• Home
  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Related Websites
  • Services
    • Free Technical Inquiry
    • Core Analysis Task (CAT) Program
    • Subject Matter Expert (SME) Network
    • Training
    • Contact Us
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
  • About
    • About the CSIAC
    • The CSIAC Team
    • Subject Matter Expert (SME) Support
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • DTIC STI Program
    • FAQs
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
Login / Register

CSIAC

Cyber Security and Information Systems Information Analysis Center

  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Websites
  • Services
    • Free Technical Inquiry
    • Core Analysis Task (CAT) Program
    • Subject Matter Expert (SME) Network
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
  • About
    • About the CSIAC
    • The CSIAC Team
    • Subject Matter Expert (SME) Support
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • DTIC STI Program
    • FAQs
  • Cybersecurity
  • Modeling & Simulation
  • Knowledge Management
  • Software Engineering
/ Resources / Cybersecurity Related Websites

Cybersecurity Related Websites

The listing of related sites provide additional sources to pursue the topic of Cybersecurity. The sites include Government organizations, including federal agencies, Department of Defense and military service agencies, commercial organizations, and academic institutions. Click on the links below for navigation through this page.

  • Federal
  • DoD
  • Commercial
  • Academic
  • Cyber Security Organizations

Disclaimer: The appearance of hyperlinks does not constitute endorsement by the Department of Defense of this Web site or the information, products or services contained therein. For other than authorized activities such as military exchanges and Morale, Welfare and Recreation sites, the Department of Defense does not exercise any editorial control over the information you may find at these locations. Such links are provided consistent with the stated purpose of this DoD Web site.

Federal Agency Sites

  • Federal Bureau of Investigation
  • Department of Homeland Security
  • DOE Computer Incident Advisory Capability (CIAC)
  • Computer Security Technology Center (CSTC)
  • Information Design Assurance Red Team (IDART)
  • Information Operations Red Team and Assessments (IORTA)
  • National Institute of Standards and Technology (NIST) Computer Security Division
  • National Information Assurance Research Laboratory (NIARL)
  • NIST Computer Security Resource Clearinghouse
  • National Telecommunications and Information Administration (NTIA)
  • Plans, Customer Service, and Information Assurance Division (N5)
  • ICAT Metabase
    ICAT is a searchable index of information on computer vulnerabilities. It provides search capability at a fine granularity and links users to vulnerability and patch information.
  • National Vulnerability Database (NVD)

DoD/Military Service Sites

  • National Security Agency, Central Security Service—Information Assurance
  • Information Assurance Support Environment
  • STRATCOM
  • Office of Technology Transition
  • Department of Defense Computer Emergency Readiness Team (DoD CERT)
  • Defense Advanced Research Projects Agency (DARPA)
  • Rainbow Series Library
    Performs trusted product evaluations. The program focuses initially on products with features and assurances characterized by the Trusted Computer System Evaluation Criteria (TCSEC) C2 level of trust
  • Naval Postgraduate School Information Warfare Academic Group (IWAG)
  • Joint C4I Systems
  • The Joint C4ISR Battle Center
    The Joint C4ISR Battle Center (JBC) has an assessment team that conducts assessments on IA and CND technological solutions that enhance interoperability and NETOPS for the deployed JTF.
  • Defense Cyber Crime Center
  • Chief Information Officer, Networks & Information Integration (CIO-NII)
  • Defense Information Systems Agency (DISA)
  • DISA – Approved Products List Integrated Tracking System
  • DISA – Fact Sheets

