Data security

Data security  - protecting data, such as a database, from destructive forces and the unwanted actions of unauthorized users.[1]

Information privacy

Mobile security

Network security

World Wide Web Security

History of computer security

Computer security industry

Computer security software

Testing labs

Computer security companies

Computer security publications

Journals and magazines

Books on computer security

Books on cryptography

Cyber security community

Cyber security communities

Computer security organizations

Academic

Commercial

Government agencies

Law enforcement agencies

Internet police  - police and secret police departments and other law enforcement agencies in charge of policing the Internet. The major purposes of Internet police, depending on the state, are fighting cybercrime, as well as censorship, propaganda, and monitoring and manipulating the online public opinion.

Independent non-profits

Independent web-sites

Persons influential in computer security

See also

Rubber-hose cryptanalysis

External links

Windows 7 security
Windows 8 security
Mac security
Linux security
Threat alerts and vulnerability tracking lists

Notes and References

  1. Summers, G. (2004). Data and databases. In: Koehne, H Developing Databases with Access: Nelson Australia Pty Limited. p4-5.
  2. Web site: Keylogger. Oxford dictionaries. dead. https://web.archive.org/web/20130911175015/http://oxforddictionaries.com/definition/english/keylogger. 2013-09-11.
  3. Web site: Rootkits, Part 1 of 3: The Growing Threat. McAfee. 2006-04-17. https://web.archive.org/web/20060823090948/http://www.mcafee.com/us/local_content/white_papers/threat_center/wp_akapoor_rootkits1_en.pdf. 2006-08-23.
  4. Web site: Microsoft Technet. Virtual Private Networking: An Overview. 9 December 2009 . live. https://web.archive.org/web/20170925145332/https://technet.microsoft.com/en-us/library/bb742566.aspx. 2017-09-25.
  5. Book: Harley, David . AVIEN Malware Defense Guide for the Enterprise . 2011 . David Harley . . 9780080558660 . 487 . 2013-06-10 . live . https://web.archive.org/web/20140103121250/http://books.google.com/books?id=LBzXf0A-jQwC . 2014-01-03 .
  6. News: Android antivirus apps improve their grades . Rosenblatt . Seth . . . 2013-03-15 . 2013-06-10 . live . https://web.archive.org/web/20130413230636/http://download.cnet.com/8301-2007_4-57398501-12/android-antivirus-apps-improve-their-grades-just-not-very-much/ . 2013-04-13 .
  7. News: Microsoft Security Essentials misses AV-Test Certified status . Owano . Nancy . . Omicron Technology Ltd . Douglas, Isle of Man . 2013-01-18 . 2013-06-10 . https://web.archive.org/web/20130310012934/http://phys.org/news/2013-01-microsoft-essentials-av-test-certified-status.html. 2013-03-10. dead.
  8. News: Windows 8's rising security tide raises all antivirus boats . Rosenblatt . Seth . . . 2013-04-08 . 2013-06-10 . live . https://web.archive.org/web/20130610085236/http://reviews.cnet.com/8301-3667_7-57578546/windows-8s-rising-security-tide-raises-all-antivirus-boats/ . 2013-06-10 .
  9. News: Microsoft and Others Fail Antivirus Test . Rubenking . Neil J. . . . 2013-01-16 . 2013-06-10 . live . https://web.archive.org/web/20130511111843/http://securitywatch.pcmag.com/security-software/307051-microsoft-and-others-fail-antivirus-test . 2013-05-11 .
  10. Dawson. Jessica. Thomson. Robert. 2018-06-12. The Future Cybersecurity Workforce: Going Beyond Technical Skills for Successful Cyber Performance. Frontiers in Psychology. 9. 744. 10.3389/fpsyg.2018.00744. 1664-1078. 6005833. 29946276. free.
  11. Web site: About McAfee . 20 September 2012 . live . https://web.archive.org/web/20130127082458/http://www.mcafee.com/us/resources/brochures/br-mcafee-fact-sheet.pdf . 27 January 2013 .
