top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cybersecurity : an examination of the communications supply chain : hearing before the Subcommittee on Communications and Technology of the Committee on Energy and Commerce, House of Representatives, one Hundred Thirteenth Congress, first session, May 21, 2013
Cybersecurity : an examination of the communications supply chain : hearing before the Subcommittee on Communications and Technology of the Committee on Energy and Commerce, House of Representatives, one Hundred Thirteenth Congress, first session, May 21, 2013
Pubbl/distr/stampa Washington : , : U.S. Government Printing Office, , 2014
Descrizione fisica 1 online resource (v, 160 pages) : illustrations
Soggetto topico Telecommunication - Equipment and supplies - Government policy - United States
Telecommunication systems - Security measures - United States
Computer networks - Security measures - United States
Computer networks - Security measures
Telecommunication - Equipment and supplies - Government policy
Telecommunication systems - Security measures
Soggetto genere / forma Legislative hearings.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Cybersecurity
Record Nr. UNINA-9910705327303321
Washington : , : U.S. Government Printing Office, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity : the pivotal role of communications networks : hearing before the Subcommittee on Communications and Technology of the Committee on Energy and Commerce, House of Representatives, One Hundred Twelfth Congress, second session, March 7, 2012
Cybersecurity : the pivotal role of communications networks : hearing before the Subcommittee on Communications and Technology of the Committee on Energy and Commerce, House of Representatives, One Hundred Twelfth Congress, second session, March 7, 2012
Pubbl/distr/stampa Washington : , : U.S. Government Printing Office, , 2013
Descrizione fisica 1 online resource (iii, 120 pages) : illustration
Soggetto topico Computer networks - Security measures - United States
Internet service providers - Security measures - United States
Computer crimes - United States - Prevention
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Cybersecurity
Record Nr. UNINA-9910704636303321
Washington : , : U.S. Government Printing Office, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity [[electronic resource] ] : an overview of risks to critical infrastructure : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Twelfth Congress, first session, July 26, 2011
Cybersecurity [[electronic resource] ] : an overview of risks to critical infrastructure : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Twelfth Congress, first session, July 26, 2011
Pubbl/distr/stampa Washington : , : U.S. G.P.O., , 2012
Descrizione fisica 1 online resource (iii, 77 pages)
Soggetto topico Computer networks - Security measures - United States
Infrastructure (Economics) - Security measures - United States
Cyberterrorism - United States - Prevention
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Cybersecurity
Record Nr. UNINA-9910701724603321
Washington : , : U.S. G.P.O., , 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity [[electronic resource] ] : network threats and policy challenges : hearing before the Subcommittee on Communications, Technology, and the Internet of the Committee on Energy and Commerce, House of Representatives, One Hundred Eleventh Congress, first session, May 1, 2009
Cybersecurity [[electronic resource] ] : network threats and policy challenges : hearing before the Subcommittee on Communications, Technology, and the Internet of the Committee on Energy and Commerce, House of Representatives, One Hundred Eleventh Congress, first session, May 1, 2009
Pubbl/distr/stampa Washington : , : U.S. G.P.O., , 2012
Descrizione fisica 1 online resource (v, 69 pages)
Soggetto topico Computer networks - Security measures - United States
Cyberinfrastructure - Security measures - United States
Computer crimes - United States - Prevention
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Cybersecurity
Record Nr. UNINA-9910701996203321
Washington : , : U.S. G.P.O., , 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity [[electronic resource] ] : innovative solutions to challenging problems : hearing before the Subcommittee on Intellectual Property, Competition, and the Internet of the Committee on the Judiciary, House of Representatives, One Hundred Twelfth Congress, first session, May 25, 2011
Cybersecurity [[electronic resource] ] : innovative solutions to challenging problems : hearing before the Subcommittee on Intellectual Property, Competition, and the Internet of the Committee on the Judiciary, House of Representatives, One Hundred Twelfth Congress, first session, May 25, 2011
Pubbl/distr/stampa Washington : , : U.S. G.P.O., , 2011
Descrizione fisica 1 online resource (iii, 88 pages)
Soggetto topico Computer networks - Security measures - United States
Cyberterrorism - Prevention - Government policy - United States
Internet - Security measures - Government policy - United States
Computer crimes - United States - Prevention
Internet - Access control - Government policy - United States
Public-private sector cooperation - United States
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Cybersecurity
Record Nr. UNINA-9910700723803321
Washington : , : U.S. G.P.O., , 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity [[electronic resource] ] : next steps to protect our critical infrastructure : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, second session, February 23, 2010
Cybersecurity [[electronic resource] ] : next steps to protect our critical infrastructure : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, second session, February 23, 2010
Pubbl/distr/stampa Washington : , : U.S. G.P.O., , 2010
Descrizione fisica 1 online resource (iii, 79 pages)
Collana S. hrg.
