Cyber Security in Delaware


Check out all the great resources below for even more Cyber Security information!

The Basics

For Seniors

General IT Security

  • National Institute of Standards and Technology (NIST) - General IT Security
    The Computer Security Division of NIST’s Information Technology Laboratory provides standards and technology to protect federal information systems against threats to the confidentiality, integrity, and availability of information and services.
  • PEW Research Center - Internet & Technology
    Pew Research Center is a nonpartisan fact tank that informs the public about the issues, attitudes and trends shaping America and the world. We analyze the social impact of digital technologies, and we study attitudes about scientific research and innovation. Our focus is on how science and technology changes affect families, communities, education, health care and medicine, civic and political life, and workers’ activities.
  • Safely Dispose of Old Computers
    It's important to erase all personal information from old computers before disposing of them. Simply reformatting a hard drive or reinstalling the operating system does not guarantee the old data is unreadable. Physically destroy the hard drive or use a special "wipe" program. These programs, such as Active@KillDisk and Dban, are free and meet governmental security standards.
  • SANS Application Security Working Papers
    This set of working papers will provide up-to-date information from "industry thought leaders and enterprise pros already leading the application security charge in the trenches".

Groups Organized Against Cyber Crime

Technical Information

What To Do If You're A Victim

Available Tools / Virus Protection

Delaware Cyber Security Laws

  • Title 6- Chapter 12b - COMPUTER SECURITY BREACHES
    Summary of House Bill 180: Delaware Data Breach Law
  • Title 11-Chapter 5- SPECIFIC OFFENSES
    932 - Unauthorized Access
    933 - Theft of Computer Services
    934 - Interruption of Computer Services
    935 - Misuse of Computer System Information
    936 - Destruction of Computer Equipment
    937 - Unrequested or Unauthorized Electronic Mail or Use of Network or Software to Cause Same
    938 - Failure to Promptly Cease Electronic Communication Upon Request
    939 - Penalties
    940 - Venue
    941 - Remedies of Aggrieved Persons


Image for Stay Safe Online
GetNetWise: You're One Click Away
DHS Cybersecurity Links
National Institute of Standards and Technology
Pew Research Center

5 Reasons Why Cyberattacks Pose a Real Threat to Government

5 Reasons Why Cyberattacks Pose a Real Threat to Government

Internet of Me

Internet of Me

Security and the Internet of Things

Security and the Internet of Things