Skip to Main Content
Libraries & Learning
University of Southern Maine
Subject Guides
Guides
CYB 551 & ITT 451: Cyber Laws, Policies, and Ethics
Cybersecurity Websites
Search this Guide
Search
CYB 551 & ITT 451: Cyber Laws, Policies, and Ethics
Getting Started
Key Resources
Searching Tips
Cybersecurity Websites
Cybersecurity Websites
Tech News Feed
Cybersecurity Websites
CISSP, FISMA, ISO
NIST
Security Certification & Roles
Change Management and Security Processes
CISO Skills
Introduction to Hacking
Access Control
Digital Forensics
Continuity of Operations
Security and Awareness Training
Operational Security
Network Security
Perimeter Security
Procurement Security
Security Compliance
Risk Management
Security Strategic Management
Security Lifecycle
CISA Tools
International System Security Certification Consortium
Federal Information Security Management Act of 2014. (2014). U.S.C. §§ 113-283
US Department of Commerce, National Institute of Standards and Technology (NIST). (n.d.). NIST Federal Information Security Management Act of 2002
Introduction to ISO 27002
NIST SP 800-53 Rev. 4 Security and Privacy Controls for Federal Information Systems and Organizations
NIST Cybersecurity Framework
NIST Identify
CISSP CBK
Security Process Map
The 20 Coolest Jobs in Information
An Introduction to the DHS EBK: Competency and Functional Framework for IT Security Workforce Development
Role Mapping – A Critical Intersection on the Road to ERP Implementation
The Security-Compliance Divide That Can Threaten Your Business
Enhance Security Compliance & Policy
Creating a monthly Information Security Scorecard for CIO and CFO
How Lock Picking Works
Bell-Lapadula Model
Role-based access control
Context-based access control model for HIPPA Privacy and Security Compliance
A Survey of Access Control Models
Best Practices in Digital Evidence Collection
Integrating digital forensics with eDiscovery
Recovery Planner
National Cybersecurity Awareness Month
DHS: Cybersecurity Resources
Current Operational Security Practices in Internet Service Provider Environments
Operational Security
Network Security and Management
OpenNMS Project
Segmenting Your Network
CISA Free Cybersecurity Services and Tools for Network Defenders
Welcome to Las Vegas - Home of the technology superpower you've never heard of
I Came, Eyesore, I Conquered
Supply Chain Security Requirement
PCI SSC Data Security Standards Overview
Health Information Privacy
Risk Management Magazine
Security Risk Management Guide
OCTAVE
Information Security Strategic Plan Template
ISSECO® - International Secure Software Engineering Council
Secure Software Development and Code Analysis Tools
Fundamental Practices for Secure Software Development
CISA Free Cybersecurity Services and Tools for Network Defenders
<<
Previous:
Searching Tips
Next:
Tech News Feed >>