Liikan Jitsu mainpage Security Infosites

Home About Us Events & News Training Activities Iltispuolustus Join Us Contact Us



External Links
Liikan Jitsu Meetup
Training Events
& Registrations
Liikan Jitsu (Facebook)
Chat Forum &
Video Tutorials

Helsinki Kyusho Study Group (Facebook)
Chat Forum &
Video Tutorials

Liikan Jitsu Channel
Public Videos
Personal Security Academy
Personal Security


Kyusho in-line learning (Website)


Kyusho eLearning


Security & Risk Management

Links to external information sites

Moving or travelling abroad? Working with Computers? Interested in Physical Security Management or Crisis Intervention in general? 

Here are a few links for general use and research across most areas of 'security' issues plus a couple of  Link-Portals. Should the link URL be out of date, try a search on some keywords & then let us know what the new address is.

Links to current and topical news reports and articles can be found via the links on the left side of this page.

Page Contents - GO TO
Physical Security
Physical Security  & in general
Travel Security Info & Agencies
Standards, Organisations & Forums
Computer Security (& other)
Finland / Suomi Agencies Finnish Agencies written in Finnish Language.

Linkeja Suomen kielilla

Physical Security (& general portals)


UK Home Office
The UK Home Office: research & Development Statistics Directorate (RDS):

Crime Stoppers

Security Magazine - is designed to facilitate discussion on security related topics, create security awareness, and to provide the Internet's largest and most comprehensive database of security knowledge and resources to the public. New home of the BugTraq.

Find practical business information on terrorism.


IFPO Internal Foundation for Protection Officers (Educational & Training Organisation)

Body Guarding

American Society for Industrial Security (ASIS) - International organization for professionals responsible for security. Dedicated to increasing the effectiveness and productivity of security practices by developing educational programs and materials that address broad security concerns.

Security Management - the official magazine of ASIS (American Society for Industrial Security) updated monthly, it has features running the full gambit of security.

IInformation System Security Resource @ Algonquin College - featuring over 7000 links and articles on all areas of security.

Wassenaar Arrangement - on export controls for conventional arms and dual-use goods and technologies.

Suomen Poliisi

Finnish Customs & Excise Office / Regulations  - The Pinkerton Agency & Securitas - Disease Prevention Centers - travelers health!

US Occupational Health & Safety - OSHA Regulations (Standards - 29 CFR) - US Environmental Protection agency  - Police Services of the UK - UK Crime Reduction Index Page - Out of School: Department of Education & Employment, Health & Welfare - Childline Fact Sheets - Bullying - UK Metropolitan Police StreetWise Guides - UK MPP (Metropolitan Police) Service Website Indexpage. - Bully On-Line

Travel Security Info & Agencies

Private Agencies

Air Security International

Centers for Disease Control and Prevention (CDC) - Promotes health and quality of life by preventing and controlling disease, injury, and disability

Campaign For Arms Control:

Control Risks Group - Provides various information on Essentials. There is up-dated information such as Business Essentials (=political, security and travel risk rating), Business Planner and Business Traveller. Many Nokia travellers wish to check certain details about the country they are travelling to. This service is an easy way to have that information whenever needed.

Diplomatic Security Service / U.S Department of State

Matkailijan terveysopas -

Overseas Security Advisory Council (OSAC) -

Brittish Foreign & Commonwealth Office.  

Australian Foreing Affairs & Trade.


Public Agencies

Diplomatic Security Service / U.S Department of State

Matkailijan terveysopas - Kansanterveyslaitos

Overseas Security Advisory Council (OSAC) - Established by the U.S. Department of State to foster the exchange of information between American companies with overseas operations and the U.S. Government.

Travel Advice - by Brittish Foreign & Commonwealth Office.

Travel Advice - by Australian Foreing Affairs & Trade.

Cabinet-Office / Security Division (UK) -


Communications-Electronics Security Group (CESG) -

Computer Incident Advisory Capability (CIAC) - 

Computer Security Resource Clearinghouse (CSRC) -

Defense Security Service (DSS)

Federal Bureau of Investigation (FBI) 

Federal Computer Incident Response Capability (FedCIRC) -.

