CERIAS Hotlist
Page Content
- 2600: The Hacker Quarterly
The Hacker Quarterly.
http://www.2600.com/ - Added Sep 26, 2000
- CERIAS: Center for Education and Research in Information Assurance and Security
The worlds foremost university center for multidisciplinary
research and education in areas of information security and information assurance.
http://www.cerias.purdue.edu/ - Added Dec 10, 1999
- ABA Information Security Committee
The Committee explores current information security issues including those related to public key
infrastructure, cryptology, risk analysis, standards, "commercial reasonableness" and the legal
efficacy of secure digital commerce.
http://www.abanet.org/scitech/ec/isc/home.html - Added Dec 10, 1999
- AuditNet
The Official Kaplan's AuditNet Resource List
http://www.auditnet.org/karl.htm - Added Dec 10, 1999
- Bernstein v. United States
The main repository of information on Bernstein v. United States
http://cr.yp.to/export.html - Added Feb 18, 2002
- Center for Democracy and Technology
works to promote democratic values and constitutional liberties in the digital age. With expertise in law, technology, and policy, CDT seeks practical solutions to enhance free expression and privacy in global communications technologies.
http://www.cdt.org/crypto/ - Added Apr 10, 2001
- Challanges/Threats to Privacy
Slide show presentation given by Deborah Pierce, Staff Attorney (Privacy & Identity) for the Electronic Frontier Foundation.
http://www.inetdevgrp.org/20001017/index.html - Added Nov 02, 2000
- Commercial Encryption Export Controls
Export controls on
commercial encryption
products are administered
by the Bureau of Export
Administration (BXA) in the
U.S. Depar
http://www.bxa.doc.gov/Encryption/ - Added Dec 10, 1999
- Computer Crime
Unauthorized use of computers (altering web sites),
malicious computer programs &
harassment & stalking
http://www.rbs2.com/ccrime.htm - Added Feb 29, 2000
- Computer Forensic Exams
A computer forensics vendor independent portal for computer forensic examiners. It has computer forensic news, data recovery techniques, file system information, computer forensic job listing, an ISP database and much more.
http://www.forensicexams.org - Added Oct 17, 2006
- Department of Commerce Encryption Export Regulations
This interim rule amends the Export Administration Regulations
(EAR) by exercising jurisdiction over, and imposing new combined
national security and foreign policy controls on, certain encryption
items that were on the United
http://www.epic.org/crypto/export_controls/interim_regs_12_9... - Added Dec 10, 1999
- Digital Watermarks: New Tools for Copyright Owners and Webmasters
New technology providing authors with valuable weapons in their battle to enforce the law in the on-line world and protect their copy-rights.
http://www.webreference.com/content/watermarks/ - Added Dec 10, 1999
- Directory of Information Security White Papers
Organized and Categorized directory of InfoSec White Papers, no registration or account creation needed.
http://www.securestandard.com/ - Added Dec 31, 2003
- Encryption Policy Resource Page
Information on the encryption policy
http://www.crypto.com/ - Added Dec 10, 1999
- FIPS, Government Encryption Standards
The Federal Information Processing Standards information on Security Requirements for Cryptographic Modules.
http://csrc.nist.gov/publications/fips/index.html - Added Dec 10, 1999
- Information Security Management Maturity Model
The Information Security Management Maturity Model (ISM3, or ISM-cubed) offers a practical and efficient approach for specifying, implementing and evaluating process-oriented information security management (ISM) systems.
ISM3 aims to:
* Enable the creation of ISM systems that are fully aligned with the business mission.
* Be applicable to any organization regardless of size, context and resources.
* Enable organisations to prioritize and optimize their investment in information security.
* Enable continuous improvement of ISM systems.
* Support the outsourcing of security processes.
ISM3 is compatible with the implementation and use of ITIL, ISO9001, Cobit and ISO27001. This compatibility protects the existing investment in ISM systems when they are enhanced using ISM3. ISM3 based ISM systems are themselves accreditable, giving organisations an objective means of measuring and advertising their progress with information security management.
The management discipline and internal control framework required by ISM3 assists compliance with corporate governance law.
http://www.ism3.com - Added Oct 06, 2006
- Institute for the Advanced Study of Information Warfare
Information warfare, also known as I-War, IW, C4I, or Cyberwar, has recently become of increasing importance to the
military, the intelligence community, and the business world. The purpose of the IASIW is to facilitate an understanding of
informat
http://www.psycom.net/iwar.1.html - Added Dec 10, 1999
- Loyola Homepage on Strategic Intelligence
A wide assortment of links, info, articles, etc. on Strategic Intelligence provided by Loyola
http://www.loyola.edu/dept/politics/intel.html - Added Dec 10, 1999
- NoticeBored - information security awareness service
NoticeBored delivers creative multi-media materials for use in information security awareness campaigns. New materials are provided every month for end users, general managers and information security managers. NoticeBored campaigns are guaranteed effective.
http://www.noticebored.com/ - Added Jun 02, 2003
- People for Internet Responsibility
A global, grassroots, ad hoc network of individuals who are concerned about the current and future operations, development, management, and regulation of the Internet in responsible manners. The goal of PFIR is to help provide a resource for individu
http://www.pfir.org/ - Added Nov 07, 2000
- Some Observations on Copyright Law
General observations on copyright law and how it applies in different arenas.
http://www.rbs2.com/copyr.htm - Added Feb 29, 2000
- Statement on Crypto Policy
The Clinton Administration is proposing a framework that will encourage the use of strong encryption in commerce and private
communications while protecting the public safety and national security. It would be developed by industry and will be avail
http://www.cdt.org/crypto/960712_Gore_stmnt.html - Added Dec 10, 1999
- Supreme Court Decisions
Decisions from past Supreme Court hearings.
http://supct.law.cornell.edu/supct/ - Added Dec 10, 1999
- The Applied Cryptography Case
In January 14, 2000, new US crypto export regulations went into effect. Publicly available encryption source code, such as that at
issue in my lawsuit, is now effectively freely exportable.
http://people.qualcomm.com/karn/export/ - Added Dec 10, 1999
- The Center for International Trade and Security
Seeks to address international security
challenges through policy-relevant research and outreach.
http://www.uga.edu/~cits/ - Added Dec 10, 1999
- The National Security Archive
The Digital National Security Archive
contains the most comprehensive collection of
primary documents available: The database
contains more than 35,000 of the most
im
http://nsarchive.chadwyck.com/ - Added Dec 10, 1999
- The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption
This report examines the fundamental properties of these requirements
and attempts to outline the technical risks, costs, and implications of deploying systems
that provide government access to encryption keys.
http://www.cdt.org/crypto/risks98/ - Added Dec 10, 1999
- The Spamhaus Project
Spamhaus is an international non-profit organization whose mission is to track the Internet's Spam Gangs, to provide dependable realtime anti-spam protection for Internet networks, to work with Law Enforcement Agencies to identify and pursue spammers worldwide, and to lobby governments for effective anti-spam legislation.
http://www.spamhaus.org/index.lasso - Added Apr 01, 2005
- U.S. Constitution
The US Constitution
http://www.law.cornell.edu/constitution/constitution.overvie... - Added Dec 10, 1999
- Vice Presidential Statement on export controls for commercial encryption products
President Clinton and I are committed to promoting the growth of electronic commerce and robust, secure communications
worldwide while protecting the public safety and national security.
http://www.epic.org/crypto/key_escrow/clipper4_statement.htm... - Added Dec 10, 1999