Downloads

Please feel free to download some of these very helpful cyber security related files. Info Security Pro would love your support with a small donation. Information Security Pro is recognized by the Internal Revenue Service (“IRS”) as a tax-exempt organization pursuant to §501 (c)(3) of the IRS. All donations are fully deductible to the extent allowed by applicable law. Please consult your tax adviser for additional information.

                                                                                                                                
Previously published intro security book[sdm_download id=”7159″ fancy=”0”]
                                                                                                                                
Security Awareness Brochure Template in MS Publisher format[sdm_download id=”7161″ fancy=”0”] [sdm_download_counter id=”7161″]
                                                                                                                                
A generic cost-benefit analysis showing what the business will achieve by running a best practice information security awareness program
                                                                                                                                
Systems analysis framework (also particulary useful for IT security analysis)
                                                                                                                                
budget poster – Don’t forward chaing letters
                                                                                                                                
Kaspersky Lab has developed support for this technology as a component of Kaspersky Anti-Virus for Windows Workstation and Kaspersky Administration Kit. Integrating Cisco’s NAC with applications such as antivirus solutions, firewalls and intrusion detection systems lowers the risk of malicious programs spreading on a corporate network.
                                                                                                                                
Experience with MARS log correlator
                                                                                                                                
Training Powerpoint Presentation based on CISSP AIO
                                                                                                                                
CISSP Domain 2 : Access Control
                                                                                                                                 
 
Presentation introduces phishing, spear phishing, whaling, pharming, botnets, and bot herding. Topics include how to spot thes attacks as well as what we can do to avoid being successfully compromised. Presentation is intended to be delivered in live presentation mode due to slide transitions but could be adapted for print use. Originally delivered to a mostly non-technical audience in about 45 minutes.
                                                                                                                                 
 schemes for creating and remembering strong passwords
                                                                                                                                 
 Secure Configuration of Windows XP & Wireless
                                                                                                                                 
 Produced by (ISC)2. Print and hang up in your office.
                                                                                                                                 
 Created by (ISC)2, use this 125 x 125 Web banner (zip file) on your site to your support of Cyber Security Awareness Month.
                                                                                                                                 
 Fun puzzle for ages 8 and up.
                                                                                                                                 
 Fun wordsearch puzzle for ages 8 and up
                                                                                                                                 
 A short presentation on how data can be leaked, the impact of leaks and some tips on how to avoid them.
                                                                                                                                 
 Article on the new undergraduate major in computer forensics with a computer security bent.
                                                                                                                                 
 Overview of new undergraduate major in computer forensics with a computer security bent.
                                                                                                                                 
 Insiders can use freely available steganography applications to steal senstive information and conceal evidence of criminal activity.
                                                                                                                                 
Anti-piracy poster that connects pirated software with identity theft.
                                                                                                                                 
 Information security awareness video used for training faculty and staff at the University of Notre Dame
                                                                                                                                 
 FCC provides monthly bulletins to all users to keep them abreast of IT Security issues that may impact them.
                                                                                                                                 
 Skit to illustrate how software and hardware firewalls work
                                                                                                                                 
 Security Jeopardy
                                                                                                                                 
 A primer of how hackers profit from their exploits, used to train the FBI
                                                                                                                                 
 10 Steps to Secure a Home Wireless Network
                                                                                                                                 
 a small document with details on how to avoid phishing scams based on my personal and professional experience
                                                                                                                                 

An article to help protect people protect their identities in Windows
                                                                                                                                 
 Guidance for consumers on avoiding identity theft, following BBC1 documentary bradcast 31 January

Leave a Reply

Information Assurance & Cyber Security Research and Education, a 501(c)(3)