  12. News: Intel Completes Acquisition of McAfee . McAfee News . 28 February 2011 . dead . https://web.archive.org/web/20110827102142/http://www.mcafee.com/us/about/news/2011/q1/20110228-01.aspx . 27 August 2011 . 19 November 2014 .
  13. News: Intel in $7.68bn McAfee takeover . BBC News . 19 August 2010 . live . https://web.archive.org/web/20100819191501/http://www.bbc.co.uk/news/business-11025866 . 19 August 2010 .
  14. https://venturebeat.com/2014/01/06/mcafee-is-rebranding-as-intel-security-will-offer-some-free-products/ Article
  15. http://www.cerias.purdue.edu/ CERIAS home page
  16. Web site: CERT Coordination Center . 2015-03-03 . live . https://web.archive.org/web/20150227080617/http://www.cert.org/vulnerability-analysis/knowledgebase/index.cfm . 2015-02-27 .
  17. Web site: Georgia Tech Information Security Center History . 2007-08-01 . dead . https://web.archive.org/web/20070811074846/http://www.gtisc.gatech.edu/history.html . 2007-08-11 .
  18. Web site: About AISA. 19 November 2014. live. https://web.archive.org/web/20141129051813/https://www.aisa.org.au/about-aisa/. 29 November 2014.
  19. Web site: Microsoft Digital Crimes Unit . . Redmond, WA . 2013-11-15 . live . https://web.archive.org/web/20131210172707/http://www.microsoft.com/government/ww/safety-defense/initiatives/pages/digital-crimes-unit.aspx . 2013-12-10 .
  20. Web site: Canadian Cyber Incident Response Centre . 2009-04-25 . dead . https://web.archive.org/web/20090208001508/http://www.publicsafety.gc.ca/prg/em/ccirc/index-eng.aspx . 2009-02-08 .
  21. News: Norwegian Cyber Defence Center for Cyber and Information Security. CCIS. Center for Cyber and Information Security -. Center for Cyber and Information Security. 2017-02-13. en-US. live. https://web.archive.org/web/20160828050224/https://ccis.no/partnere/cyberforsvaret/. 2016-08-28.
  22. Andersson and Reimers, 2019, CYBER SECURITY EMPLOYMENT POLICY AND WORKPLACE DEMAND IN THE U.S. GOVERNMENT, EDULEARN19 Proceedings, Publication year: 2019 Pages: 7858-7866 https://library.iated.org/view/ANDERSON2019CYB
  23. Web site: Air Force senior leaders take up key decisions . 7 October 2008 . Air Force Link . . 22 October 2008. https://web.archive.org/web/20081017072912/http://www.af.mil/news/story.asp?id=123118700. 17 October 2008 . live.
  24. Web site: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3). DoDD 5505.13E. 18 May 2011. dead. https://web.archive.org/web/20111026062557/http://www.dtic.mil/whs/directives/corres/pdf/550513E.pdf. 26 October 2011.
  25. Web site: Ten Years After: The FBI Since 9/11. FBI.gov. Federal Bureau of Investigation. 20 November 2014. live. https://web.archive.org/web/20141129033847/http://www.fbi.gov/about-us/ten-years-after-the-fbi-since-9-11/just-the-facts-1/cyber. 29 November 2014.
  26. [Cyber Crime]
  27. FBI's Ability to Address the National Security Cyber Intrusion Threat, p. 2 (PDF)
  28. Web site: Mission & Strategy. www.nsa.gov. en. 2017-02-13. live. https://web.archive.org/web/20170214004026/https://www.nsa.gov/about/mission-strategy/. 2017-02-14.
  29. Web site: About the National Cybersecurity and Communications Integration Center. September 4, 2013. live. https://web.archive.org/web/20130904150945/http://www.dhs.gov/about-national-cybersecurity-communications-integration-center. September 4, 2013.
  30. Web site: US-CERT Infosheet Version 2. September 4, 2013. live. https://web.archive.org/web/20130512035526/http://www.us-cert.gov/sites/default/files/publications/infosheet_US-CERT_v2.pdf. May 12, 2013.
  31. U.S. Department of Defense, Cyber Command Fact Sheet, 21 May 2010 Web site: U.S. Cyber Command - U.S. Strategic Command . 2014-04-16 . dead . https://web.archive.org/web/20140416192156/http://www.stratcom.mil/factsheets/2/Cyber_Command/ . 2014-04-16 .
  32. Danny Yadron, John McAfee at Def Con: Don’t Use Smartphones, The Wall Street Journal, August 08, 2014