Commercial Sites

  • Internet Traffic Report
    The Internet Traffic Report monitors the flow of data around the world. It then displays a value between zero and 100 and is updated every 15 minutes. Higher values indicate faster and more reliable connections.
  • Electronic Privacy Information Center Home Page
    Public interest research center in Washington, D.C.
  • Information Security Portal
    This site provides information concerning the topic of Information Warfare including security tools, the law and legal issues, espionage, terrorism, and information operations.
  • Internet Privacy Coalition
  • International Computer Security Association (ICSA)
    ICSA is known worldwide as an objective source for security assurance services.
  • Glossary of Information Warfare Terms
  • Cyberwar – Information warfare and psychological operations
    Provides information on the topics of propaganda analysis, online journals, index and metapages, general resources, intelligence agencies, and articles and documents.
  • Reliable Software Technologies (RST): Information Warfare
  • RAND National Security Research Division
    This division conducts research for RAND’s national security research sponsors other than the U.S. Army and Air Force. It contains the National Defense Research Institute (NDRI), RAND’s federally funded research and development center for the Secretary of Defense, the Joint Staff, and the defense agencies.
  • Forum of Incident Response and Security Teams (FIRST)
    FIRST brings together a variety of computer security incident response teams from government, commercial, and academic organizations. FIRST aims to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents, and to promote information sharing among members and the community at large.
  • International Association for Cryptologic Research (IACR)
    The International Association for Cryptologic Research (IACR) is a non-profit scientific organization whose primary purpose is to further research in cryptology and related fields.
  • International Biometrics Industry Association (IBIA)
  • Military Information Services, Inc.
    Military Information Services (MIS) is a Washington DC based consulting and sales group. Provides open source intelligence data retrieval, collection and analysis products in addition to a full range of editorial support services for defense and intelligence organizations, research centers, libraries, trade publications and information groups worldwide.
  • Common Vulnerabilities and Exposures
    A list of standardized names for vulnerabilities and other information security exposures – CVE aims to standardize the names for all publicly known vulnerabilities and security exposures.
  • Institute for Applied Network Security (IANS)
    The Institute for Applied Network Security is the premier membership organization for practicing information security professionals. The Institute’s mission is to provide key technical and business insights to help members solve their most pressing professional challenges.

Academic Institution Sites

The National Centers of Academic Excellence in Information Assurance Education (CAEIAE) Program is an outreach program designed and operated initially by the National Security Agency (NSA) in the spirit of Presidential Decision Directive 63, National Policy on Critical Infrastructure Protection, May 1998. The NSA and the Department of Homeland Security (DHS) in support of the President’s National Strategy to Secure Cyberspace, February 2003, now jointly sponsor the program. The goal of the program is to reduce vulnerability in our national information infrastructure by promoting higher education in information assurance (IA), and producing a growing number of professionals with IA expertise in various disciplines. CSIAC partners with the NSA Centers of Excellence to gather information on cutting edge IA technologies discovered and developed by the research community. CSIAC leverages the findings of these centers to further the IA community as a whole.

The complete list of NSA/DHS current National CAE designated institutions can be found here: https://www.iad.gov/nietp/reports/current_cae_designated_institutions.cfm

Cyber Security Focused Organizations

  • Peter Kiewit Institute
    The Peter Kiewit Institute is shaped by the dynamic alliance of education and industry. The Institute’s mission is to fuel collaborations and fire the imagination of faculty, students and business alike. In so doing, the Institute offers exceptional career opportunities for students and provides the business community with a growing labor pool of skilled professionals.
  • The SANS Institute
    The SANS (System Administration, Networking, and Security) Institute is a cooperative research and education organization through which more than 96,000 system administrators, security professionals, and network administrators share the lessons they are learning and find solutions for challenges they face. SANS was founded in 1989.
  • Computer Operations, Audit, and Security Technology (COAST)
    Subsumed by The Center for Education and Research in Information Assurance and Security (CERIAS) in 1999, COAST was a multiple project computer security research laboratory in Purdue’s computer science department.
    Like CERIAS, COAST functioned with close ties to researchers and engineers in major companies and government agencies. COAST’s research focused on real-world needs and limitations, with a special focus on security for legacy computing systems.
  • CERT Program
    In a world in which the threat of cyber attacks is contained but not eliminated, and where threats from unknown sources are dynamic and constantly changing, the CERT Program mission is to identify, research, develop and mature, and broadly transition new technologies, system development practices, and system management practices that enable informed trust and confidence in using information and communication technology.
  • The Computer Security Institute
    An international membership organization offering training specifically targeted to information security professionals.
  • The Institute for Security Technology Studies (ISTS)
    ISTS at Dartmouth College is dedicated to pursuing interdisciplinary research and education for cyber security and emergency response technology.
  • National Security Agency Science of Security Initiative
    The National Security Agency Research Directorate sponsors the Science of Security Initiative to promote foundational cybersecurity science that is needed to mature the cybersecurity discipline and to underpin advances in cyberdefense. The SoS initiative works in several ways. 1) Engage the academic community for foundational research, 2) Promote rigorous scientific principles, and 3) grow the SoS community. The SoS Virtual Organization is the SoS’s initiative online home. More information about the NSA SoS Initiative Efforts.

sidebar

Page Sidebar

Featured Content

The DoD Cybersecurity Policy Chart

The DoD Cybersecurity Policy Chart

This chart captures the tremendous breadth of applicable policies, some of which many cybersecurity professionals may not even be aware, in a helpful organizational scheme.

