Skip to content
What's New
About FBIIC
Press Releases
Policies
Emergencies
Events
Executive Orders
Links
Members Only
Contact Us
FBIIC Home
|
Links
Foreign Public Sector | Foreign Private Sector | Pandemic Flu Public Sector | GAO Reports| Incident|In The News|2009 Inauguration | |Public Sector Resources
Consumer Alert
This section contains links
to public and private sector sites that will provide the reader with further
background on Critical Infrastructure Protection / Homeland Security issues, and Pandemic Flu
including organizations involved in activities related to those issues.
2009 Inauguration
Public Sector Resources
GAO Reports
Hurricane Ike
Hurricane Hanna
Hurricane Gustav
June 2008 Flooding
Public Sector Links
Foreign Public
Sector Links
Foreign Private
Sector Links Archive
Financial Services Sector Coordinating
Council (FSSCC) Links:
Pandemic Flu Public
Sector Links
Cyber Security
- Monthly Activity Summary
- CWE/SANS TOP 25 Most Dangerous Programming Errors
- Which? Computing
- Twitter Blog
- Learning More About the Underground Economy: A Case-Study of Keyloggers and Dropzones
- Digital World, Digital Life - December 2008
- NORAD Tracking
- France Telecom -- Three undersea cables cut: traffic greatly disturbed between Europe and Asia/Near East zone
- ENISA Quarterly Review
- Cisco 2008: Annual Security Report
- Microsoft confirms that all versions of IE have critical new bug
- Microsoft Security Vulnerability Research & Defense
- Microsoft Security Response Center (MSRC)
- Pew Internet & American Life Project - “The Future of the Internet III”
- Government of Australia - Communications Infrastructure and Services Availability Report 2006-07
- Federal Trade Commission Alert - "Free Security Scan" Could Cost Time and Money
- Federal Trade Commission - Court Halts Bogus Computer Scans
- A Report of the CSIS Commission on Cybersecurity for the 44th Presidency
- CIIN-08-309-01-Using Caution with USB Drives
- Symantec Report on the Underground Economy July 07–June 08
- 2008 REPORT TO CONGRESS of the U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION
- Future of Privacy Forum
- Online criminals can make £14,500 from average UK internet user
- Arbor Networks - Worldwide Infrastructure Security Report Volume IV, 2008
- Spamalytics: An Empirical Analysis of Spam Marketing Conversion
- US-CERT - CIIN-08-309-01: Using Caution with USB Drives
- Reconsidering Physical Key Secrecy: Teleduplication via Optical Decoding
- Microsoft Security Intelligence Report volume 5 (January – June 2008)
- United Kingdom - "Corporate IT Forum Survey: Is organised electronic crime on the rise?"
- United Kingdom -
"The Frontline In The Fight Against E-Crime: Lessons From Top Organisations"
- Garlik UK Cybercrime Report 2008
- United Kingdom Information Commissioner's Office - Speech of 29 October 2008
- Internet Watch Foundation
- Critical Infrastructure Information Notice- CIIN-08-297-01
- Microsoft Security Bulletin MS08-067
- Ecole Polytechnique Federale de Lausanne - "Compromising Electromagnetic Emanations of Keyboards"
- SwA Community Resources and Information Clearinghouse
- Enhancing the Development Life Cycle to Produce Secure Software -
Version 2, October 3, 2008
- Fundamental Practices for Secure Software Development: A Guide to the Most Effective Secure Development Practices in Use Today - Released October 8, 2008
- Software Assurance in Acquisition: Mitigating Risks to the Enterprise - Version 1.01, October 2008
- Practical Measurement Framework for Software Assurance and Information
Security - Version 1.0, October 2008
-
Practical Measurement Framework for Software Assurance and Information Security - Released October 1, 2008
- Engineering for System Assurance - Version 1.0, October 1, 2008
- Common Weakness Enumeration - Released October 14, 2008
- Financial Impact of Cyber Security
- Georgia Tech Information Security Center - "Emerging Cyber Threats Report for 2008"
- Information Technology: Management Improvements Needed on the Department of Homeland Security's Next Generation Information Sharing System. GAO-09-40, October 8 | Highlights
- Government Accountability Office - "GAO’s Efforts to Assist the 111th Congress"
- United Kingdom All Party Parliamentary Group on Identity Fraud - Identity Fraud Report
- 13th European Symposium on Research in Computer Security
- Radboud University Nijmegen - "Dismantling MIFARE Classic"
- Radboud University Nijmegen - "Making the Best of Mifare Classic"
- Avoiding Social Engineering and Phishing Attacks
- Recognizing and Avoiding Email Scams (PDF)
- Department of Justice
Press Release - October 2, 2008
- United Kingdom Home Office - "Fighting back against electronic crime"
- University of Toronto, Munk Centre for International Studies - "Breaching Trust"
- State of Washington Attorney General - Scareware:
Press Release | Complaint
- Connecting Research in Security to Practice (CRISP) Report - Lost Laptops = Lost Data
- House Committee on Homeland Security - "Cybersecurity Recommendations for the Next Administration"
- European Commission - Second periodic review of the scope of universal service in electronic communications networks and services
- Proceedings of Human Factors and Ergonomics Society
- Delivering super-fast broadband in the UK
- GAO Reports about Information Management
- Mitigation Monday - Defense Against Malicious E-mail Attachments, Release 1
- Shadowserver Foundation
- Do Zebras get more Spam than Aardvarks? Source: University of Cambridge
- Ignoring the Great Firewall of China Source: University of Cambridge
- Sampled Traffic Analysis by Internet-Exchange-Level Adversaries Source: University of Cambridge
- Upcoming Cyber Security Conferences
- Products for DNS Issue -
CIIN | SAR
- Analyzing Websites for User-Visible Security Design Flaws
- US-CERT Advisory 08-04- BlackBerry Security Advisory
- Using Wireless Technology Securely
- Swiss Federal Institute of Technology Zurich
Understanding the Web browser threat: Examination of vulnerable online Web browser populations and the "insecurity iceberg"
- StopBadware.org - a partnership amongst academic and research organizations
- Internet Corporation for Assigned Names and Numbers
- Further Efforts Needed to Integrate Planning for and Response to Disruptions on Converged Voice and Data Networks
- Methods for Sharing Dynamic IP Address Space Information with Others
- Power of Information Task Force Competition
- Power of Information Task Force
- UCLA CENTER FOR INFORMATION AND COMPUTATION SECURITY
- OECD Internet Address Space Report
- WI-FI SECURITY
- US Senate Violent Islamist Extremism,
The Internet, and the Homegrown Terrorist Threat
- NATO opens new centre of excellence on cyber defence
- Internet Traffic Studies Site
- CYBER ALERT
- Fact Sheet: Protecting Our Federal Networks Against Cyber Attacks
- Global Information Technology Report
- Protected Critical Infrastructure Information (PCII) Program Survey
- Being Human: Human-Computer Interaction in the year 2020
- Carnegie Mellon link
- National Cyber-Forensics and Training Alliance
- Identity Theft
- Joint Task Force - Global Network Operations
- 2nd International Forum Against Cybercrime - France
- Podcast: Significant insider threat vulnerabilities can be introduced
(and mitigated) during all phases of the software development life
cycle.
- Report: Insider Threat Study: Illicit Cyber Activity in the Information
Technology and Telecommunications Sector
- Report: Insider Threat Study: Illicit Cyber Activity in the Government
Sector
- Survey of Federal Chief Information Officers
Research & Development
Incident
Links Archive
|