Soggetto topico Computer networks - Security measures - United States
Computer security - United States
Cyberterrorism - United States - Prevention
National security - United States
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Cybersecurity
Record Nr. UNINA-9910703061403321
Washington : , : U.S. G.P.O., , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity [[electronic resource] ] : assessing our vulnerabilities and developing an effective response : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, first session, March 19, 2009
Cybersecurity [[electronic resource] ] : assessing our vulnerabilities and developing an effective response : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, first session, March 19, 2009
Pubbl/distr/stampa Washington : , : U.S. G.P.O., , 2009
Descrizione fisica 1 online resource (iii, 61 pages) : illustrations
Collana S. hrg.
Soggetto topico Computer security - United States
Computer networks - Security measures - United States
Cyberterrorism - United States - Prevention
Internet - Security measures - United States
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Cybersecurity
Record Nr. UNINA-9910702813303321
Washington : , : U.S. G.P.O., , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity : getting it right : hearing of the Subcommittee on Cybersecurity, Science, and Research and Development before the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, first session, July 22, 2003
Cybersecurity : getting it right : hearing of the Subcommittee on Cybersecurity, Science, and Research and Development before the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, first session, July 22, 2003
Soggetto topico Computer security - United States
Computer networks - Security measures - United States
National security - United States
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Cybersecurity
Record Nr. UNINA-9910689850203321
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity and Infrastructure Security Agency Act of 2017 : report (to accompany H.R. 3359) (including cost estimate of the Congressional Budget Office)
Cybersecurity and Infrastructure Security Agency Act of 2017 : report (to accompany H.R. 3359) (including cost estimate of the Congressional Budget Office)
Pubbl/distr/stampa [Washington, D.C.] : , : [U.S. Government Publishing Office], , 2017-
Descrizione fisica 1 online resource (volumes)
Collana Report / 115th Congress, 1st session, House of Representatives
Soggetto topico Cyberinfrastructure - Security measures - United States
Computer networks - Security measures - United States
Cyberterrorism - United States - Prevention
Administrative agencies - United States
Administrative agencies
Administrative agencies - Reorganization
Computer networks - Security measures
Cyberterrorism - Prevention
Soggetto genere / forma Legislative materials.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Cybersecurity and Infrastructure Security Agency Act of 2017
Record Nr. UNINA-9910706511003321
[Washington, D.C.] : , : [U.S. Government Publishing Office], , 2017-
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity for the home and office : the lawyer's guide to taking charge of your own information security / / John Bandler
Cybersecurity for the home and office : the lawyer's guide to taking charge of your own information security / / John Bandler
Autore Bandler John
Pubbl/distr/stampa Chicago, Illinois : , : ABA, Section of Science & Technology Law, , [2017]
Descrizione fisica 1 online resource (xxiv, 392 pages) : illustrations
Disciplina 005.8024/34
Soggetto topico Computer security - Law and legislation - United States
Computer networks - Security measures - United States
Law offices - United States
Data protection - Law and legislation - United States
ISBN 1-63425-908-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Title Page -- Copyright -- Dedication -- Contents -- About the Author -- Acknowledgments -- Foreword -- CHAPTER 1 The Need for Cybersecurity -- Why This Book? -- What You Should Do Right Now -- How This Book Is Organized -- You Can Improve Your Own Cybersecurity -- CHAPTER 2 The Black Market for Your Data: The Cybercrime Economy -- A. Introduction -- B. It Is a Big Business -- C. It Is International -- D. Digital Currency -- E. Payment Card Fraud: An Example of the Cybercrime Economy -- F. Other Cybercrime and Identity Theft Schemes -- 1. Financial Account Takeover -- 2. New Financial Account Opening -- 3. Infected Computers -- 4. Phishing, Spam, and Internet Account Takeover -- 5. Other Ways to Obtain Passwords -- 6. E-mail Account Compromise (Hack) -- 7. Ransomware -- 8. Scareware and Technical Support Scams -- G. Government and Law Enforcement Response -- CHAPTER 3 Advertising: Another Market for Your Data -- A. Introduction -- B. Corporate Collection and Use of Your Information and Data -- C. What (or Who) Is the Product? -- D. Privacy Policies and the Consumer -- E. Corporate Data Storage -- F. Conclusion -- CHAPTER 4 Basic Information Security Principles -- A. Introduction -- B. Physical Security -- 1. Theft and Damage -- 2. Controlling Access to Your Devices at Home -- C. Confidentiality -- 1. Authentication -- 2. Encryption -- D. Availability -- 1. "If It Ain't Broke, Don't Fix It." But Maybe It Is Broken After All? -- 2. Availability, Authentication, and Confidentiality -- 3. Availability and Ransomware and Other Malicious Destruction -- 4. Availability and Backup -- 5. Business Continuity and Disaster Recovery Planning -- E. Integrity -- F. The Principle of "Least Privilege" and "Need to Know" -- 1. Data Access -- 2. Administrator Rights and Accounts -- G. Information Classification -- H. Conclusion.
