Trails:

Cyberspace of Shujun LI >> Cyber Security and Privacy

Shortcuts

General

Online Resources: Have I been pwned? emotion icon Network Information Security & Technology NewsNetwork Information Security & Technology News (National Cybersecurity Center of Excellence (NCCoE), National Initiative for Cybersecurity Education (NICE)) Dark Reading securitymetrics.org windowsecurity.com Info Security Writers Quantiki StopBadware (Clearinghouse Search) The Security Skeptic Economics and Security Resource Page Economics of Security Bibliography Wireless Sensor Networks Security SecurityCartoon.com emotion icon Cryptoportal MysteryTwister C3 Cryptographer's World emotion icon Handbook of Applied Cryptography Cryptology Timeline @ Machinae.com SCAN (Standard Cryptographic Algorithm Naming) (mirror) sci.crypt.research Forum On Risks To The Public In Computers And Related Systems Helger Lipmaa's Cryptology Pointers Prof. Matt Blaze's Cryptography Resource CryptoStats Jan's List of Cryptographers Neil's Security and Privacy Resources Crypto Lounge CryptoDox Crypto Law Survey Cryptograph alt.security.keydist Resources Ciphers By Ritter The Pairing-Based Crypto Lounge Side Channel Attacks Database Open-source PKI Book emotion icon FBSEC - Freie Diskussion im Fachbereich Sicherheit
Cyber Security Awareness Campaigns: National Cyber Security Alliance (NCSA) STOP. THINK. CONNECT.™ Comprehensive National Cybersecurity Initiative (CNCI) Get Safe Online Cyber Aware Nominet Cyber Assist Cyber Essentials (CREST) Cyber Security Challenge Childnet International Better Internet for Kids (BIK) UK Safer Internet Centre ConnectSafely.org Internet Keep Safe Coalition (iKeepSafe) Swiss Internet Security Alliance (SISA) CECyF Prévention - Le site de prévention du CECyF / ARRÊTE-TOI. RÉFLÉCHIS. CONNECTE-TOI. Cybervolunteers Cyber Security Awareness Alliance

Professional Bodies and Experts Groups: IEEE Cybersecurity Initiative (IEEE Computer Society Center for Secure Design) IEEE Computer Society (Technical Committee on Security and Privacy) ACM Special Interest Group on Security, Audit and Control (SIGSAC) USENIX, the Advanced Computing Systems Association Applied Computer Security Associates (ACSA) International Association for Cryptologic Research (IACR) OpenPGP Alliance International Financial Cryptography Association (IFCA) (ISC)² - International Information Systems Security Certification Consortium, Inc. Forum of Incident Response and Security Teams (FIRST) International Council of E-Commerce Consultants (EC-Council) Information Systems Security Association (ISSA) Institute for Information Infrastructure Protection (I3P) Trusted Computing Group (TCG) Cloud Security Alliance (CSA) ASIS International European Institute for Computer Antivirus Research (EICAR) National Association for Information Destruction (NAID) (NAID-Europe, NAID-ANZ, NAID-Canada) CREST (International) Family Online Safety Institute (FOSI) Leuven Security Excellence Consortium (L-SEC) Chaos Computer Club e.V. (CCC) 中国密码学会 (Chinese Association of Cryptologic Research, CACR)
Governmental Bodies: National Institute of Standards and Technology (NIST) (CSRC - Computer Security Resource Center, Cryptographic Toolkit, Random Number Generation and Testing, Security Content Automation Protocol (SCAP), XCCDF (The Extensible Configuration Checklist Description Format)) National Security Agency/Central Security Service (NSA/CSS) United States Computer Emergency Readiness Team (US-CERT) Department of Defense Information Analysis Centers (DoD IACs) (Cyber Security and Information Systems Information Analysis Center (CSIAC), Homeland Defense and Security Information Analysis Center (HDIAC), Defense Systems Information Analysis Center (DSIAC)) Internet Crime Complaint Center (US) ACCURATE: A Center for Correct, Usable, Reliable, Auditable, and Transparent Elections EDRI - European Digital Rights European Network and Information Security Agency (ENISA) (National Cyber Security Strategies in the World) CERT-EU (Computer Emergency Response Team for the EU institutions, bodies and agencies) emotion icon 国家密码管理局/国家商用密码管理办公室 中国信息安全产品测评认证中心 (China Information Security Evaluation Center)
Security Media: Ars Technica Motherboard/VICE Media Information Security Media Group (ISMG) Dark Reading SC Magazine (US, UK, Australasia, Asia) Network Security Journal
Companies: RSA, The Security Division of EMC (RSA Laboratories, CryptoBytes Technical Newsletter) IBM Institute for Advanced Security Netcraft WebTrust/SysTrust certicom Symantec (VeriSign @ Symantec, Norton) Intel Security (McAfee, part of Intel Security) BT Counterpane CAcert.org MITRE Corporation (CAPEC™ (Common Attack Pattern Enumeration and Classification), Making Security Measurable, CVE™ (Common Vulnerabilities and Exposures), CWE™ (Common Weakness Enumeration), MAEC™ (Malware Attribute Enumeration and Characterization)) Mozilla Security (Winter Of Security 2015) Check Point Software Technologies Ltd. emotion icon Darktrace Clearswift GeoLang