Security (GITS-Sec) - 

Information Systems Security Organization (ISSO) -

MI5 (UK) 

NASA Automated Systems Incident Response Capability (NASIRC)

National Infrastructure Protection Center (NIPC) -

.National Security Agency (NSA) 

Suojelupoliisi (SUPO) 

United States General Accounting Office (GAO) - 


Standards, Organisations & Forums


The Security Forum - European branch.

ASSIST-QuickSearch - (Acquisition Streamlining and Standardization Information System) is a database system for DOD-wide standardization document information management. ASSIST is comprised of three standardization databases: the DODISS, the SD-4, and the AMSDL.

BS 7799 (BSi)

BS 7799 c:cure - Standard for information security management.

BS 7799 vs. ISF Standard of Good Practice for Information Security - Comparison of the ISF Standard of Good Practice for Information Security and BS 7799 - Briefing Paper by ISF.

BS7799:1995 Tietoturvariskien hallinnan apuna - Qualitas Fennica Oy:n artikkeli.

Common Criteria (CC) - for Information Technology Security Evaluation. ISO FDIS 15408

Control Objectives for Information and Related Technology (COBIT) - has been developed as a generally applicable and accepted standard for good Information Technology (IT) security and control practices that provides a reference framework for management, users, and IS audit, control and security practitioners.

Defence CIS Standards Executive Group (DCISSEG) - The DCISSEG is part of DGICS which is part of the UK Ministry of Defence (MOD). On this site you will find details about CIS Standards for use by the MOD.

DISA Standards Document Library - This Library contains selected Information Technology standards and guidance.

DoD 5220.22-M - National Industrial Security Program Operating Manual (NISPOM)

Federal Information Processing Standards (FIPS) - Standards and guidelines that are developed by the NIST for Federal computer systems. NIST develops FIPS when there are compelling Federal government requirements such as for security and interoperability and there are no acceptable industry standards or solutions.

GAO Policy and Guidance Materials - United States General Accounting Office

HMG Infosec Standard - CESG
No 1: Assurance requirements for IT systems
No 2: Accreditation documents

IETF Internet-Drafts - Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups.

IETF RFC data base - Search the RFC Database.

Information Technology (IT) Security Publications - The Royal Canadian Mounted Police (RCMP)

INFOSEC - contains the results of actions in the field of Information Security which were conducted from 1996 to 1998 and are now complete. The results of some earlier work is also available.

IT Baseline Protection Manual - Recommended measures to meet medium-level protection requirements, BSI

Manual of Protective Security (MPS) - Cabinet Office Security Division (UK)

NIST Federal Information Processing Standards on Computer Security - NIST FIPS and associated documents having to do with Computer Security.

OII - Information Security Standards - This section of the OII Standards and Specifications List provides information on standards and specifications that can be used to ensure the security of data interchanged between open systems.

OII Guide to Information Security - This guide is intended to provide guidance on standards and specifications in information security. It serves as a compendium to the Information Security Standards section of the OII Standards and Specifications List.

Rainbow Series (NSA/NCSC) - The Rainbow Series is six-foot tall stack of books on evaluating "Trusted Computer Systems" according to the National Security Agency. The term "Rainbow Series" comes from the fact that each book is a different color. The main book (upon which all other expound) is the Orange Book.

Rainbow Series Books FAQ - a guide to the Rainbow Books.

RFC 2196 - Site Security Handbook - A guide to developing computer security policies and procedures for sites that have systems on the Internet. The purpose is to provide practical guidance to administrators trying to secure their information and services. The subjects covered include policy content and formation, technical system and network security topics, and security incident response.

RFC 2504 - Users' Security Handbook - the companion to the Site Security Handbook (SSH). It is intended to provide users with the information they need to help keep their networks and systems secure.

Standard of Good Practice (SOGP) - Information Security Forum's (ISF) Standard for information security.

