Professional Documents
Culture Documents
Introduction Preface...1 Websites Center for Internet Security......2 NIST3 True Crypt.4 OWASP5 Periodical Index Web of Science.6 Professional Journal The International Journal of Information Security Science...7 Government Resources Catalog of U.S. Government Publications..8 Statistical Abstract of the United States....9
Preface
Audience: This guide is intended to be used as a resource by undergraduate level students at the Penn State University involved in the security risk analysis major. This guide may also be used by students in a related field or as a reference for incoming students interested in joining the College of Information Science and Technology. Contents: This guide contains a collection of online resources that are both applicable and beneficial for undergraduate security risk analysis students. These sources can be used in many ways to help further your education here at Penn State. Whether you use this guide to help you study, find sources, or just to keep up on security topics and techniques, this guide may serve as a valuable resource throughout your collegiate career. The types of resources described in this guide include: Organization: Periodical index Professional journal Government catalog publication Statistical Abstract of the United States Websites
This resource guide is organized by the type of resource (see above content section to see the types of resources). Within each respective section, you will find the corresponding abstracts of the resources. The guide starts with some websites that are more low level in nature and progresses to the government resources that are more technical in nature towards the end of the document. At the top right hand corner of each page there is a recommendation section. Here you will find corresponding SRA major options indicating which resources will be most beneficial to you (depending upon your major option). This guide will use the abbreviations of the major names in the recommendations section or All Options if the resource is beneficial to all SRA majors. For clarification, the majors and abbreviations are listed below: Intelligence Analysis and Modeling (IAM) Information and Cyber Security (ICS) Social Factors and Risk (SFR)
Assumptions:
This guide assumes that the readers have a basic understanding of security risk analysis and its applications. This includes things like encryption, risk analysis, and social factors. Also, this guide assumes the reader is familiar with Penn State classes (ex. IST 301) and has an internet connection.
Tips:
The table of contents and the recommendations section of each abstract should be used to navigate the document quickly. Also, it is best to access these guides on a device that can download .pdf files as some of these resources can be used to locate specific articles and reference documents.
Website
Use this site to keep up on current cyber advisories so that you dont become a victim of current threats; this can be embarrassing and costly!
The security benchmarks assessment tool is the best way to grade your current internet security practices
Website
Website
Recommendations: ICS
True Crypt
Location: http://www.truecrypt.org/
Description: True Crypt is first and foremost an open-source encryption software. This means you can download True Crypt software from the website for free! However, the website itself is more than just a software download. If you go to the documentation page, the side scroll bar has the contents of a manual that will teach you all you need to know about different types of encryption. This site is great for SRA students to learn and experiment with different encryption and hash algorithms which will help you throughout your network security classes at Penn State, especially IST 451. Tips: If you are thinking about downloading the software, check out the Screenshots tab at the top of the page. This will give a visual of what the software looks like and how it works.
The FAQ or frequently asked questions tab is also useful if you are wondering about the details of the software download
To download the software click the Downloads tab and download the most recent version of the True Crypt software
Website
Tips: In order to find out about OWASP events go to the home page and scroll down on the home page until you see a list labeled Global OWASP Events
Search Guide to Cryptography to find a good resource for students of SRA interested in cryptography
Periodical Index
Web of Science
Location:
http://apps.webofknowledge.com.ezaccess.libraries.psu.edu/WOS_GeneralSearch_input.do?product =WOS&search_mode=GeneralSearch&SID=4ElqoDriBGgrpPrdJhR&preferencesSaved=
Description: Web of Science is a periodical index which means that it is a resource that allows to find periodical articles by subject or author. Web of Science has plenty of security related documents. This is a great website to use when doing research for a project. In order to use the website, you simply search using the Basic Search bar right on the home page. You can refine your search by field, topic, and timespan. Once you search for an article you will come to a page with a list of documents. Once you get to this page, you can begin browsing articles that are of interest to you. Start by clicking the View Abstract button to see a small but detailed description of the article. After finding an article you want to read, click the Full Text button. Tips: To order your search results, use the Sort By drop down bar at the top of the page. This will allow you to sort using things like publication date, times cited, and relevance to your search. Selecting a research domain on the left hand side of the results page will weed out all articles that are not related to the domain you want to use
Some articles require an account to view; To make an account, go to the upper right corner of the website and choose Sign In and you will prompted to make an account or sign in.
Journal
Description: The international journal of information security science is a quarterly published journal and is very useful for all SRA students or students interested in information security. The journal is established to keep you informed about recent developments, techniques and technologies in information security science and engineering. The journal has articles related to many different security related topics including securing networks, computers, databases, coding, digital forensics, surveillance technology, and even artificial intelligence. This can be a great resource to find scholarly articles for IST or SRA related research papers. The journal archives are easily accessible from the top menu.
Tips: Click search on the top of the page to search for a certain topic
If you would like to search by the most current there click the CURRENT tab
Once you select an article it will give you an abstract and a link to the full text of the journal article
Government Resource
Also at the top of the page are display options. If you would like to display more or less of each article in your search results click Extended or Brief
If you are having trouble finding an article or you want to find a specific article you can use the advanced search. Click Advanced at the top of the screen to get to the advanced search page.
Government Resource
If you do not find articles you need in the above mentioned sections, you can use the search bar in the upper right hand corner of the page to find related statistics
If you want to find stats from previous versions of the abstract, click the Earlier Editions tab and select the year you want to find statistics about