background preloader

Center for Internet Security

Center for Internet Security

USDA - APHIS TechNet Security MSDN Library Design Tools Development Tools and Languages Mobile and Embedded Development Online Services patterns & practices Servers and Enterprise Development Web Development 23175 out of 23480 rated this helpful - Rate this topic Did you find this helpful? Tell us more... (1500 characters remaining) Thank you for your feedback Show: © 2014 Microsoft. National Bio and Agro-Defense Facility Threats to U.S. Food and Animal Agriculture The United States’ food and animal agriculture supply is a highly integrated, open, global, and complex infrastructure. Increased imports of agricultural products and growing numbers of international travelers to and from the United States have had positive effects, but have also opened our food and agricultural supply to possible foreign animal disease outbreaks. The recent global H1N1 outbreak and other regional foot-and-mouth disease outbreaks have demonstrated the vulnerabilities present when there is a lack of available vaccines, countermeasures, and other rapid response capabilities to curb an outbreak. Current and previous Administrations have affirmed these threats and the need to prepare and respond through Homeland Security Presidential Directive 9: Defense of United States Agriculture and Food (January 2004) and the National Security Strategy for Countering Biological Threats (November 2009). NBAF Site: Manhattan, Kansas

Computer Security Computer Security The web is like a large city, exciting, wonderful, but with a few dangers. Most teachers do not have the time to research and find the best security products to safeguard their computers from attack by vandals, including students. I have attempted to give a few basic recommendations that can help you safeguard your personal computer. Your first line of defense is to make sure that you operating system is up to date. Any computer you use at school should be protected from malicious usage by students. If you have a specific account always log off before leaving it unattended. While software products can be helpful, do not depend on them. If you have to setup security on student Windows machines you may wish to look at Advanced Security Computer Privacy Home computer privacy is a separate issue from security. Home

Indy Homeland Security Division of Homeland Security Gary Coons, Chief Division of Homeland Security The City of Indianapolis Department of Public Safety established strategic objectives around which “the entire public safety department can mobilize to secure the City of Indianapolis Metropolitan Area from the dangerous and evolving threat of terrorism, prepare and mitigate for natural disasters, develop intelligence competencies, and plan and secure special events.” It aligns and focuses homeland security functions into several critical mission areas and identifies foundations that cut across all these mission areas. These foundations represent main sources of strength to draw upon in supporting and enabling terrorism-fighting activities. The Department of Public Safety’s made significant positive change by stepping away from the previous efforts or paradigm and redirecting processes, procedures, attitudes, structures and systems into a new high performing – accountable Division of Homeland Security through:

Learn to Manage Default Shares Recently, I received a phone call from a former coworker who left a small Independent Software Vendor (ISV) to take a job in a large corporate IT department. He had some questions about Microsoft Systems Management Server (SMS) that he hoped I could answer. We chatted about the product and his computing environment, then he signed off to install SMS on his test network. Twenty-four hours later, I received a somewhat panicky phone call: SMS wouldn't install on some of the computers on his test network, and my friend couldn't figure out why. Many users, very reasonably, are concerned about the overall security of networked computers. However, disabling default shares has a major downside. Managing administrative shares is simple. ADMIN$ is the system root folder (%systemroot%—e.g., C:\winnt). Managing shares is crucial to keeping your computing environment safe and secure.

Senate Safe Computing Tips Please note that this document is quite dated (last updated in 2008). Some of the infomation is still of interest so I'm keeping the document up for posterity only. Some of the old links have been removed. Safe Hex - A collection of suggestions intended to help you defend against viruses, worms, trojans (oh my!) You can use the Windows Update and Office Update sites to keep your system up-to-date. 3. Note that security holes may be discovered in these programs as well (though probably less frequently), so it's a good idea to check for updates regularly. You'll be able to import your IE Favorites to most of these browser alternatives. 4. Never open email attachments from someone you don't know Never open email attachments forwarded to you even if they're from someone you know Never open unsolicited or unexpected e-mail attachments until you've confirmed the sender actually meant to send them. 5. Warning - Microsoft RTF Security Bulletin - May 22, 2001 6. Administrator Tip Before you go...

Related: