Updating search results...

Search Resources

15 Results

View
Selected filters:
  • computer-security
Defend Dissent
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Digital Suppression and Cryptographic Defense of Social Movements

Short Description:
Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material—from surveillance used against contemporary US protests to the African National Congress’s use of partially manual encryption in fighting apartheid in South Africa in the 80s. This book can be read linearly, or you can pick and choose what you would like to learn about. Each chapter is prefaced with what you should read first (for background) and concludes with what you might want to read next. También disponible en Español Data dashboard

Word Count: 67802

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Computer Science
Political Science
Social Science
Material Type:
Textbook
Provider:
Oregon State University
Author:
Glencora Borradaile
Date Added:
03/29/2021
FortiGate Firewall: Practical Guidance and Hands-On Labs
Unrestricted Use
CC BY
Rating
0.0 stars

Short Description:
This book step-by-step explains how to configure FortiGate Firewall in the network. Each chapter begins with a learning objective and step-by-step explanations in GNS3 to beginners on how to build different security scenarios from scratch.

Long Description:
© 2022 Hamid Talebi FortiGate Firewall: Practical Guidance and Hands-On Labs by Hamid Talebi is licensed under a CC BY 4.0 licence. Download for free from the B.C. Open Textbook Collection. Talebi, H. (2022). FortiGate Firewall: Practical Guidance and Hands-On Labs. BCCampus. https://pressbooks.bccampus.ca/fortigatefirewall

Visit BCcampus Open Education to learn about open education in British Columbia.

Word Count: 17064

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Provider:
BCcampus
Date Added:
06/01/2022
Information Security
Unrestricted Use
CC BY
Rating
0.0 stars

This course focuses on the fundamentals of information security that are used in protecting both the information present in computer storage as well as information traveling over computer networks. Upon successful completion of this course, the student will be able to: explain the challenges and scope of information security; explain such basic security concepts as confidentiality, integrity, and availability, which are used frequently in the field of information security; explain the importance of cryptographic algorithms used in information security in the context of the overall information technology (IT) industry; identify and explain symmetric algorithms for encryption-based security of information; identify and explain public key-based asymmetric algorithms for encryption-based security of information; describe the access control mechanism used for user authentication and authorization; describe Secure Sockets Layer (SSL) as a common solution enabling security of many applications, including all Internet-based commerce; describe securing Internet Protocol (IP) communications by using Internet Protocol Security (IPSec); explain the importance of physical security and discuss ways to improve physical security of an enterprise; explain the use of such security tools as firewalls and intrusion prevention systems; explain malicious software issues, such as those brought forth by software-based viruses and worms; explain common software security issues, such as buffer overflow; describe the basic process of risk assessment in the context of overall IT security management. (Computer Science 406)

Subject:
Applied Science
Computer Science
Material Type:
Full Course
Provider:
The Saylor Foundation
Date Added:
11/16/2011
Information Security (06:01): Introduction
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Simply put, this is one of my most favorite topics when it comes to talking about computers. In this video we layout the order of this lesson, as well as give basic definitions of:
•Machine-Level Security
•Network Security
•Internet Security
•Social Engineering

Subject:
Applied Science
Computer Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Security (06:02): Physical Security
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

The act of physically protecting the computers. The first rule of any type of computer safety is restricting physical access to it. If a bad guy can get their hands on the computer assume they will be able to gain access to all data contained within.

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Security (06:03): Authentication
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our third video in our Information Security series (part of the Introduction to Computer course) focuses on Authentication. Authentication is basically proving you are who you say you are

There are three forms of authentication
•Something you know
•Something you have
•Something about you

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Security (06:04): Protecting Your Data
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

This video focuses on date protection. We look at how to migrate your data from old to new devices, the importance of data backup AND how to make sure no one can steal your data off a discarded hard drive.

Data is always priceless

Three topics:
-Data migration
-Data backup
-Data disposal

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Date Added:
09/26/2014
Information Security (06:05): Network Security
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Steps taken to protect computer networks. We cover permissions, user policies (especially how they can get you fired), expectations of privacy, and wireless security.

Links from Video:
-The System Administrator Song http://youtu.be/OpGN3oT1thA

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Security (06:06): Internet Security
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our 6 video in the Information Security series (part of Introduction to Computers). We introduce students to the concept of Internet Security.

Specifically we look at defining the players: hackers, crackers, and script kiddies. We also look at steps the home user should take to harden the computer: keep their computer updates, run anti-malware software, and have a firewall.

