Employees' Guide to Security Responsibilities

Computer and Other
Technical Vulnerabilities

Computer Vulnerabilities
Threats to computer security, how hackers work, and how we unintentionally make it easy for them. Passwords, "social engineering," case studies, using the Internet securely, e-mail, viruses, security of hard drives, theft of laptop computers.

Intercepting Your Communications
Telephones, fax machines, cell phones, cordless phones, answering machines, voice mail, intercoms and baby monitors, countermeasures.

Bugs and Other Eavesdropping Devices
Eavesdropping threat. Methods of eavesdropping. Detecting and Preventing Eavesdropping.

 

HOME    |    HELP

INFORMATIONCONDUCT | THREATS  | TECH VULNERABILITYASSISTANCE
SPY STORIES  | TREASON 101