CyberSecurity Blog

Fountainhead's CyberSecurity Blog connects our community by sharing current events, news and trends in the industry. Join the discussion!


Jihadist Terrorism to be discussed at InfraGard meeting

Knoxville InfraGard Chapter Meeting


FBI Intelligence Analysts will discuss internet jihadists and insider threats at the next InfraGard Chapter meeting on Thursday, May 9th, at 4:30 pm at the Fountainhead College of Technology's campus at 10208 Technology Drive in West Knoxville. (See map below.)

This is an open meeting, so visitors are welcome.

During the last decade the greatest terrorist threat has comes from what is referred to as 'jihadist terrorism'. Certainly since 11 September 2001, many bloody terrorist attacks have been carried out under pretext of a religious armed struggle, known as the 'jihad'.


Security Professional Training Program

Cissp-logoAre you considering taking the CISSP exam in 2013? 

The SANS® +S™ Training Program for the CISSP® Certification Exam is designed to prepare you to pass the exam. This course is an accelerated review course that assumes the student has a basic understanding of networks and operating systems and focuses solely on the ten domains of knowledge as determined by (ISC)2.*

Starting April 30, 2013, you can prepare for the CISSP exam with The SANS Institute's Mentor program right here in Knoxville. This class is an accelerated review course that focuses on the ten domains of knowledge defined by ISC2. Each domain is dissected into its critical components, and every component is discussed in-depth. Test-taking tipsand strategies are also covered.

Class Dates: April 30 - June 2013

Time: 6:00-8:00PM once a week, over 10 Tuesday evening sessions 

Tuition: $3400 (Fountainhead students and faculty receive a 10%+ discount)

Registration information:

Class Location: Fountainhead College of Technology

Instructor: Richard Clowers, graduate and former instructor at Fountainhead College


NIST updates, expands glossary of security terms


The NIST Glossary of Key Information Security terms is a reference resource. The key points mentioned in the article relate to its usefulness in examining CNSS and NIST documents. The benefit for students and professionals in Network Security and Information Assurance is when the NIST Glossary is used in conjunction with the NIST NICE Framework.


NIST Updates, Expands Glossary of Security Terms

By William Jackson Dec 11, 2012

The National Institute of Standards and Technology is updating its Glossary of Key Information Security terms, and has released a draft of the latest revision(PDF) of Interagency Report 7298.

The glossary contains more than 200 pages of definitions, from “Access” (the ability to make use of any information system resource) to “Zone of Control” (the three-dimensional space surrounding equipment that processes classified and/or sensitive information). It defines the responsibilities of the chief information officer and describes the Security Content Automation Protocol (SCAP) as well as its specifications and languages.


Websites Seized in Cyber Monday

So You Think That You Got a Great Deal...


The following article offers a caution when purchasing those inticement deals that appear too good to be true. Always check out who you are purchasing from prior to proceeding with the commit button. Unfortunately, discounted products may look genuine as fraudulent companies manufacture stolen ideas that are forgeries. Who suffers besides the consumer ordering? We all do as a Nation as our intellectual property is targeted by those adversaries, who feel no compunction in violating intellectual property rights. Remember, durable goods are not the only items targeted, ineffective medicines can be also marketed as the genuine articles.


Government Hackers Train for Attacks

So You Say that You Want to Get in the CyberFIGHT...

washington_post_logoEveryone needs a place to get good at what they do. How will CyberWarriors get realistic training situations for potential conflicts? The answer is Cyber Ranges. These virualized environments allow the simulation of millions of users, along with the Critical Infrastructure of a city or country. By gaining knowledge of defending against simulated attacks, we can better understand how our defenses will fare. On the other hand, where is the fun in just being a defender of a target? Cyber Warriors will be play a critical role in future warfare and will need to have the understanding of their potential targets, if a conflict escalates. 

CyberCity allows government hackers to train for attacks

(by Robert O'Harrow, Jr. at The Washington Post on 11/26/2012)


University Teaches Cyber Espionage

Bond...Tech Bond. University of Tulsa Teaching Cyber Espionage...


Ahh... some Open Source information enters the picture regarding the mission of the Cyber Operations designated academic institutions. Originally, the Cyber Operations designation was slated to be placed under the Centers of Academic Excellence in Information Assurance Education. However, due to the funding source the US Congress decided that the designation required a degree of separation. Read on for a glimpse behind the curtain known as Cyber Operations.

University Of Tulsa Offers Course Training Students In Online Espionage

 (by James Gilbert of Elite Daily from the Huffington Post on 11/26/2012)

Back to Top