New 2011 Cybersecurity Report Announcement - Cyber Threats to National Security
http://www.caci.com/announcement/asym5.shtml
Bellevue University, Bellevue, Nebraska
Here are some more good and free resources on Information Security topics:
Cybersecurity Plan for the State of Michigan
http://www.michigan.gov/documents/itstrategicplan/I_Cyber_Security_Web_234559_7.pdf
Security in a Windows Infrastructure
http://www.microsoft.com/brasil/security/content/resources/resources/SOG_download.pdf
Security and Privacy Made Simpler
http://www.bbb.org/us/storage/16/documents/SecurityPrivacyMadeSimpler.pdf
Telecommunication Security
http://www.iso.org/iso/telecommunication_security_h_bertine_gsc.pdf
Security Policy
http://security.arizona.edu/files/ISS701.pdf
Lifecycle of Document Security
http://www.adobe.com/security/pdfs/acrobat_livecycle_security_wp.pdf
Weather Forecast: Partly Cloudy with a Chance of Certifications
I think that we will look back at 2011 as the point when Cloud Computing got real and finally took off. And with all the government focus to control IT budgets and move IT operations and applications into secure Cloud Data Centers.
Be sure and read the IEEE Computer Magazine from August 2011. They are already publishing scholarly articles about the best uses for Cloud applications on Mobile Devices and using mathematical principles to model how to determine the best configuration for your Cloud Planning. Translation: This represents a big departure from the previous crop of Cloud Articles that just addressed security in the Cloud. In other words, people assume “it's real; it's here; so now what's the best way to use it?"
The Windows Live Public Skydrive link below has some important resources to get ramped up on knowledge about Cloud Computing: https://skydrive.live.com/redir.aspx?cid=bf9ea3001ee4c8dc&resid=BF9EA3001EE4C8DC!160
I am also in a Cloud Computing Pathway certification program that is online, self-paced and self-study. I passed my Cloud Computing Foundation certification exam on June 28, 2011. Just four more courses and exams and I will earn the Cloud Computing Expert Certification. More about the program at this link: http://store.theartofservice.com/all-products/cloud-computing-pathway-comple-elearning-bundle.html
By the way, I have known all this Cloud Stuff was coming for the last 6 years, when Bill Gates and Ray Ozzie wrote their famous "Cloud Memos" as publicly released documents, to the employees at Microsoft in October 2005. You will find those memos on that skydrive link, which is of course, in the Microsoft Cloud: https://skydrive.live.com/redir.aspx?cid=bf9ea3001ee4c8dc&resid=BF9EA3001EE4C8DC!160
Also, many of you will remember that in 2008 I was the first Data Center Manager for Microsoft's Flagship Cloud Data Center - the Chicago Data Center, located in a suburb of Chicago. So I have been kind of a "Cloud Computing Advocate" for quite a while now.
This is an article I wrote about Cloud Computing at the end of 2008. Welcome to the Cloud (Again)!
This is my Cloud page.
See you in the Cloud, my friends!
Here are some good, free resources on Information Security topics:
Engineering Security
http://www.cs.auckland.ac.nz/~pgut001/pubs/book.pdf
COINTELPRO and the Subversion of Anonymous
Reengineering Security
http://classic.marshall.usc.edu/assets/036/8598.pdf
Computer Security Accidents that Might Have Led to Nuclear War
IT Security and Audit Policies
http://it.delhigovt.nic.in/doit/IT_Security_Audit_Policy.pdf
Social Networking Treatise
http://www.law.cornell.edu/socsec/spring01/readings/martin.pdf
Introduction to Network Analysis
http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/SecurityTactics/1597490733.pdf
PERL Scripting and Live Response
http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/SecurityTactics/159749173X.pdf
Dumpster Diving
http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/SecurityTactics/1597492159.pdf
Targeting Intellectual Property
http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/SecurityTactics/1597492558.pdf
Open Source Security
http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/OpenSourceSecurity/1597490741.pdf
Advanced Operators - Security Tactics
http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/SecurityTactics/1597491764.pdf
Introducing NMAP
http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/OpenSourceSecurity/1597492418.pdf
Vulnerability Assessment
http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/OpenSourceSecurity/1931836086.pdf
Trademarks and Domain Names
http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/ITManagement/9781597492560.pdf
Controls and Safeguards
http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/ITManagement/9781597492393.pdf
Business Continuity/Disaster Recovery Plan Development
http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/ITManagement/1597491721.pdf
Having Fun with Sysinternals
http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/ITManagement/1597490792.pdf
Creating an Attack Lab
http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/ITManagement/1597490113.pdf
Behind Cybercrime
http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/Cybercrime/1597490482.pdf
Incident Response - Live Forensics and Investigations
http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/Cybercrime/1597491330.pdf
Initial Triage and Live Response: Data Analysis
http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/Cybercrime/9781597492690.pdf
PDA, Blackberry, and iPod Forensics
http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/Certification/9781597491976.pdf
Handheld Forensics
http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/ITManagement/1597491381.pdf