Please feel free to download some of these very helpful cyber security related files. Info Security Pro would love your support with a small donation. Information Security Pro is recognized by the Internal Revenue Service (“IRS”) as a tax-exempt organization pursuant to §501 (c)(3) of the IRS. All donations are fully deductible to the extent allowed by applicable law. Please consult your tax adviser for additional information.
Previously published intro security book[sdm_download id=”7159″ fancy=”0”]
Security Awareness Brochure Template in MS Publisher format[sdm_download id=”7161″ fancy=”0”] [sdm_download_counter id=”7161″]
Kaspersky Lab has developed support for this technology as a component of Kaspersky Anti-Virus for Windows Workstation and Kaspersky Administration Kit. Integrating Cisco’s NAC with applications such as antivirus solutions, firewalls and intrusion detection systems lowers the risk of malicious programs spreading on a corporate network.[wpdm_file id=6]
Experience with MARS log correlator[wpdm_file id=7]
Training Powerpoint Presentation based on CISSP AIO[wpdm_file id=8]
CISSP Domain 2 : Access Control[wpdm_file id=9]
Presentation introduces phishing, spear phishing, whaling, pharming, botnets, and bot herding. Topics include how to spot thes attacks as well as what we can do to avoid being successfully compromised. Presentation is intended to be delivered in live presentation mode due to slide transitions but could be adapted for print use. Originally delivered to a mostly non-technical audience in about 45 minutes.
[wpdm_file id=11] schemes for creating and remembering strong passwords
[wpdm_file id=12] Secure Configuration of Windows XP & Wireless
[wpdm_file id=13] Produced by (ISC)2. Print and hang up in your office.
[wpdm_file id=14] Created by (ISC)2, use this 125 x 125 Web banner (zip file) on your site to your support of Cyber Security Awareness Month.
[wpdm_file id=15] Fun puzzle for ages 8 and up.
[wpdm_file id=16] Fun wordsearch puzzle for ages 8 and up
[wpdm_file id=17] A short presentation on how data can be leaked, the impact of leaks and some tips on how to avoid them.
[wpdm_file id=18] Article on the new undergraduate major in computer forensics with a computer security bent.
[wpdm_file id=19] Overview of new undergraduate major in computer forensics with a computer security bent.
[wpdm_file id=20] Insiders can use freely available steganography applications to steal senstive information and conceal evidence of criminal activity.
[wpdm_file id=21] Anti-piracy poster that connects pirated software with identity theft.
[wpdm_file id=22] Information security awareness video used for training faculty and staff at the University of Notre Dame
[wpdm_file id=23] FCC provides monthly bulletins to all users to keep them abreast of IT Security issues that may impact them.
[wpdm_file id=24] Skit to illustrate how software and hardware firewalls work
[wpdm_file id=25] Security Jeopardy
[wpdm_file id=26] A primer of how hackers profit from their exploits, used to train the FBI
[wpdm_file id=27] 10 Steps to Secure a Home Wireless Network
[wpdm_file id=28] a small document with details on how to avoid phishing scams based on my personal and professional experience
An article to help protect people protect their identities in Windows
[wpdm_file id=30] Guidance for consumers on avoiding identity theft, following BBC1 documentary bradcast 31 January
Information Assurance & Cyber Security Research and Education, a 501(c)(3)