The following documents are available from the US-CERT website.
Securing your computer | Recovering from an attack | General internet security | Distributable materials | Monthly and quarterly reports
Securing your computer
- Before You Connect a New Computer to the Internet
- Tips for connecting a new (or newly upgraded) computer to the internet for the first time
- For home users, students, small businesses, or any organizations with limited Information Technology (IT) support
Governing for Enterprise Security
These web pages provide reports, presentations, and podcasts on how to
manage security at the enterprise level
Home Network Security
Information to help you use your home computer safely when you connect to the
internet
Recognizing and Avoiding Email Scams ![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
Introduction to what email scams are, how they work, and how to avoid them
Securing Your Web Browser
This paper will help you secure your web browser.
Software License Agreements: Ignore at
Your Own Risk
An overview of the risks computer users may incur by blindly agreeing to terms
contained in software licensing agreements
Spyware (non-technical) ![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
Overview of spyware and some practices to defend against it
Using Wireless Technology Securely![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
An overview of the risks associated with wireless technology and some practices for using it safely
Virus Basics
An introduction to viruses and ways to avoid them
Recovering from an attack
General internet security
- SQL Injection
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
This paper discusses the Structured Query Language (SQL) injection attack technique and offers mitigation methods.
- Understanding Voice over Internet Protocol (VoIP)
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
This paper provides an overview of VoIP and focuses primarily on security issues that may affect those new to this technology.
- Banking Securely Online
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
This paper discusses risks associated with online banking and provides some practices for using it safely.
- Playing it Safe: Avoiding Online Gaming Risks
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
This paper discusses technological and social risks associated with online gaming.
- Combating Insider Threat
These web pages include surveys, case studies, podcasts, and more on mitigating
insider threat
- Computer Forensics
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif) Discusses the need
for computer forensics to be practiced in an effective and legal way, outlines basic technical issues, and points to references for further reading
- The Continuing Denial of Service Threat Posed by DNS Recursion (v2.0)
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
US-CERT has been alerted to an increase in distributed denial of service (DDoS) attacks using spoofed recursive DNS requests. These attacks are troublesome because all systems communicating over
the internet need to allow DNS traffic. This paper provides information about configuring DNS servers to protect against this threat.
- Malware Threats and Mitigation
Strategies
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
A focus on the rapidly growing problem of malicious code and provides organizations with best
practice defense tactics
May 16, 2005
- Malware Tunneling in IPv6
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
Describes Malware Tunneling and how to manage attacks
- National Strategy to Secure Cyberspace
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
Engages and empowers Americans to secure the portions of cyberspace that they own, operate, control, or with which they interact
- Protecting Aggregated Data
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
Discusses security issues, business impacts, and potential strategies for organizations that create and maintain large aggregations of data
- Introduction to Information Security
Basic concepts of internet security
- Technical Trends in Phishing Attacks
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
Identifies technical capabilities behind phishing attacks, reviews trends, and discusses countermeasures
Distributable materials
Monthly and quarterly reports
- US-CERT Monthly Activity Summary - December 2008
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif) December 2008
- US-CERT Monthly Activity Summary - November 2008
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif) November 2008
- US-CERT Monthly Activity Summary - October 2008
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif) October 2008
- US-CERT Monthly Activity Summary - September 2008
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif) September 2008
- US-CERT Monthly Activity Summary - August 2008
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif) August 2008
- US-CERT Quarterly
Trends and Analysis Report, Vol. 3, Issue 3
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
August 2008
- US-CERT Monthly Activity Summary - July 2008
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif) July 2008
- US-CERT Monthly Activity Summary - June 2008
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif) June 2008
- US-CERT Monthly Activity Summary - May 2008
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif) May 2008
- US-CERT Quarterly
Trends and Analysis Report, Vol. 3, Issue 2
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
May 2008
- US-CERT Monthly Activity Summary - April 2008
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
April 2008
- US-CERT Monthly Activity Summary - March 2008
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
March 2008
- US-CERT Monthly Activity Summary - February 2008
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
February 2008
- US-CERT Quarterly
Trends and Analysis Report, Vol. 3, Issue 1
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
February 2008
- US-CERT Monthly Activity Summary - January 2008
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
January 2008
- US-CERT Monthly Activity Summary - December 2007
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
December 2007
- US-CERT Quarterly
Trends and Analysis Report, Vol. 2, Issue 4
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
December 2007
- US-CERT Monthly Activity Summary - November 2007
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
November 2007
- US-CERT Quarterly
Trends and Analysis Report, Vol. 2, Issue 3
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
September 2007
- US-CERT Quarterly
Trends and Analysis Report, Vol. 2, Issue 2
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
June 2007
- US-CERT
Quarterly Trends and Analysis Report, Vol. 2, Issue 1
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
March 2007
- US-CERT
Quarterly Trends and Analysis Report, Vol. 1, Issue 2
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
November 2006
- DHS Cyber
Preparedness eNewsletter, Vol. 2
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
October 2006
- US-CERT
Quarterly Trends and Analysis Report, Vol. 1, Issue 1
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
September 2006
- DHS Cyber
Preparedness eNewsletter
![pdf](https://webarchive.library.unt.edu/eot2008/20090114021156im_/https://www.us-cert.gov/images/pdf.gif)
June 2006
|