Systems Security Engineering Capability Maturity Model (SSE-CMM) - describes the essential characteristics of an organization?s security engineering process that must exist to ensure good security engineering. The SSE-CMM does not prescribe a particular process or sequence, but captures practices generally observed in industry.

X.509 - Public-Key Infrastructure (pkix)


American Society for Industrial Security (ASIS) - International organization for professionals responsible for security. Dedicated to increasing the effectiveness and productivity of security practices by developing educational programs and materials that address broad security concerns.

Business Software Alliance (BSA)

Center for Education and Research in Information Assurance and Security - (CERIAS)

Communications Security Establishment - Department of National Defense, Canada

Computer Emergency Response Team (CERT) - studies Internet security vulnerabilities, provides incident response services, publishes security alerts, researches security and survivability.

Computer Operations, Audit, and Security Technology (COAST)

Computer Security Institute (CSI)

Computer Security Research Centre (CSRC) - for the study of complex management problems in computer technology.

Disaster Recovery Information Exchange (DRIE) - Canada-wide organization with mandate to promote professionalism and to facilitate the exchange of ideas and information amongst its members.

Forum of Incident Response and Security Teams (FIRST) - A aims to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents, and to promote information sharing.

Foundation for Information Policy Research (FIPR) - an independent body that studies the interaction between information technology and society. Our goal is to identify technical developments with significant social impact, commission research into public policy alternatives, and promote public understanding and dialogue between technologists and policy-makers in the UK and Europe.

Information Security Forum (ISF) - An independent, not-for-profit association of leading organizations dedicated to clarifying and resolving key issues in information security and developing security solutions that meet the business needs of its members.

Information Systems Audit and Control Association (ISACA)

Information Systems Security Association (ISSA) - A nonprofit international organization of information security professionals and practitioners. Provides education forums, publications and peer interaction opportunities.

INFOSEC - from DG XIII of the European Commission. Security of Telecommunications and Information Systems.

International Association for Cryptologic Research (IARC)

International Computer Security Association (ICSA)

International Information Systems Security Certification Consortium (ISC)2 - established as a nonprofit corporation to develop a certification program (CISSP) for information systems security practitioners.

Internet Engineering Task Force (IETF)

Open Relay Behaviour-modification System (ORBS) - is a database for tracking SMTP servers that have been confirmed to permit third-party relay. These servers permit spammers to connect to them and then forward the spam to its intended victims.

SANS Institute - a cooperative research and education organization. offers educational conferences. Produces cooperative research reports, electronic digests, posters of authoritative answers to current questions, and cooperatively-created software.

Systems Security Engineering Capability Maturity Model (SSE-CMM)

UK ITSEC scheme - Under the UK ITSEC scheme, the security features of IT systems and products are tested independently of suppliers to identify logical vulnerabilities.

USENIX Association - is the Advanced Computing Systems Association.

Advisory Agencies

Bugnet - 

AntiCode - Exploits sorted by OS.

CERT/CC Advisories

CERT/CC Vulnerability Notes

CIAC - Information Bulletins and Advisory Notices

Cisco - Internet Security Advisories

Exploits - collected by

FedCIRC Advisories, Vulnerability Notes and Incident Notes

L0pht Heavy Industries - Security Advisories

Microsoft Current Security Bulletins - A list of security-releated issues with MS products.

Microsoft Premier Alert Service - FTP mirror provided by Nokia IM/Office Applications

NAI Labs Security Advisories

NIPC Advisories, Alerts and Warnings

NIPC CyberNotes - is published by the National Infrastructure Protection Center (NIPC). Its mission is to support security and information system professionals with timely information on cyber vulnerabilities, hacker exploit scripts, hacker trends, virus information, and other critical infrastructure-related best practices.


S.A.F.E.R - Security Alert For Enterprise Resources - A monthly security update for I.T. Professionals and Executives. Information is compiled and summarized, giving essential developments, advice and news to subscribers.

