Appendix A. Resources

Note: Links are valid as of March 2016.

General Computer Crime and Cyber Terrorism

Cyber crime: www.justice.gov/criminal-ccips/

Computer security: www.cert.org

Symantec’s antivirus site: www.symantec.com/security_response/

FBI Cyber Crime: www.fbi.gov/about-us/investigate/cyber

General Knowledge

Hellbound Hackers: www.hellboundhackers.org/

Dark Reading: www.darkreading.com/

Cyber Stalking

http://us.norton.com/cyberstalking/article/

www.cyber-stalking.net/

Identity Theft

www.consumer.ftc.gov/features/feature-0014-identity-theft

www.idtheftcenter.org/

Port Scanners and Sniffers

NMap: www.nmap.org

SecTools: http://sectools.org/tag/port-scanners/

Password Crackers

Ophcrack: http://ophcrack.org/

Password crackers: http://resources.infosecinstitute.com/10-popular-password-cracking-tools/

Countermeasures

Various security and hacking tools: insecure.org

Snort, an open source IDS system: www.snort.org/

The SANS Institute IDS FAQ: www.sans.org/resources/idfaq/

The Association of Computing Machinery IDS page: http://xrds.acm.org/

Cyber Investigation Tools

WhoIs tool: http://whois.domaintools.com/

Various search tools: www.virtualgumshoe.com/

Viewing previous versions of websites: www.Archive.org

General Tools

www.all-internet-security.com/security_scanners.html

Scanning tool: www.rawlogic.com/netbrute/

Virus Research

CNET Virus Center: www.cnet.com/topics/security/

F-Secure: www.fsecure.com

Symantec virus encyclopedia: www.symantec.com/security_response/

vxHeaven: vxheaven.org/

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.137.173.249