This is an old revision of this page, as edited by Markshale (talk | contribs) at 00:56, 2 March 2016 (== DROWN attack on TLS == I've made a start on an article covering this at DROWN attack. Any help on this would be gratefully accepted. -- ~~~~). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
Revision as of 00:56, 2 March 2016 by Markshale (talk | contribs) (== DROWN attack on TLS == I've made a start on an article covering this at DROWN attack. Any help on this would be gratefully accepted. -- ~~~~)(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)This is the talk page for discussing WikiProject Computer Security and anything related to its purposes and tasks. |
|
Archives: Index, 1, 2, 3, 4Auto-archiving period: 3 months |
Computer Security: Computing Project‑class | |||||||||||||||
|
Possible source
I found:
- Shaw, Eric, Ph.D; Keven G. Ruby, M.A. and Jerrold M. Post. "The Insider Threat to Information Systems The Psychology of the Dangerous Insider" (Archive). Reprinted from the Security Awareness Bulletin, No. 2-98.
- Based on: “Insider Threats to Critical Information Systems, Technical Report #2; Characteristics of the Vulnerable Critical Information Technology Insider (CITI).” Political Psychology Associates, Ltd., June 1998.
WhisperToMe (talk) 23:55, 7 March 2015 (UTC)
Storm Botnet
Is very overdue for updating, assuming sources can be found. All the best: Rich Farmbrough, 04:29, 13 October 2015 (UTC).
DROWN attack on TLS
I've made a start on an article covering this at DROWN attack. Any help on this would be gratefully accepted. -- Markshale (talk) 00:56, 2 March 2016 (UTC)
Categories: