Error
  • JFolder::create: Could not create directory
  • JFolder::create: Could not create directory
  • JFolder::create: Could not create directory

Security Awareness

This section provides links to articles on Cyber Security and Cyber Awareness.

Documents

Order by : Name | Date | Hits [ Ascendant ]

The Cyber War Era Began Long Ago The Cyber War Era Began Long Ago

hot!
Date added: 06/24/2012
Filesize: 2.23 MB

Issues such as Stuxnet, Flame and cyberwarfare are monopolizing the attention of security experts world wide.   You may have read that the "the cyberwar era" has begun.  What does it mean?

U.S. military strategist John Boyd states: War comprises acts of physical, biological, psychological, social, cultural and other destruction at all levels,...

Social Networks Part2: Have you been Infiltrated? Social Networks Part2: Have you been Infiltrated?

hot!
Date added: 08/26/2012
Filesize: 431.79 kB

The explosion of social networks and new user accounts in recent years is staggering.   There are now over 1,000 social networking sites on the Internet, with Facebook currently being the largest, with over 840 million user profiles.  To put this into context, that is equivalent to the combined populations of the USA and UK combined, making it the third largest country by population.  ...

Social Networks Part 1: Who exactly are you disclosing your life story to? Social Networks Part 1: Who exactly are you disclosing your life story to?

hot!
Date added: 08/19/2012
Filesize: 2.63 MB

Be Social” is the buzzword of recent years.  No matter whether we are at home, in the gym, at work, or elsewhere, we are haunted by the need to be part of something online.  We live alternative online lives, and we have dense networks of relationships that vary depending on the context (social, work, family, ...)....

Smart Phone Monitoring and Malware Smart Phone Monitoring and Malware

hot!
Date added: 07/29/2012
Filesize: 528.49 kB

Mobile phones were once the status symbols of high-flying business executives.  Today, mobile phones have nestled intimately into the fabric of our day to day lives.   We often forget how indispensable they are to us, or how much they reassure us...  that is until we can’t urgently contact a business colleague, or one of our children, instantly... 

Serious Safety and Security Problems in automotive and other cyber-physical systems Part 2 Serious Safety and Security Problems in automotive and other cyber-physical systems Part 2

hot!
Date added: 06/17/2012
Filesize: 2.14 MB

This is a two-part mini-series in which we look at the safety (and security) problems in real-time cyber-physical systems used around the world.

In last week’s article we explored the issue around today’s high-speed computers and why their inability to consistently meet software deadlines causes serious problems to automotive applications, industrial control systems, (nuclear) power generators and other computer systems that interact with the real world...

Serious Safety and Security Problems in automotive and other cyber-physical systems Part 1 Serious Safety and Security Problems in automotive and other cyber-physical systems Part 1

hot!
Date added: 06/10/2012
Filesize: 3.45 MB

This is a two-part mini-series in which we look at the safety (and security) problems in real-time cyber-physical systems used around the world.

Modern computer chips...  A marvel of human ingenuity.  Comprising literally many millions of tiny microscopic computing elements (transistors), carefully arranged in complex and intricate configurations, choreographed with unprecedented timing precision.

Phishing the Financial and Banking Seas Phishing the Financial and Banking Seas

hot!
Date added: 08/05/2012
Filesize: 1.31 MB

Every day the international SWIFT banking network processes financial transactions (relayed between banks) valued at literally trillions of dollars.   Today, most of the >1 billion personal computers connected to the Internet are now at least occasionally involved in e-banking, B2B transactions, and other forms of online e-commerce. 

With the introduction of mobile devices, social networks, and the arrival of new technologies such as Near Field Communications, the attack surface ...

PC Security Handbook 2nd Edition PC Security Handbook 2nd Edition

hot!
Date added: 12/29/2010
Filesize: 3.32 MB

Defensive Computing Techniques to HelpYou Avoid Malware and Data Loss

by Rich Robinson - Windows Guides — www.mintywhite.com

Malware...It's all about you... Malware...It's all about you...

hot!
Date added: 07/22/2012
Filesize: 3 MB

To quote the military strategist Carl von Clausewitz, “All war presupposes human weakness and seeks to exploit it.”  

Malicious software (malware) is software that is explicitly designed to exploit vulnerabilities in computing devices and human users to the malicious advantage of the malware author or malware user.  Malware comes in many forms, including...

Insider perspectives on the global cyber safety and security status Part 4 Insider perspectives on the global cyber safety and security status Part 4

hot!
Date added: 05/27/2012
Filesize: 2.19 MB

Cyber security, civil liberties, our common welfare and the stability of Nations.   How bad is the cyber security situation really?  If we have a serious security problem, how do we get ourselves out of this mess?   In particular, what can I do to improve my situation and protect those I care about?...

Insider perspectives on the global cyber safety and security status Part 3 Insider perspectives on the global cyber safety and security status Part 3

hot!
Date added: 05/20/2012
Filesize: 1.23 MB

Data-breaches, intellectual property loss and your money...  We have all heard the headlines about the social and economic implications of cyber crime, but how bad is the situation really?   If we have a serious security problem, how do we get ourselves out of this mess? ...

Insider perspectives on the global cyber safety and security status Part 2 Insider perspectives on the global cyber safety and security status Part 2

hot!
Date added: 05/13/2012
Filesize: 2.09 MB

Critical infrastructure protection, StuxNet, exploding computers, black-outs, collapsing banking systems, and cyber war!!!  

None of us have escaped the headlines warning of impending cyber doom, but this is just sensationalism, right?   How bad is the situation really?   If we have a serious security problem, how do we get ourselves out of this mess? 

Insider perspectives on the global cyber safety and security status Part 1 Insider perspectives on the global cyber safety and security status Part 1

hot!
Date added: 05/06/2012
Filesize: 1.61 MB

Today, there is a lot of interest in “Cyber warfare” and “Cyber threats”.   Week after week we are bombarded with news about massive security failures, one after the other.   For example according to the UTAH Department of Health, the sensitive personal information of more than 780,000 people was stolen from a Government Health Department...

Cyber Security During Large Sporting Events Cyber Security During Large Sporting Events

hot!
Date added: 07/15/2012
Filesize: 2.19 MB

The London 2012 Olympics will physically bring together 10,500 athletes, diplomats, politicians,
business leaders and millions of spectators from all around the world. Behind the scenes there is an immense effort underway to ensure the security and well-being of everyone participating, in any capacity, in this grand event. In this article we provide the reader with an inside-look into the ...

Are Your Business Operations Secure? Are Your Business Operations Secure?

hot!
Date added: 07/01/2012
Filesize: 3.99 MB

Today, the Chief Executive Officers (CEOs) of many businesses are becoming aware of the need to ensure their IT systems are secured to protect their organization, their customers, and their stakeholders.  According to Brian Snow, former Technical Director of the U.S. NSA’s Information Assurance Directorate (November 2011):

 Data-breaches and financial losses are now hurting every segment of the community, it’s a wake up call...

Page 1 of 2
GBC1 SLL-Logo_150  A Collaborative Project co founded by
The Gozo Business Chamber and
Synaptic Laboratories Ltd

Eco Gozo Logo

Eco-Gozo – a Better Gozo Action Plan 2010 – 2012
Project part-financed by the Government of Malta - Ministry for Gozo
www.eco-gozo.com

feedback
feedback
feedback