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Security (06:07): Malware
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Video 7 of our information security series (part of Introduction to Computers) we examine malware. Malware is a blanket term that means malicious code, it includes things like viruses, Trojans, worms and spyware.

Links from Video:
-AVG by Grisoft: http://free.avg.com/us-en/homepage
-AVAST: http://www.avast.com
-ClamWin: http://www.clamwin.com/
-Microsoft Security Essentials: http://windows.microsoft.com/en-us/windows/security-essentials-download

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Security (06:08): Social Engineering
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our last video in the Information Security lesson covers my favorite topic, social engineering. In this video we look at: Dumpster Diving, Shoulder Surfing, Tailgating, and Spam & Phishing.

I also tell the story about how I used tailgating to get access to a classroom at the FBI Academy.

Links from Video:
•Internet Storm Center: https://isc.sans.edu/
•SNORT: https://www.snort.org/
•Security Now: http://twit.tv/sn
•Internet Crime Complaint Center: http://www.ic3.gov/default.aspx
•Hak5: http://hak5.org/
•Facecrooks (facebook.com/Facecrooks)

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Network and Computer Security
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

6.857 Network and Computer Security is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the Computer Systems and Architecture Engineering concentration.

Subject:
Applied Science
Computer Science
Engineering
Political Science
Social Science
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Rivest, Ronald
Date Added:
02/01/2014
Palo Alto Firewall: Practical Guidance and Hands-On Labs
Unrestricted Use
CC BY
Rating
0.0 stars

Short Description:
This book step-by-step explains how to configure Palo Alto Firewall in the network. Each chapter begins with a learning objective and step-by-step explanations in GNS3 to beginners on how to build different security scenarios from scratch.

Long Description:
© 2022 Hamid Talebi Palo Alto Firewall: Practical Guidance and Hands-On Labs by Hamid Talebi is licensed under a CC BY 4.0 licence. Download for free from the B.C. Open Textbook Collection. Talebi, H. Cawley,X. (2022). Palo Alto Firewall: Practical Guidance and Hands-On Labs. BCCampus. https://pressbooks.bccampus.ca/paloalto/

Visit BCcampus Open Education to learn about open education in British Columbia.

Word Count: 12420

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Provider:
BCcampus
Date Added:
01/26/2024
Toward Understanding the Role of Web 2.0 Technology in Self-Directed Learning and Job Performance in a Single Organizational Setting: A Qualitative Case Study, Online Submission, 2016-May
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

This single instrumental qualitative case study explores and thickly describes job performance outcomes based upon the manner in which self-directed learning activities of a purposefully selected sample of 3 construction managers are conducted, mediated by the use of Web 2.0 technology. The data collected revealed that construction managers are concerned with the performance expected of them, in addition to how well they perform their work-related activities (orientation to learning), indicating that organizations should provide guidelines on the use and expected outcomes of self-directed learning in addition to providing the tools, resources, and time (environmental factors) to match performance needs; construction managers feel that work-related activities expected of them, how well the work-related activities are performed, and consequences for poor performance at work are determining factors in selecting Web 2.0 technologies; while construction managers understand the need for rules restricting the use of Web 2.0 technologies in performing their jobs, they feel these rules do hinder their performance because access to specific information they need to answer a question, solve a problem, or research to learn something new is sometimes restricted; and successful performance outcomes are determined by compliance to expected performance behaviors of others, such as answering a question or solving a problem an architect or superintendent have presented, as well as expectations construction managers have set for themselves. The following are appended: (1) Call for Participation--Web 2.0 Technology Project; (2) Informed Consent Letter and Form/Template; (3) Semistructured Interview Guide; and (4) Permission to Conduct Research Study.

Subject:
Business and Communication
Career and Technical Education
Education
Electronic Technology
Management
Material Type:
Case Study
Author:
Caruso Shirley J
Date Added:
02/22/2022
Trust Systems
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

A Journey Through Trust, its Applications, Calculations and Limitations

Short Description:
This is a short book, written partly as a personal reflection and partly as a scientific text. It is aimed at undergraduate to graduate classes in Trust Systems, with applicability to other information security domains, as well as general audiences interested in knowing more about how trust and security work in computational systems without getting overly technical. It covers trust from basics through to introducing formalizations of trust, including journeys through blockchains and zero trust systems.

Word Count: 80673

ISBN: 978-1-7779195-0-4

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Arts and Humanities
Computer Science
Philosophy
Social Science
Material Type:
Textbook
Provider:
Ontario Tech University
Author:
stephenmarsh
Date Added:
10/21/2021