View the Policy Chart

Featured Subject Matter Expert (SME): Cully Patch

An internal CSIAC SME with a passion for learning, teaching, and supporting the warfighter, Mr. Cully Patch has been a member of the CSIAC staff for 5 years. Cully was instrumental in leading the development and instruction of an extensive course on DoD Cybersecurity Analysis and Reporting (DoDCAR) - a threat-based approach to addressing system cybersecurity. As a senior program manager for cybersecurity and intelligence, Mr. Patch has extensive experience in providing cybersecurity training and education to both university students and military operators. Cully is a retired US Air Force military officer with career accomplishments in the fields of research, Intelligence, cybersecurity operations, planning, and technical course instruction. CSIAC is honored to have Mr. Patch as a subject matter expert, where he leads teams of technologists through problem solving, training program development, scientific and technical information generation, and analysis of complex system requirements.

View SME's Contributed Content

CSIAC Report - Smart Cities, Smart Bases and Secure Cloud Architecture for Resiliency by Design

Integration of Smart City Technologies to create Smart Bases for DoD will require due diligence with respect to the security of the data produced by Internet of Things (IOT) and Industrial Internet of Things (IIOT). This will increase more so with the rollout of 5G and increased automation "at the edge". Commercially, data will be moving to the cloud first, and then stored for process improvement analysis by end-users. As such, implementation of Secure Cloud Architectures is a must. This report provides some use cases and a description of a risk based approach to cloud data security. Clear understanding, adaptation, and implementation of a secure cloud framework will provide the military the means to make progress in becoming a smart military.

Read the Report

CSIAC Journal - Data-Centric Environment: Rise of Internet-Based Modern Warfare “iWar”

CSIAC Journal Cover Volume 7 Number 4

This journal addresses a collection of modern security concerns that range from social media attacks and internet-connected devices to a hypothetical defense strategy for private sector entities.

Read the Journal

CSIAC Journal M&S Special Edition - M&S Applied Across Broad Spectrum Defense and Federal Endeavors

CSIAC Journal Cover Volume 7 Number 3

This Special Edition of the CSIAC Journal highlights a broad array of modeling and simulation contributions – whether in training, testing, experimentation, research, engineering, or other endeavors.

Read the Journal

CSIAC Journal - Resilient Industrial Control Systems (ICS) & Cyber Physical Systems (CPS)

CSIAC Journal Cover Volume 7 Number 2

This edition of the CSIAC Journal focuses on the topic of cybersecurity of Cyber-Physical Systems (CPS), particularly those that make up Critical Infrastructure (CI).

Read the Journal

Recent Video Podcasts

  • Securing the Soft Underbelly of a Supercomputer with BPF Probes Series: The CSIAC Podcast
  • Defense Modeling and Simulation (M&S) Catalog: Art of the Possible Series: CSIAC Webinars
  • Explore the Innovare Advancement Center Series: The CSIAC Podcast
  • Cybersecurity Maturity Model Certification (CMMC): The Road to Compliance Series: The CSIAC Podcast
  • Deep Learning for Radio Frequency Target Classification Series: CSIAC Webinars
View all Podcasts

Upcoming Events

Thu 29

Data Connectors Phoenix Virtual Cybersecurity Summit

April 29
Organizer: Data Connectors
636-778-9495
May 17

SANS Purple Team Summit & Training 2021

May 17 - May 28
Organizer: SANS Institute
May 27

DockerCon LIVE 2021

May 27 @ 06:00 - 14:00 EDT
May 28

LayerOne 2021

May 28 - May 30
Oct 18

IEEE Secure Development Conference

October 18 - October 21
Organizer: Institute of Electrical and Electronics Engineers (IEEE)
View all Events

Footer

CSIAC Products & Services

  • Free Technical Inquiry
  • Core Analysis Tasks (CATs)
  • Resources
  • Events Calendar
  • Frequently Asked Questions
  • Product Feedback Form

About CSIAC

The CSIAC is a DoD-sponsored Center of Excellence in the fields of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management & Information Sharing.Learn More

Contact Us

Phone:800-214-7921
Email:info@csiac.org
Address:   266 Genesee St.
Utica, NY 13502
Send us a Message
US Department of Defense Logo USD(R&E) Logo DTIC Logo DoD IACs Logo

Copyright 2012-2021, Quanterion Solutions Incorporated

Sitemap | Privacy Policy | Terms of Use | Accessibility Information
Accessibility / Section 508 | FOIA | Link Disclaimer | No Fear Act | Policy Memoranda | Privacy, Security & Copyright | Recovery Act | USA.Gov

This website uses cookies to provide our services and to improve your experience. By using this site, you consent to the use of our cookies. To read more about the use of our site, please click "Read More". Otherwise, click "Dismiss" to hide this notice. Dismiss Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT