Information Warfare: How to Survive Cyber Attacks

Information Warfare: How to Survive Cyber AttacksAnother release in our popular “Computer World: Books for IT Leaders” series, Information Warfare explains the methodologies behind hacks and cyber attacks and provides defensive strategies and counter measures designed to help companies survive infrastructure attacks, military conflicts, competitive intelligence gathering, economic warfare, and corporate espionage. The authors are renowned industry experts–Michael Erbschloe has connections with the government and is known for his analysis of The Love Bug.





Price: $29.99

Click here to buy from Amazon

#CyberDoc: No Borders – No Boundaries: National Doctrine for the Cyber Era

Amazon Price: N/A (as of May 24, 2018 14:04 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Co-editors Timothy Sample and Michael Swetnam, along with a dozen thought leaders in the realm of cyber security, have assembled “#CyberDoc: No Borders – No Boundaries” as a preliminary framework for the development of a national doctrine for the cyber era.

Cyber technologies are an increasingly essential part of daily life for people around the world, and have fundamentally altered our lives in countless ways. The Internet is now as essential as any other “utility,” and is so seamlessly woven into the fabric of life that we rarely even think about it. At the same time, the vulnerabilities inherent in our reliance on the Internet are rarely discussed publicly in terms of our national security. Those responsible for protecting the capabilities upon which we all rely, as well as the security of the United States, have struggled to articulate and agree upon a doctrine to address these complex issues.
Continue reading “#CyberDoc: No Borders – No Boundaries: National Doctrine for the Cyber Era”

An Approach to Vulnerability Assessment for Navy Supervisory Control and Data Acquisition (SCADA) Systems

Amazon Price: N/A (as of September 25, 2016 00:33 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The unfortunate events of September 11, 2001 have caused a renewed effort to protect our Nation’s Critical Infrastructures. SCADA systems are relied upon in a large number of the sectors that make up the critical infrastructure and their importance was reinforced during the massive power outage that occurred in August 2003. Growing reliance upon the Internet has emphasized the vulnerability of SCADA system communications to cyber attack. Only through diligent and continuous vulnerability assessment and certification and accreditation of these systems will the United States be able to mitigate some of the vulnerabilities of these systems. A case study presented here has validated the need for continued focus in this area. This thesis consolidates some of the research that has already been done in the area of SCADA vulnerability assessment and applies it by developing an initial vulnerability assessment checklist for Department of the Navy systems. This checklist can and should also be used in the certification and accreditation of DoN SCADA systems. A promising technology was also discovered during this research that should be explored further to secure SCADA communications. This will be touched on briefly.

Tor and The Dark Net: Remain Anonymous and Evade NSA Spying

Rating: 
Amazon Price: $10.97 $10.97 (as of May 24, 2018 11:47 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Are You Tired of All The Spying and Lack of Privacy on The Internet? Keep Reading to Learn The Secrets to Staying Anonymous

So many people take their privacy on the internet for granted. Some may know and choose to ignore the fact, but every single thing you do online is being tracked and guess what? For better or for worse it is there forever. Whether you're simply browsing websites or you are accessing confidential information that you would rather no one know about there are ways to remain anonymous. Imagine this scenario, you create an account on a forum with your name and decide to do some political freedom fighting with it. Years down the road a future employer of yours does a simple google search of your name and finds everything you've ever done. They don't hire you.
Continue reading “Tor and The Dark Net: Remain Anonymous and Evade NSA Spying”