This is an alert ×

Search Query

    Search Options

Showing results - 1 to 6 of 6
Computer security:
31:01

Computer security:

Some data thieves break into PCs electronically from remote locations, while others walk right in the front door during business hours. This program addresses the vulnerability of data stored on hard drives, on file servers, on removable media, and ...

Identity Theft: Scammed
19:52

Identity Theft: Scammed

Identity theft has become a major and common type of fraudulent crime worldwide. Whether it involves forging documents or stealing personal information, identity theft is not limited by borders and it affects people of all walks of life. In this epi...

CyberSecurity
20:52

CyberSecurity

The Internet offers vast possibilities for learning, making a living, and having fun - but it can also destroy reputations, empty bank accounts, and ruin lives. This program cautions students about potential hazards to their computers - not to menti...

Sc@mmed: Online Identity Theft
00:01

Sc@mmed: Online Identity Theft

Bouncing between Canada and the U.S., Sc@mmed exposes an urgent problem of global proportions: phishing, the illegal gathering of others’ personal information online in order to steal all their money—and even their identities. Through the cautio...

Hackers: outlaws and angels
59:33

Hackers: outlaws and angels

This alarming program reveals the daily battle between the Internet’s outlaws and the hackers who oppose them by warding off system attacks, training IT professionals and police officers, and watching cyberspace for signs of imminent infowar. Thro...

Activity at the Michigan Cyber Range
17:11

Activity at the Michigan Cyber Range

Joe Adams will update a number of Cyber Range activities, including its use in academic courses, a new set of Range hardware at Northern Michigan University, and a Red Team/Blue Team exercise recently conducted in Grand Rapids and Ann Arbor.