CHAPTER 5 Basic Computer Principles -- A. Introduction -- B. The Evolution of Computing -- 1. Storing Information -- 2. Processing Information -- C. Computer Hardware -- 1. Case -- 2. Power Supply -- 3. Display -- 4. Ports: USB, Parallel, Serial, VGA, DVI, HDMI, DP -- 5. Input Devices (Keyboard, Mouse, Microphone, Camera, and More) -- 6. Network Interface Controller -- 7. Processor (Central Processing Unit, Microprocessor) -- 8. Random Access Memory -- 9. Motherboard (System Board) -- 10. Internal Data Storage -- 11. External Data Storage -- 12. External Devices Such as Scanners and Printers -- D. Programs That Run on Your Computer: BIOS, Operating System, Applications -- 1. BIOS -- 2. Operating System -- 3. File System -- 4. Applications (Software) -- 5. Virtual Ports -- E. From Desktop to Miniature: Laptop, Notebook, Tablet, Smartphone, Smartwatch, IoT -- F. Computers on Steroids: The Cloud and Data Centers -- G. Encryption of Data at Rest -- H. Conclusion -- CHAPTER 6 Basic Networking and the Internet -- A. Introduction -- B. Network Interface Controller -- C. Internet -- 1. Dial-up -- 2. Cable Internet (Broadband) -- 3. Phone Company Internet (DSL, FiOS) -- 4. Cellular Company Internet -- 5. Satellite Internet -- D. Modem -- E. Router -- F. Internet Communication 101 -- 1. IP Addresses on the Internet -- 2. IP Addresses on Your Local Network: Network Address Translation -- 3. Ports: Virtual Router Ports and Computer Ports -- 4. TCP/UDP Internet Protocols (Language) -- 5. Network Layers -- G. Wired Networking -- H. Wireless Networking -- I. Encryption in Transit -- J. Conclusion -- CHAPTER 7 Start Securing Yourself -- A. Introduction -- B. Set Your Cybersecurity Dial -- C. Turning Up Your Security Dial Is an Investment -- D. There Is No Perfect Product or Solution -- E. Let's Get Started (If You Haven't Already).
1. Put a Password on All of Your Computing Devices -- 2. Enable the "Auto Lock" Feature -- 3. Run an Anti-Malware Scan on Your Laptop and Desktop -- 4. Disconnect from the Internet When You Don't Need It -- 5. Use Complex and Unique Passwords -- 6. Enable "Two-Step" Login -- 7. Ensure That Your Home Wi-Fi Network Is Password Protected -- F. Conclusion -- CHAPTER 8 Secure Your Devices -- A. Introduction -- B. Mentally Assess Your Devices -- C. Getting Started -- D. Device Inventory (Scavenger Hunt) -- 1. Device Description -- 2. Ownership and Expectation of Privacy -- E. Access: Physical Control -- F. Access: Electronic (Technical) -- 1. Device Password Complexity -- 2. Auto Lock Feature and Affirmatively Locking Your Device -- G. User Accounts: Usage by Whom and for What Purposes? -- 1. Administrator Accounts vs. User Accounts -- 2. Segregation of User Accounts -- H. Operating System -- I. Applications (Software) -- J. Data Stored on Device -- K. Data the Device Can Access (Cloud Data) -- L. Anti-Malware -- M. Internet Access -- N. Firewall -- O. Decommissioning Your Device -- 1. Basic Decommissioning Steps -- P. Conclusion -- CHAPTER 9 Secure Your Data -- A. Introduction -- B. Mentally Assess Your Data and What It Means to You -- 1. Assess Your Own Skills and Memory -- 2. Assess by Data Type -- 3. Assess by Data Importance and Risk -- 4. Assess by Data Storage Location and Provider -- 5. Assessment Wrap-Up -- C. Getting Started -- D. Secure Your Devices (Encore) -- E. Back Up Your Data -- 1. Manually Back Up Data to an External Hard Drive -- 2. Make Incremental Backups of Your Most Important Documents -- 3. Manually Back Up Data from Your Cloud Accounts to a Local Device or External Hard Drive -- 4. Backup Using Your Operating System's Native Backup Application -- 5. Automatic Backup vs. Manual Backup.
