{"id":336,"date":"2007-10-31T23:48:02","date_gmt":"2007-10-31T21:48:02","guid":{"rendered":"http:\/\/www.mitternachtshacking.de\/blog\/336-sans-cyber-security-awareness"},"modified":"2009-03-15T20:12:07","modified_gmt":"2009-03-15T19:12:07","slug":"sans-cyber-security-awareness","status":"publish","type":"post","link":"https:\/\/www.mitternachtshacking.de\/blog\/336-sans-cyber-security-awareness","title":{"rendered":"SANS Cyber Security Awareness"},"content":{"rendered":"<p>Das <a href=\"http:\/\/www.sans.org\/\">SANS Institute<\/a> hat den <a href=\"http:\/\/www.incidents.org\/diaryarchive.html?year=2007&amp;month=10\">Monat Oktober<\/a> zum Cyber Security Awareness Monat ausgerufen und zu diversen Themen ein paar Artikel ver\u00f6ffentlicht:<\/p>\n<ul>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3438\">Tip #1: Penetrating the This Does Not Apply To Me Attitude<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3444\">Tip #2: Multimedia Tools, Online Training, and Useful Websites<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3447\">Tip #3: Getting the Boss Involved<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3456\">Tip #4: Enabling the Road Warrior<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3458\">Tip #5:  Social Engineering and Dumpster Diving Awareness<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3459\">Tip #6: Developing policies and Distribution<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3460\">Tip #7:  Host-Based Firewalls and Filtering<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3468\">Tip #8: Anti-Virus, Anti-Spyware, and Other Protective Software<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3474\">Tip #9: Access Controls, Including Wireless, Modems, VPNs, and Physical Access<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3489\">Tip #10: Authentication Mechanisms<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3492\">Tip #11: File System Backups<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3495\">Tip #12: Managing and Understanding Logs on the Desktop or Laptop (AV, Firewall, or System Logs)<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3498\">Tip #13:  Patches and Updates<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3501\">Tip #14: Data Encryption<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3502\">Tip #15: Protecting Laptops<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3506\">Tip #16: Protecting Portable Media<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3507\">Tip #17: Windows XP &amp; Vista Security<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3512\">Tip #18: Mac Tips<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3514\">Tip #19: Linux tips<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3522\">Tip #20: Software Authenticity<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3525\">Tip #21: Understanding Online Threats<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3526\">Tip #22: Detecting and Avoiding Bots and Zombies<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3534\">Tip #23: Using Browsers, SSL, Domain Names<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3540\">Tip #24: Not all patches are released on a <\/a><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3540\">Tuesday<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3543\">Tip #25: E-mail (PGP, Attachments, etc), IM, IRC<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3554\">Tip #26: Safe File Transfer<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3568\">Tip #27:  Online Games and Virtual Worlds<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3573\">Tip #28: Cookies<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3575\">Tip #29: Insider Threats<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3577\">Tip #30: Blogging and Social Networking<\/a><\/li>\n<li><a href=\"http:\/\/www.incidents.org\/diary.html?storyid=3585\">Tip #31: Legal Awareness (Regulatory, Statutory, etc.)<\/a><\/li>\n<\/ul>\n<p>Nicht alle lohnen sich zu lesen, aber #11 finde ich z.B. spannend.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Das SANS Institute hat den Monat Oktober zum Cyber Security Awareness Monat ausgerufen und zu diversen Themen ein paar Artikel ver\u00f6ffentlicht: Tip #1: Penetrating the This Does Not Apply To Me Attitude Tip #2: Multimedia Tools, Online Training, and Useful Websites Tip #3: Getting the Boss Involved Tip #4: Enabling the Road Warrior Tip #5: [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[3,6],"tags":[],"_links":{"self":[{"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/posts\/336"}],"collection":[{"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/comments?post=336"}],"version-history":[{"count":0,"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/posts\/336\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/media?parent=336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/categories?post=336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/tags?post=336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}