Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 27 results for Critical Infrastructure Protection

White Paper | January 2008 - White Paper Insider Threat Study: Illicit Cyber Activity in the Information ...

In this paper, the authors present the findings of research examining reported insider incidents in information technology and telecommunications sectors.

White Paper | January 2008 - White Paper Insider Threat Study: Illicit Cyber Activity in the Government ...

In this paper, the authors present the findings of a research effort to examine reported insider incidents within the government sector.

White Paper | May 2005 - White Paper Secret Service and CERT Release Report Analyzing Acts of ...

This press release is the second in a series of reports focusing on insider threats to information systems and data in critical infrastructure sectors.

Webinar | June 2014 - Webinar Department of Homeland Security Cyber Resilience Review ... By Matthew J. Butkovic

Watch Matthew Butkovic discuss the Department of Homeland Security Cyber Resilience Review (Case Study) from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain

Podcast | July 2017 - Podcast Ransomware: Best Practices for Prevention and Response By Alexander Volynkin, Angela Horneman

In this podcast, CERT researchers spell out several best practices for prevention and response to a ransomware attack.

Technical Note | January 2014 - Technical Note A Proven Method for Identifying Security Gaps in International ... By Greg Crabb (United States Postal Service), Julia H. Allen, Pamela D. Curtis, Nader Mehravari

In this report, the authors describe a method of identifying physical security gaps in international mail processing centers and similar facilities.

Presentation | November 2017 - Presentation Cyber Hygiene: A Baseline Set of Practices By Matthew Trevors, Charles M. Wallen

The CERT Division's Cybersecurity Hygiene is a set of 11 practice areas for managing the most common and pervasive cybersecurity risks faced by organizations.

Special Report | May 2005 - Special Report Insider Threat Study: Computer System Sabotage in Critical ... By Tara Conway (National Threat Assessment Center), Susan Keverline (National Threat Assessment Center), Michelle Keeney (United States Secret Service), Eileen Kowalski (United States Secret Service), Megan Williams (National Threat Assessment Center), Dawn Cappelli, Andrew P. Moore, Stephanie Rogers, Timothy J. Shimeall

In this report, the authors seek to close the gaps in the literature that make it difficult for organizations to fully understand the insider threat.

White Paper | May 2016 - White Paper 2016 State of Cybercrime Survey

This paper examines the current state of cybercrime and explores how organizations and individuals respond to cybercrime threats.

Technical Report | May 2016 - Technical Report Using Honeynets and the Diamond Model for ICS Threat ... By John Kotheimer, Kyle O'Meara, Deana Shick

This report presents an approach to analyzing approximately 16 gigabytes of full packet capture data collected from an industrial control system honeynet—a network of seemingly vulnerable machines designed to lure attackers.

Refine