Latest Additions to the Library
Application Virtualizaton as a Strategy for Cyber Foraging in Resource-Constrained Environments
This technical note explores the applicability of application virtualization as a strategy for cyber foraging in resource-constrained environments. Cyber foraging is a technique to enable resource-poor, mobile devices to leverage...
This report presents methods to audit USB device use within a Microsoft Windows environment.
This paper discusses the natural tension between rapid fielding and response to change (characterized as agility) and DoD information assurance policy. Data for the paper was gathered through interviews with...
Mission Risk Diagnostic (MRD) Method Description
The SEI has developed the Mission Risk Diagnostic (MRD) to assess risk in interactively complex, socio-technical systems across the life cycle and supply chain.
Spotlight On: Malicious Insiders and Organized Crime Activity
This report defines malicious insiders and organized crime and provides a snapshot of who malicious insiders are, what and how they strike, and why.