SANS Global Incident Analysis Center (GIAC) - Up-to-date digests of malicious activity on the net submitted by international community of system administrators and analysts.

SANS Security Digests - Weekly NewsBites + monthly NT & Network Security Digests.

The X-Forse (ISS) - Most wanted alert list

Computer Security


ABC Security Flash - Security, bugs, virus, Y2k,...

Computer Sweden

Crypto-Gram Newsletter - is a free monthly e-mail newsletter on cryptography from Bruce Schneier (Counterpane Systems).

Federal Computer Week - news for the US government IT community.

Hacker News Network (HNN) - Up to the minute news on info-security, hacking, infowar, attacks and related news, reviews and opinion.

Network Computing

OSAll Network - computer security news & information.

Secure Computing Magazine - contains full coverage of international computer security news, individual product reviews, comparative product reviews, security articles and other information about computer security.

Security Magazine - Information for private and public sector security executives.

Security Management - the official magazine of ASIS (American Society for Industrial Security) updated monthly, it has features running the full gambit of security.

Security News - collected by

Security Wire Daily - dedicated to providing corporate security professionals with the information and resources needed to protect their networks. We summarize breaking security news and provide a jumping off point for Security Alerts, Products, Tools and other Resources.



X-Forse in the news - by ISS  

Security Resources

Computer Security Institute, Knowledge, Solutions & New Technologies

AstaLaVista - search engine for computer security related material.

bitpipe - a research database that specializes in locating in-depth technology research and analysis reports.

Information System Security Resource @ Algonquin College - featuring over 7000 links and articles on all areas of security.

L0pht Heavy Industries - research and documents security flaws that exist in the internet infrastructure. Including operating systems, networking protocols, or applications.

Microsoft Security Advisor

OpenSEC - Open security solutions.

Packet Storm

Rootshell - publish information describing security problems in a wide array of operating systems. Often including a working example.

Security Search - a search engine designed to provide internet users with links to IT security information and resources. - is designed to facilitate discussion on security related topics, create security awareness, and to provide the Internet's largest and most comprehensive database of security knowledge and resources to the public. New home of the BugTraq. - developed and funded by AIS, dedicated to providing corporate security professionals with the information and resources needed to protect their networks. We summarize breaking security news and provide a jumping off point for security alerts, products, tools and other resources.

Shields UP! - Internet Connection Security for Windows Users by Steve Gibson, Gibson Research Corporation.

Sniffing (network wiretap, sniffer) FAQ

Whitehats Networks Security - a resource to help network and security administrators by offering free software and community support. 


40hex Virus coding 'zine - This is a down and dirty zine on wich gives examples on writing viruses and this magazines contains code that can be compiled to viruses.

Computer Virus Help by Henri Delger - with the current suspension of the VIRUS-L/comp.virus list it forms the oldest and most reliable ongoing interactive virus information resource on the net.

Computer Virus Myths - Learn about the myths, the hoaxes, the urban legends, and the implications if you believe in them.

F-Secure Computer Virus Info Center - Data Fellows computer virus information service.

Symantec AntiVirus Research Center - is committed to providing swift, global responses to computer virus threats, proactively researching and developing technologies that eliminate such threats and educating the public on safe computing practices.

The WildList by Joe Wells

Threat Assessment of Malicious Code and Human Threats - This report provides an assessment of the threats associated with malicious code and external attacks on systems using commercially available hardware and software. The history of the threat is provided and current protection methods described. A projection of the future threats for both malicious code and human threats is also given. NIST/Computer Security Division

Update of Norton antivirus files - Norton Antivirus update page mainly for home users.

Virus Bulletin - is technical journal on developments in the field of computer viruses and anti-virus products.

Virus Busters - The University of Michigan Virus Busters are a group of Information Technology Division staff members at the U-M dedicated to assisting the U-M community with the control and prevention of computer viruses.


Hackers United

2600 - the Hacker Quarterly - A Large Underground File Archive.

Anti-Social Magazine - UK Underground ezine including scene such as : hacking, phreaking, rave, technology and other scenes considered at large "antisocial".


