Check out all the great resources below for even more Cyber Security information!
- Safe and Secure Online
- Secure Online Banking & Shopping
- Top 10 Online Safety Tips for Seniors
- Strong P@ssw0rd$
- Scam Awareness
General IT Security
National Institute of Standards and Technology (NIST) - General IT Security
The Computer Security Division of NIST’s Information Technology Laboratory provides standards and technology to protect federal information systems against threats to the confidentiality, integrity, and availability of information and services.
PEW Research Center - Internet & Technology
Pew Research Center is a nonpartisan fact tank that informs the public about the issues, attitudes and trends shaping America and the world. We analyze the social impact of digital technologies, and we study attitudes about scientific research and innovation. Our focus is on how science and technology changes affect families, communities, education, health care and medicine, civic and political life, and workers’ activities.
Safely Dispose of Old Computers
It's important to erase all personal information from old computers before disposing of them. Simply reformatting a hard drive or reinstalling the operating system does not guarantee the old data is unreadable. Physically destroy the hard drive or use a special "wipe" program. These programs, such as Active@KillDisk and Dban, are free and meet governmental security standards.
SANS Application Security Working Papers
This set of working papers will provide up-to-date information from "industry thought leaders and enterprise pros already leading the application security charge in the trenches".
Groups Organized Against Cyber Crime
What To Do If You're A Victim
Delaware Cyber Security Laws
Title 6- Chapter 12b - COMPUTER SECURITY BREACHES
Summary of House Bill 180: Delaware Data Breach Law
Title 11-Chapter 5- SPECIFIC OFFENSES
932 - Unauthorized Access
933 - Theft of Computer Services
934 - Interruption of Computer Services
935 - Misuse of Computer System Information
936 - Destruction of Computer Equipment
937 - Unrequested or Unauthorized Electronic Mail or Use of Network or Software to Cause Same
938 - Failure to Promptly Cease Electronic Communication Upon Request
939 - Penalties
940 - Venue
941 - Remedies of Aggrieved Persons