Cyber Security in Delaware
 

RESOURCES  &  NON-TECHNICAL PUBLICATIONS

Check out all the great resources below for even more Cyber Security information!


The Basics


For Seniors

General IT Security

  • National Institute of Standards and Technology (NIST) - General IT Security
    The Computer Security Division of NIST’s Information Technology Laboratory provides standards and technology to protect federal information systems against threats to the confidentiality, integrity, and availability of information and services.
  • PEW Research Center - Internet & Technology
    Pew Research Center is a nonpartisan fact tank that informs the public about the issues, attitudes and trends shaping America and the world. We analyze the social impact of digital technologies, and we study attitudes about scientific research and innovation. Our focus is on how science and technology changes affect families, communities, education, health care and medicine, civic and political life, and workers’ activities.
  • Safely Dispose of Old Computers
    It's important to erase all personal information from old computers before disposing of them. Simply reformatting a hard drive or reinstalling the operating system does not guarantee the old data is unreadable. Physically destroy the hard drive or use a special "wipe" program. These programs, such as Active@KillDisk and Dban, are free and meet governmental security standards.
  • SANS Application Security Working Papers
    This set of working papers will provide up-to-date information from "industry thought leaders and enterprise pros already leading the application security charge in the trenches".

Groups Organized Against Cyber Crime

Technical Information

What To Do If You're A Victim


Available Tools / Virus Protection


Delaware Cyber Security Laws

  • Title 6- Chapter 12b - COMPUTER SECURITY BREACHES
    Summary of House Bill 180: Delaware Data Breach Law
  • Title 11-Chapter 5- SPECIFIC OFFENSES
    932 - Unauthorized Access
    933 - Theft of Computer Services
    934 - Interruption of Computer Services
    935 - Misuse of Computer System Information
    936 - Destruction of Computer Equipment
    937 - Unrequested or Unauthorized Electronic Mail or Use of Network or Software to Cause Same
    938 - Failure to Promptly Cease Electronic Communication Upon Request
    939 - Penalties
    940 - Venue
    941 - Remedies of Aggrieved Persons

Links

Image for Stay Safe Online 
www.iSafe.org
GetNetWise: You're One Click Away
SANS
DHS Cybersecurity Links
National Institute of Standards and Technology
MS-ISAC
Pew Research Center

5 Reasons Why Cyberattacks Pose a Real Threat to Government

5 Reasons Why Cyberattacks Pose a Real Threat to Government
Source: cgi.com

Internet of Me

Internet of Me
Source: StaySafeOnline.org

Security and the Internet of Things

Security and the Internet of Things
Source: ComputerScienceZone.org