US-CERT
Sign Up to receive Cyber Alerts by email.
Resources
Resources include links to a variety of security-related documents and other sources of security information.

All Publications
The List of Publications offers an at-a-glance view of the documents on the US-CERT site.

Reading Room
The Reading Room offers a collection of security-related documents for new and experienced users alike.

Links to Other Sources

Sources of Vulnerability Information

Common Vulnerabilities and Exposures List (CVE)
Search vulnerabilities by CVE name or browse the US-CERT list of vulnerabilities in CVE name order.

Open Vulnerability Assessment Language (OVAL)
Identify vulnerabilities on your local systems using OVAL vulnerability definitions.

Sources of Funding for Cyber Security Education

Federal Cyber Service: Scholarship for Service Program (SFS)
The SFS program seeks to increase the number of skilled students entering the fields of information assurance and computer security.

National Centers of Academic Excellence in Information Assurance Education (NCAEIAE)
The NCAEIAE program strengthens higher education in information assurance programs to meet America's growing requirements for cyber security professionals.

Sources of Government Guidelines

E-Government Act of 2002 including Title III - The Federal Information Security Management (FISMA) Act 
The purpose of this Act is to enhance the management and promotion of electronic government services and processes. Title III of this act is the Federal Information Security Management Act of 2002. The E-Government Act permanently supersedes the Homeland Security Act in those instances where both Acts prescribe different amendments to the same provisions of the United States Code.

Office of Management and Budget Guidance on FISMA 
The subject of this memorandum is Reporting Instructions for the Federal Information Security Management Act and Updated Guidance on Quarterly IT Security Reporting.

Homeland Security Presidential Directive/HSPD-7
This directive establishes a national policy for Federal departments and agencies to identify and prioritize United States critical infrastructure and key resources and to protect them from terrorist attacks.

Additional Security Information

Review this list for other sources of cyber security information.*

National Infrastructure Advisory Council's Vulnerability Disclosure Framework
http://www.dhs.gov/interweb/assetlibrary/vdwgreport.pdf 

Stay Safe Online
http://www.staysafeonline.info/

CERT Coordination Center
http://www.cert.org

Center for Education and Research in Information Assurance and Security (CERIAS)
http://www.cerias.purdue.edu/tools_and_resources/

Forum of Incident Response and Security Teams (FIRST)
http://www.first.org

National Institute of Standards and Technology (NIST)
Security Practices & Checklists
Special Publications

Operationally Critical Threat and Vulnerability Evaluation (OCTAVE)
http://www.cert.org/octave/

SANS Institute
http://www.sans.org/

National Cyber Security Partnership
http://www.cyberpartnership.org

Information Security Management References
http://reform.house.gov/UploadedFiles/
Best%20Practices%20Bibliography.pdf
 


* We've provided links for information and convenience only.
Last updated October 01, 2004