Cybersecurity Project
Western Illinois University
 
 
Welcome to Cybersecurity Education Project Home Page
 

Section 1: Introduction - Reference

Publications

  1. Stalking the wily hacker, Clifford Stoll, CACM, May 1988.
  2. Reflections on trusting trust, Ken Thompson, CACM, Aug 1984
  3. Crisis and aftermath, E. H. Spafford, CACM, June 1989.
  4. Social phishing, Tom N. Jagatic, et. al., CACM, Oct 2007.
  5. Identity theft, social security numbers, and the web, Hal Berghel, CACM, Feb 2000.
  6. Cybercrime 2.0: When the cloud turns dark, Niels Provos, et. al., CACM, Feb 2009.

Links

  1. Analysis of Sony breached passwords
  2. Transportation Security Administration security breach story
  3. SANS NewsBites
  4. Deploying New Tools to Stop the Hackers
  5. Seeing Promise and Peril in Digital Records
  6. How to 0wn Intenet in Your Spare Time
  7. Where The Hacker Can Find The Data?
  8. Computer Privacy and Security Essential Training
  9. phrack.org website on security exploits
  10. Computer Crime & Intellectual Property Section, United States Department of Justice
  11. National Vulnerability Database
  12. Security Focus -- Vulnerabilities

Top

 
 
 
 
Cybersecurity Education © 2008
Stipes 447I
Computer Science Department
Western Illinois University
1 University Circle
Macomb IL-61455
Western Illinois University Valid XHTML 1.0 Transitional Valid XHTML 1.0 Transitional National Science Foundation
 
 
 
 

This material is based upon work supported by the National Science Foundation under Grant No. 0736643. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.