24th Air Force   Right Corner Banner
Join the Air Force

Library > The Cyber Space
The Cyber Space

Welcome to the Cyber SpaceWelcome to the Cyber Space - where readers can find information of interest and cyber security tips provided by 24th Air Force and other government entities. The content is intended to be a "one-stop shop" of useful and educational links, stories and materials for both Air Force members and the public. All content is unclassified and can be shared with family and friends. If you have suggestions of additional, non-copyrighted content, please  e-mail the 24th Air Force Public Affairs office at 24af.pa@us.af.mil.

The appearance of hyperlinks does not constitute endorsement by 24th Air Force, Air Force Space Command, the United States Air Force, or the Department of Defense of the external Website, or the information, products, or services contained therein. For more information, click this link.
tabWhite House Fact Sheets on Cyberspace 
tabAFCYBER Commander's Highlights 
The NSA's Cyber Best Practices for Home ComputingBest Practices for Keeping Your Home Network Secure
This document is one of many the Information Assurance Directorate of the National Security Agency freely provides to the public outlining practical tips for improving the security of all kinds of applications, operating systems, routers, databases and more. This latest guide will go a long way in helping those who are interested to protect both their public and private networks.
tabU.S. Government Reports on Cyber 
tabCyber Security Bootcamp 
San Antonio boasts an abundance of cybersecurity talent. Every year skilled cybersecurity specialists transition from government service to civilian roles. These members of our community are armed with the highest level of technical skills and may have developed or considered concepts or innovations that can be the catalyst for new cybersecurity solutions or business opportunities. These opportunities can grow into commercial businesses that will drive our local economy.

The San Antonio Chamber of Commerce has organized a quarterly bootcamp that will equip entrepreneurial men and women who are leaving government service with the skills and knowledge to consider creating a new business right here in our community.

This bootcamp is open to all transitioning military and government civilian employees with previous cybersecurity/information assurance expertise. The program will expose cybersecurity talent to key business concepts. The bootcamp is conducted by professionals who have built successful businesses in cybersecurity after leaving military service. This mentored program is designed to open the door for new commercial cybersecurity companies in our community to complement the federal and private sector assets in San Antonio. (Information c/o San Antonio Chamber)

For information on how to sign up for the San Antonio Chamber's Cyber Security Bootcamp, check out their website
tabSocial Networks - Cyber Tips 
Check out the 2013 Air Force Social Media Guide for information on how to post and interact safely and appropriately on social media.   
tabCyber Tip of the Week 
Courtesy of the Department of Homeland Security:

Got a new phone? Be sure to remove the SIM card from your old one before you get rid of it. See more cybertips on disposing mobile devices here.  

Follow DHS Cybersecurity on Twitter @cyber for more cybersecurity tips. 
tabUS-CERT Self Help Center 
US-CERT Self Help CenterThe United States Computer Emergency Readiness Team's mission is to improve the nation's cybersecurity posture, coordinate cyber information sharing and proactively manage cyber risks to the nation while protecting the constitutional rights of citizens of the United States. They are the operational arm of the National Cyber Security Division at the Department of Homeland Security. Below are links to information provided by US-CERT to assist the public with operating cyberspace technology in a more secure manner. For more information, visit the US-CERT Website.

US-CERT Monthly Activity Summary - September 2011

Recognizing and avoiding e-mail scams

Playing it safe: avoiding online gaming risks

Banking securely online

Socializing securely: using social networking services

Cyber threats to mobile phones

Using wireless technology securely

Software license agreements: ignore at your own risk

An overview of spyware

Small office/home office router security

The basics of cloud computing

Office Encryption Instructions

 Inside 24AF

ima cornerSearch

tabStories of Interest - Today
tabStories of Interest - This Week
tabStories of Interest - This Month
tabCyberspace Organizations

Site Map      Contact Us     Questions     USA.gov     Security and Privacy notice     E-publishing  
Suicide Prevention    SAPR   IG   EEO   Accessibility/Section 508   No FEAR Act