Library Assets in Security & Survivability


PDF/DOC REPORTS

10 most recent publications of 133 found

Unintentional Insider Threats: A Foundational Study
(August 2013)
Author: CERT Insider Threat Team

Insider Threat Attributes and Mitigation Strategies
(July 2013)
Author: George Silowash

Spotlight On: Insider Theft of Intellectual Property Inside the United States Involving Foreign Governments or Organizations
(May 2013)
Authors: Matthew L. Collins, Derrick Spooner, Dawn Cappelli, Andrew P. Moore, Randall F. Trzeciak

Software Assurance Competency Model
(May 2013)
Authors: Thomas B. Hilburn (Embry-Riddle Aeronautical University), Mark A. Ardis (Stevens Institute of Technology), Glenn Johnson ((ISC)2), Andrew J. Kornecki (Embry-Riddle Aeronautical University), Nancy R. Mead

Justification of a Pattern for Detecting Intellectual Property Theft by Departing Insiders
(March 2013)
Authors: Andrew P. Moore, David McIntire (CERT), Dave Mundie, David Zubrow

Detecting and Preventing Data Exfiltration Through Encrypted Web Sessions via Traffic Inspection
(March 2013)
Authors: George Silowash, Todd Lewellen, Joshua W. Burns, Daniel L. Costa

The MAL: A Malware Analysis Lexicon
(February 2013)
Authors: Dave Mundie, David McIntire (CERT)

Insider Threat Control: Using Universal Serial Bus (USB) Device Auditing to Detect Possible Data Exfiltration by Malicious Insiders
(January 2013)
Authors: George Silowash, Todd Lewellen

Insider Threat Control: Understanding Data Loss Prevention (DLP) and Detection by Correlating Events from Multiple Sources
(January 2013)
Authors: George Silowash, Christopher King

Common Sense Guide to Mitigating Insider Threats, 4th Edition
(December 2012)
Authors: George Silowash, Dawn Cappelli, Andrew P. Moore, Randall F. Trzeciak, Timothy J. Shimeall, Lori Flynn

more...

PDF/DOC PRESENTATIONS

10 most recent publications of 12 found

The Source Code Analysis Laboratory (SCALe) Webinar
(November 2012)
Author: Robert C. Seacord

Application of the CERT® Resilience Management Model at Lockheed Martin
(March 2011)
Authors: William David (Lockheed Martin Enterprise Business Services), Nader Mehravari (Operational Resilience Consulting), David W. White

Using CERT-RMM in a Software and System Assurance Context
(March 2011)
Author: Julia H. Allen

Securing Information in the Health-Care Industry: Network Security, Incident Management, and Insider Threat (Webinar)
(September 2010)
Author: Randall F. Trzeciak (CERT)

Transforming Your Operational Resilience Management Capabilities: CERT’s Resilience Management Model (Webinar)
(July 2010)
Author: Richard A. Caralli

Securing Global Software Supply Chains (Webinar)
(June 2010)
Author: Robert J. Ellison

Engineering Improvement in Software Assurance: A Landscape Framework (Webinar)
(May 2010)
Author: Carol Woody

Improving and Sustaining Processes for Managing Operational Resiliency CERT Resiliency Management Model (Webinar)
(January 2010)
Author: Richard A. Caralli

The Survivability Analysis Framework (Webinar)
(October 2009)
Authors: Robert J. Ellison, Carol Woody

Secure Coding (Webinar)
(August 2009)
Author: Robert C. Seacord

more...

Book BOOKS

10 found

Secure Coding in C and C++, Second Edition
(April 2013)
Author: Robert C. Seacord

The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)
(January 2012)
Author: Dawn Cappelli

The CERT Oracle Secure Coding Standard for Java
(September 2011)
Authors: Fred Long, Fred Long, Dhruv Mohindra, Dhruv Mohindra, Robert C. Seacord, Dean  F. Sutherland, David Svoboda

CERT Resilience Management Model: A Maturity Model for Managing Operational Resilience
(November 2010)
Authors: Julia H. Allen, Richard A. Caralli, David W. White

CERT C Secure Coding Standard
(October 2008)
Author: Robert C. Seacord

Software Security Engineering: A Guide for Project Managers
(May 2008)
Authors: Julia H. Allen, Sean Barnum, Robert J. Ellison, Gary McGraw, Nancy R. Mead

Secure Coding in C and C++
(September 2005)
Author: Robert C. Seacord

Internet Denial of Service: Attack and Defense Mechanisms
(January 2005)
Authors: Sven Dietrich, David Dittrich, Jelena Mirkovic, Peter Reiher

Managing Information Security Risks: The OCTAVE Approach
(July 2002)
Authors: Christopher J. Alberts, Audrey J. Dorofee

CERT Guide To System and Network Security Practices
(June 2001)
Author: Julia H. Allen

Vodcast WEBINARS

10 found

The Cyber Security R&D Pipeline – Building Capability through Science
(August 2013)
Author: Greg Shannon (CERT)

Source Code Analysis Laboratory (SCALe)
(November 2012)
Author: Robert C. Seacord

SEI Technologies Forum: Software, Security, and Resiliency
(February 2012)
Author: Paul Nielsen

SEI Technologies Forum-- The Insider Threat: Lessons Learned from Actual Insider Attacks
(January 2012)
Author: Randall F. Trzeciak

SEI Technologies Forum-- Measuring Operational Resilience
(January 2012)
Author: Julia H. Allen

Securing Information in the Health-Care Industry: Network Security, Incident Management, and Insider Threat
(October 2010)
Author: Randall F. Trzeciak (CERT)

Transforming Your Operational Resilience Management Capabilities: CERT's Resilience Management Model
(August 2010)
Author: Richard A. Caralli

Securing Global Software Supply Chains
(June 2010)
Author: Robert J. Ellison

Secure Coding
(August 2009)
Author: Robert C. Seacord

SQUARE Up Your Security Requirements Engineering with SQUARE
(May 2009)
Author: Nancy R. Mead

PDF/DOC BROCHURES

1 found

Insider Fraud in Financial Services
(July 2012)


Find Us Here

Find us on Youtube  Find us on LinkedIn  Find us on twitter  Find us on Facebook

Share This Page

Share on Facebook  Send to your Twitter page  Save to del.ico.us  Save to LinkedIn  Digg this  Stumble this page.  Add to Technorati favorites  Save this page on your Google Home Page 

For more information

Contact Us

info@sei.cmu.edu

412-268-5800

Help us improve

Visitor feedback helps us continually improve our site.

Please tell us what you
think with this short
(< 5 minute) survey.