F. Secure Your Cloud Data and Internet Accounts (and Back Them Up) -- 1. Secure Your Important Online Accounts -- 2. Secure Your "Unimportant Accounts" as Best You Can -- G. Consider Encryption to Secure Data on Your Local Device -- 1. To Encrypt or Not to Encrypt? That Is the Question -- 2. Encryption by the Application -- 3. File and Folder Encryption by the Operating System -- 4. Full Disk Encryption -- 5. Encryption Summary -- H. Organize Your Data-Your Files and Folders -- 1. Basic File Organization Concepts -- 2. Storage Location -- I. Conclusion -- CHAPTER 10 Secure Your Network and Internet Use -- A. Introduction -- B. Mentally Assess Your Home Network -- C. Identify Parts of Your Home Network -- D. Internet Connection -- E. Modem -- F. Router and Wi-Fi -- 1. Learn About Basic Wi-Fi Routing -- 2. Log In to Your Router Administration Portal -- 3. Secure Your Router Administration Username and Password -- 4. Update Router Firmware -- 5. Secure the Wi-Fi Network Password and Ensure the Network Is Encrypted -- 6. Evaluate Your Wi-Fi Network Name -- 7. Disable Wi-Fi Protected Setup -- 8. Disable Remote Access Features You Don't Need -- 9. Enable Your Router's Firewall (If Available) -- 10. Disable Universal Plug and Play If You Don't Need It -- 11. Run Your Router's Security Self-Assessment Function (If Available) -- 12. Enable a Guest Network on Your Router (If Available) -- 13. Check Your Router's Physical Security -- 14. Learn About Additional Router and Wi-Fi Security Features -- 15. Wi-Fi Router Conclusion -- G. Software Firewalls (Encore for Your Laptops and Desktops) -- H. Review Device Software That Accesses the Internet (Encore for What Is Phoning Home) -- I. How Your Data Is Transmitted -- J. Equipment on the Network -- 1. Printers, Scanners, Fax Machines, All-in-Ones, and More -- 2. Network Attached Storage.
K. The "Internet of Things" and Smart Homes -- L. Reduce Your Attack Surface: Disconnect When Not Needed -- M. More About Networks for the Very Curious -- 1. Windows Task Manager -- 2. Windows Resource Monitor -- 3. Windows Firewall -- 4. Windows Firewall with Advanced Security -- 5. Windows Commands Regarding Network Activity -- 6. Mac Applications and Commands Regarding Network Activity -- 7. Install a Free Software Firewall -- N. Conclusion -- CHAPTER 11 Secure Your Family, Children, and Seniors -- A. Introduction -- B. Children -- 1. Assessment -- 2. Your Parental "Privacy Policy" -- 3. Educating Your Child to Make Good Decisions -- 4. Reviewing Your Child's Devices and Computer Usage -- 5. Sample Guidelines or Rules of Conduct -- 6. Reviewing the Data That Is Posted About Your Children -- C. Seniors -- D. Conclusion -- CHAPTER 12 Secure Yourself When You Travel -- A. Introduction -- B. Devices and Travel -- 1. Preventing Loss or Theft -- 2. Using Someone Elses Device -- C. Internet Access and Travel -- D. Data and Travel -- 1. Data You Bring (Data at Rest) -- 2. Data You Access (Data in Transit) -- E. Miscellaneous Anti-Fraud When You Travel -- F. Special Considerations When Traveling to Certain Countries -- G. Conclusion -- CHAPTER 13 Secure the Work Office -- A. Introduction -- B. The Workplace Mental Assessment -- C. Physically Secure Your Office -- 1. Visitor Entry -- 2. Locks and Doors -- 3. Alarm Systems and Video Surveillance -- 4. The "Plain View" Doctrine in Your Office -- D. Securing Your Employees and Coworkers -- 1. Screening and the Insider Threat -- 2. Training -- 3. Shadow IT in the Office -- 4. Acceptable Use of Workplace Computers -- E. Secure the Devices in Your Office -- F. Secure the Data in Your Office -- 1. Network Storage Devices in Your Office -- 2. Documents and Data in the Cloud -- 3. E-mail -- 4. Data at Rest.
5. Data in Transit.
Record Nr. UNINA-9910796734103321
Bandler John  
Chicago, Illinois : , : ABA, Section of Science & Technology Law, , [2017]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui

Data di pubblicazione

Altro...