Adoption of Cybersecurity Technology Workshop Articles

2015 ACT Worksop Final Report

The 2015 ACT Workshop Report dated 4 April 2015 is now available for viewing.

 

ACT Workshop Background Material

Manageable Network Plan Teaser (overview)  and  Manageable Network Plan (full document)
Networks often become unmanageable and rapidly get out of control. An unmanageable network is insecure. The Manageable Network Plan is a series of milestones to take an unmanageable and insecure network and make it manageable, more defensible, and more secure. It provides overall direction, offers suggestions, calls out crucial security tips, and gives references to books, Web resources, and tools.

IAD’s Top 10 Information Assurance Mitigation Strategies
ACT Workshop's Use Case Areas: The National Security Agency's Information Assurance Directorate's Top Mitigation Strategies.

Read Ahead Articles

A Brief Introduction to Usable Security
The authors examine research in usable computer security, starting with a historical look at papers that address two consistent problems: user authentication and email encryption. Drawing from successes and failures within these areas, they study several security systems to determine how important design is to usable security.

Privacy and Security Usable Security: How to Get it
Why does your computer bother you so much about security, but still isn't secure? It's because users don't have a model for security, or a simple way to keep important things safe.

Fishing for Phishes: Applying Capture-Recapture Methods to Estimate Phishing Populations

Unintentional Insider Threats: A Review of Phishing and Malware Incidents by Economic Sector