Hi, what do you want to do?
Education Development Center
The Fun Works: Technology Career Choices
This resource provides information about some technology careers you've probably never thought of.
Other
The Cookie Controversy
This site presents an overview of issues relating to cookies - their purpose, privacy concerns, available software, and more.
Indiana University
Indiana University: Drive by Pharming
This document provides a detailed description of drive-by pharming and recommended countermeasures.
Other
International High Technology Crime Investigation Association
This site is devoted to high technology crime investigations and contains training and seminars as well as a variety of resources.
Other
Welcome to Phishing info.org. Learn How to Fight Email Scams Here
This site provides information about how phishing works, how to protect yourself and where to go for help.
Federal Trade Commission
On Guard Online: Phishing
This site contains an overview of phishing as well as a list of suggestions for avoiding phishing scams.
Other
Anonymity and Privacy on the Internet
A site that gives information on how to be anonymous and how to secure communications and files on the internet.
Khan Academy
Khan Academy: Phishing Attacks
Find out what phishing attacks are and how to avoid them.
Goodwill
Gcf Global: Internet Safety : How to Avoid Malware
Malware is one of the most common hazards to your computer when you're online, but it's easy to avoid. Developing safe and smart browsing habits can protect you from malware and other threats, like viruses. Securing your computer and...
Other
Anti Virus Research Center
Symantec offers a chart of security threats and clear explanations of various types of security threats. Keeps a current list of viruses.
Learn My Way
Learn My Way: Keeping Your Personal Data Safe
In this online course, students will learn how to keep their online information safe by making and remembering good passwords and also how to control who sees their personal information when using public computers and social media.
Employment Spot
Employment Spot: Fastest Growing Job Fields
The U.S. Department of Labor projected which industries and occupations will experience the most growth from now until 2008. Areas set to experience the biggest boom include computer technology, health services and social services.
TED Talks
Ted: Ted Ed: Defining Cyberwarfare in Hopes of Preventing It
Can you imagine a future where wars are fought not with bombs and bullets but computer viruses and pacemaker shutdowns? Cyberware is unique in that it is not covered by existing legal framework and it often inspires more questions than...
Other
Businessweek.com: The Privacy War of Richard Smith
This article details the computer work of Richard Smith and his mission to make consumers aware of the threat of eroding computer and technology privacy. (Feb. 14, 2000)
Other
Symantec: Steganography Revealed
This article provides an overview of steganography as well as steganographic tools and techniques.
Other
Anti Spyware Coalition
This site contains industry and educational accepted spyware definitions and best practices, and includes a document listing and newsroom.
Curated OER
Google for Education: Children and Technology: Privacy and Encryption
Students simulate sending a secret message to a friend via the internet, attempting to deliver the message safely and securely.
Other
The Honeynet Project: Know Your Enemy Phishing
This site contains information about the tools, tactics and techniques used by phishing scams.
Other
Spyware Warrior
This site includes anti-spyware comparisons, spyware forums and other anti-spyware resources.
Get Safe Online
Get Safe Online: Wireless Networks and Hotspots
Wireless networks are more convenient than wired networks, but wireless networks are susceptible to a wider range of security threats. This resource describes some of these security threats and how to configure a secure wireless network.
Get Safe Online
Get Safe Online: Safe Internet Use
No matter what software a person uses to browse the internet, there are security risks involved. This article describes some of the security risks and how to browse the internet safely.
Get Safe Online
Get Safe Online: Use Webmail Wisely
Webmail is web-based email. The reason webmail is popular is because it provides convenient email processing from any internet connected computer. This site describes some of the security risks associated with webmail and how to avoid them.
Get Safe Online
Get Safe Online: Use Internet Telephony Safely
Internet telephony is using the internet for voice communication. It is also called voice over IP (VOIP). This site provides some tips on how to use VOIP safely and avoid loss of privacy.
Other popular searches
- Firewalls, Computer Security
- Cyber Computer Security
- Computer Security Threats
- Cyb Computer Security
- Firewalls Computer Security