You are not logged in.
AMSER logo

Search Results

View Resource Cybersafety, Cyberethics and Cybersecurity (C3) for Educators: Ethical and Legal Implications for Classroom Technology

From the University of Maryland, this page presents materials from the course Cybersafety, Cyberethics and Cybersecurity (C3) for Educators: Ethical and Legal Implications for Classroom Technology. Taught by Davina Pruitt-Mentle for graduate and undergraduate students alike, this course "addresses several of the major ethical and policy issues that are changing the way educators think about new...

View Resource The Experts in Electronic Evidence

The ATETV project delivers web-based videos to connect students to careers in advanced technology. In this episode of ATETV, we learn about the work that computer forensic examiners do. Companies hire these experts to help recover and protect their data. Seeing the practical applications of what they are learning will be helpful for current students. Running time for the episode is 2:18.

View Resource Stay Safe Online

Sponsored by the National Cyber Security Alliance, Stay Safe Online works to educate the public on the importance of protecting their personal computers from online intruders. If proper security procedures are not implemented, computers can become victims to viruses, denial of service attacks, Trojan horse programs, and other malicious activities that take advantage of computer vulnerabilities...

View Resource Institute for Security Technology Studies

The Institute for Security Technology Studies (ISTS) at Dartmouth College "is dedicated to pursuing research that addresses critical national needs for security technology and policy in cyber and emergency response environments." Its interdisciplinary research draws from science, engineering, social science and policy perspectives to investigate critical security problems using existing...

View Resource Cyber Security and Information Infrastructure Protection

The University of Michigan's Center for Information Technology Integration has compiled this introduction to cyber security in order to help people create and manage secure systems. In addition to a clear introduction, the webpage offers helpful advice, strategies, and programs useful for threat assessment, intrusion prevention, and critical infrastructure protection. This resource is ideal for...

user login
why log in?
Manage your resources
Save, organize, and share resources that you find.

Subscribe to bulletins
Automatically be notified about new resources that match your interests.

It's easy, fast, and FREE!
for the

Copyright 2015 Internet Scout Resource Metadata
Copyright 2015 Internet Scout
NSF NSDL University of Wisconsin Internet Scout
Leave Feedback