|
 |
 |
Welcome to Cybersecurity Education Project Home Page |
|
Publications
- Stalking the wily hacker, Clifford Stoll, CACM, May 1988.
- Reflections on trusting trust, Ken Thompson, CACM, Aug 1984
- Crisis and aftermath, E. H. Spafford, CACM, June 1989.
- Social phishing, Tom N. Jagatic, et. al., CACM, Oct 2007.
- Identity theft, social security numbers, and the web, Hal Berghel, CACM, Feb 2000.
- Cybercrime 2.0: When the cloud turns dark, Niels Provos,
et. al., CACM, Feb 2009.
Links
- Analysis of Sony breached passwords
- Transportation Security Administration security breach story
- SANS NewsBites
- Deploying New Tools to Stop the Hackers
- Seeing Promise and Peril in Digital Records
- How to 0wn Intenet in Your Spare Time
- Where The Hacker Can Find The Data?
- Computer Privacy and Security Essential Training
- phrack.org website on security exploits
- Computer Crime & Intellectual Property Section, United States Department of Justice
- National Vulnerability Database
- Security Focus -- Vulnerabilities
Top
|
|
This material is based upon work supported by the National Science Foundation under Grant No. 0736643. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.
|