X hits on this document

PDF document

SRA111: Introduction to Security and Risk Analysis - page 14 / 15

63 views

0 shares

0 downloads

0 comments

14 / 15

  • Introduction to Security Risk Analysis & Security Risk Assessment (http://www.security-risk-analysis.com/introduction.htm)

(M4-11)

  • Security Scanning is not Risk Analysis (http://www.intranetjournal.com/articles/200207/pse_07_14_02a.html) (M4-12)/

Module 5: Information Warfare & IA

  • Manic Velocity, Footprinting: The Basics of Hacking, Hack in the Box. ()-1). http://www.hackinthebox.org/article.php?sid=5359

  • Tony Bradley, Introduction to Packet Sniffing. (M5-2). http://netsecurity.about.com/cs/hackertools/a/aa121403.htm

  • Tony Bradley, Introduction to Port Scanning. (M5-3). http://netsecurity.about.com/cs/hackertools/a/aa121303.htm

  • Joanne Cummings, From Intrusion Detection to Intrusion Prevention, Network World, 09/23/02. (M5-4).

http://www.networkworld.com/buzz/2002/intruder.html

  • Whatis.Com, Denial of Service. (M5-5). http://whatis.techtarget.com/definition/0,289893,sid9_gci213591,00.html

  • Denial of Service Attacks, CERT® Coordination Center. (M5-6). http://www.cert.org/tech_tips/denial_of_service.html

  • Wardriving, Wikipedia, the Free Encyclopedia. (M5-7). http://en.wikipedia.org/wiki/Wardriving

Module 6: Securing the Future

  • Cyber Security: A Crisis of Prioritization, President’s IT Advisory Committee, Feb. 2005. (M6-1) http://www.nitrd.gov/pitac/reports/20050301_cybersecurity/cybersecurity.pdf

  • Amitava Dutta and Kevin McCrohan, “Management’s Role in Information Security in a Cyber Economy,” California Management Review, Vol.45, No.1, Fall 2002, pp. 67-87. (M6-2)

  • Mark Lum, Offshore Outsourcing and Information Confidentiality, SANS Institute, April 2004. (M6-3). http://www.sans.org/rr/whitepapers/legal/1438.php

  • Vadalasetty, S.R., Security Concerns in Using Open Source Software for Enterprise Requirements, SANS Institute, October 2003. (M6-4). http://www.sans.org/rr/whitepapers/awareness/1305.php

  • Scott Byrum, The Impact of the Sarbanes Oxley Act on IT Security, SANS Institute, October 2003. (M6-5). http://www.sans.org/rr/whitepapers/casestudies/1344.php

Appendix B: Video List

  • Businessweek video library: http://feedroom.businessweek.com/

  • Information Assurance Video, NIATEC, Idaho State University. http://niatec.info/videos.htm

  • Security Awareness Program Contest. http://www.educause.edu/content.asp?page_id=7103&bhcp=1

  • Security on ZDNet: Video and Audio: http://zdnn.search.com/search?cat=230&int.1273=on&q=Security

  • ZDNet Video at the Whiteboard: http://news.zdnet.com/2036-2_22-5718923.html

14

Document info
Document views63
Page views64
Page last viewedMon Dec 05 13:21:20 UTC 2016
Pages15
Paragraphs335
Words2813

Comments