Cyber Security

Cyber Security Links

The following links are provided as a courtesy. They should not be interpreted as an endorsement of the named organizations' products or services.


Cyber Operations
Cyber Security / Computer Security
Computer network operations
United States Cyber Command
U.S. Army Cyber Command
United States Tenth Fleet
Twenty-Fourth Air Force
Air Force Cyber Command (Provisional)


NSA Information Assurance
National Centers of Academic Excellence - Cyber Operations
Commander, JFCC-NW, HASC, Terrorism, Unconventional Threats, and Capabilities Subcommittee, 5 May 2009
GEOINT 2011, Keynote Gen. Keith B. Alexander, U.S. Army, Commander-USCYBERCOM, Director-NSA

Cyber Command

U.S. Cyber Command
U.S. Cyber Command - PKI Required

Defense Department

DoD Cyber Strategy
Army Cyber Command / U.S. 2nd Army
U.S. Fleet Cyber Command / U.S. Tenth Fleet
24th Air Force

24th Air Force: The Cyber Space
Air University Cyberspace & Information Operations Study Center
DARPA Information Innovation Office
IASE Information Assurance Support Environment

Federal Government

CERT Coordination Center
DOE Incident Management
NARA Controlled Unclassified Information (CUI)
NIST Computer Security Resource Center

White House

National Security Council, Cybersecurity


Academic Earth: Computer Science
Avi Rubin's Home Page
Cyber Security Policy and Research Institute (CSPRI)
Georgetown University: Top 10 Threats to Information Security
Johns Hopkins Information Security Institute
Dorothy Denning at NPS
Gene Spafford's CERIAS
Purdue University Global's Cyber Security Management
Lance Hoffman's Home Page
Maryville University Online Master of Science in Cyber Security
Onine Master of Cyber Security
Rand National Security Research Division
SRI Computer Science Lab
Universiity of Delaware Online M.S. in Cybersecurity
UMBC Cybersecurity
UMBC Center for Information Security and Assurance
University of Fairfax Online M.S. in Cybersecurity
Utica College

Professional Organizations

Common Criteria
International Information Systems Security Certification Consortium (ISC)2

Commercial Product

BlueRidge Networks
BlueRidge Networks
CA (Computer Associates)
Cisco Security
Dartware Intermapper
eEye Digital Security (BeyondTrust)
IBM Security
Microsoft Security
PGP (Symantec)
Procera Networks
Red Hat Security

Secure Computing (McAfee)
Solera Networks

Other Internet Resources

Cyber-intruder sparks massive federal response — and debate over dealing with threats
Wired: Cyber Command Articles
Matthew Devost
Richard Forno's Infowarrior
The Information Warfare Site