Internet Security: Let's Encrypt Security for All emotion icon W3C Security Home (XML Encryption Working Group, XML Signature Working Group, Web Security Context Working Group, XML Security Specifications Maintenance Working Group, XML Key Management Working Group) OASIS Web Services Security (WSS) TC OASIS Web Services Secure Exchange (WS-SX) TC OASIS Security Services (SAML) TC SAML XML.org Open Web Application Security Project (OWASP) Anti-Phishing Working Group (APWG) (APWG.EU; STOP. THINK. CONNECT.™) DoS Attack Resources OECD - Task Force on Spam Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) Network Abuse Clearinghouse (Fight Spam on the Internet) Cryptovirology Labs OnGuard Online Internet of Things Privacy Forum emotion icon The Honeynet Project Honeypots: Monitoring and Forensics Project Project Honey Pot @ Unspam Technologies, Inc. Honeypots: Tracking Hackers honeyblog.org (by Thorsten Holz) emotion icon stegano.net (Network Steganography)
Datasets and Testbeds: DETER Project VirusShare emotion icon DatCat: Internet Measurement Data Catalog IMPACT (Information Marketplace for Policy and Analysis of Cyber-risk & Trust) program, formerly known as PREDICT (Protected Repository for the Defense of Infrastructure Against Cyber Threats) Publicly available PCAP files @ NETRESEC AB MOME datasets list Packet Traces @ Bro emotion icon Internet Traffic Archive Traces MAWI Working Group Traffic Archive UMassTraceRepository (MAWILab) pcapr WITS: Waikato Internet Traffic Storage TOTEM dataset University of Oregon Route Views Archive LBNL/ICSI Enterprise Network Traffic Dataset RIPE Routing Information Service (RIS) BGP Dataset 2009-M57-Patents Scenario Tracks CRAWDAD (Community Resource for Archiving Wireless Data At Dartmouth) emotion icon MCFP Dataset (CTU-13 Dataset @ Malware Capture Facility Project) ISCX ( Information Security Center of eXcellence) Datasets @ Canada ISOT Lab Datasets DARPA Intrusion Detection Data Sets CAIDA Data (UCSD Network Telescope, CAIDA "DDoS Attack 2007" Dataset, Witty Worm Dataset) West Point Cyber Research Centre's Cyber Defense Exercise (CDX) Datasets NUST Traffic Datasets emotion icon SimpleWeb traces (IPOM 2009 labelled dataset) KDD Cup 1999 Data NSL-KDD Data Set The ADFA Intrusion Detection Datasets AWID (Wireless Security Datasets Project) Dataset ADFA IDS DataSets emotion icon Symantec’s Worldwide Intelligence Network Environment (WINE)

Usable Security and Privacy

Software

Freeware and Open Source Projects: NESSIE Test Vectors NIST Statistical Test Suite Marsaglia Random Number CDROM including the Diehard Battery of Tests of Randomness TestU01 emotion icon GCHQ's CyberChef International PGP GnuPG GPG4WIN g10 Code (GPGol) GNU Privacy Assistant (GPA) Veridis Open PGP (KeyServer) Dark Mail Technical Alliance HushMail Enigmail Enigform FireGPG wija emotion icon CTL: Crypto Tools Library Crypto++® Library Peter Gutman's cryptlib (Delphi and Visual Basic Interfaces) LibTomCrypt Bouncy Castle Crypto APIs OpenSSL md5deep and hashdeep sphlib AVR-Crypto-Lib MCrypt CrypTool (CrypTool-Online; CrypTool 1, CrypTool 2, JCrypTool, CrypTooLinux; Rijndael Inspector & Rijndael Animation) John Walker's Fourmilab (JavaScrypt, ENT - A Pseudorandom Number Sequence Test Program, MD5, One-Time Pad Generators, HotBits, Steganosaurus, Five-Letter Codegroup Filter) Stanford Javascript Crypto Library Javascript Crypto Library @ Clipperz jsSHA Malicious SHA-1 FreeOTFE Open Source PKI Projects Charm: A tool for rapid cryptographic prototyping Visual Encryptor emotion icon AES and Combined Encryption/Authentication Modes (by Brian Gladman) Blowfish Twofish Serpent (Eli Biham's Serpent Page) SONY's CLEFIA HElib: An Implementation of homomorphic encryption hcrypt project: Secret program execution through homomorphic encryption emotion icon Casper: A Compiler for the Analysis of Security Protocols Scyther SPORE (Security Protocol Open Repository) AVISPA (Automated Validation of Internet Security Protocols and Applications) SPAN (Security Protocol ANimator for AVISPA) Tamarin Prover emotion icon Higgins Bandit Azigo Mobile-OTP Clipperz - online password manager emotion icon WireShark WinPcap (WinDump) CapLoader NetworkMiner NFDUMP NfSen - Netflow Sensor Argus (network Audit Record Generation and Utilization System) RSA NetWitness Investigator Bro Network Security Monitor TracesPlay joy Aircrack-ng AirSnort (sourceforge) BackTrack SpyEye Tracker ZeuS Tracker emotion icon SlavaSoft HashCalc
Commercial Solutions: Galois' Cryptol BMT Micro's CryptoTools Jetico's BestCrypt NetworkMiner Professional

Only one revision exists, which was created (or modified) by hooklee at Sunday, March 26, 2017 6:26:24 PM.
This page was locked and can only be edited by administrators.

HomeIndexRecent ChangesPreference

Google

Google PageRank Checker
Valid XHTML 1.0 Transitional
Locations of visitors to this page
ip-location map zoom
Germany

China

GMT (London)