Chaos Computer Club e.V.

Cult of the Dead Cow

Hacker Emergency Responce Team (HERT) - goal is to provide accurate information about computer security vulnerabilities, provide incident response services to sites that have been the victims of attacks, publish security alerts and find new vulnerabilities.

Happy Hacker - a non-profit organization dedicated to computer security edication.

Passw0rld - provides free password recovery tools for most software.

Phrack Magazine


Advanced Encryption Standard (AES) - has all current NIST information pertaining to the AES development effort.

Crypto-Gram Newsletter - A free monthly e-mail newsletter on computer security and cryptography from Bruce Schneier (Counterpane Internet Security, Inc).

Cryptography A-2-Z by SSH - This page lists international sources of cryptographic software, information on cryptographic methods, algorithms, and protocols. The scope includes encryption, decryption, cryptanalysis, steganography (hiding information), cryptographic softare, tools, information, and assessments about cryptographic methods.

Cryptography and Liberty 1999 - An International Survey of Encryption Policy, Electronic Privacy Information Center, Washington, DC. - international survey of encryption policies around the world. Report includes information on the impact of the Wassenaar Arrangement and other major developments. (very long document)

Cryptome - at

Data Encryption Page - contains details for various encryption algorithms like RSA, Diffie- Hellman, DES, BlowFish, TwoFish, IDEA, etc. Details regarding random number and prime number generation. Storage of large number is explained. A large number of cool links is present. Software for free download.

Encryption and Security-related Resources - by Peter Gutmann

European Crypto Page - offers a relatively large collection of European cryptography oriented links.

FIPS 140-1, Security Requirements for Cryptographic Modules - specifies the security requirements that are to be satisfied by a cryptographic module utilized within a security system protecting unclassified information within computer and telecommunication systems (including voice systems).

Frequently Asked Questions About Today's Cryptography - This FAQ covers the technical mathematics of cryptography as well as export law and basic fundamentals of information security. RSA Laboratories

GNU Privacy Guard - is a complete and free replacement for PGP. Because it does not use IDEA or RSA it can be used without any restrictions. GnuPG is a RFC2440 (OpenPGP) compliant application.

Handbook of Applied Cryptography - Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone. On-line version.

Interception Capabilities 2000 - Special Report on U.S. Led Spy Satellite System. A detailed report on Echelon was released to the European Parliament's Science and Technology Options Assessment Panel (STOA).

International Association for Cryptologic Research (IACR) - non-profit scientific organization whose primary purpose is to further research in cryptology and related fields. IACR is involved in a variety of activities described here.

Lars R. Knudsen - University of Bergen.

RSA Data Security

Snake Oil Warning Signs: Encryption Software to Avoid - Matt Curtin

Steganography - This paper introduces steganography by explaining what it is, providing a brief history with illustrations of some methods for implementing steganography, and comparing available software providing steganographic services. Though the forms are many, the focus of the software evaluation in this paper is on the use of images in steganography. Neil F. Johhnson

U.S. Department of Commerce/Bureau of Export Administration (BXA) - Encryption Web Page.

US Export control - by Thomsen and Burke LLP including Encryption Legislation and Encryption Legislation History.

Wassenaar Arrangement - on export controls for conventional arms and dual-use goods and technologies.

Virtual Private Networks

Automotive Network Exchange (ANX) - The home page for the IPSec interoperability and network performance testing sponsored by the automotive industry.

Virtual Private Network Consortium - The international trade association for manufacturers of virtual private networking products.

VPN Information on the World Wide Web - This Web site grew out of Tina Bird's personal and professional research into virtual private networks. It is maintained without commercial or vendor sponsorship. All information provided is intended to be vendor-neutral and to discuss virtual private network technologies without bias.

Finland / Suomi - Agencies

EDI/OVT tietoturvallisuussuositus - dokumentti m?rittelee yhten?sen menettelytavan EDI-tietoturvallisuuden toteuttamiseksi (TIEKE).

EDI/OVT Tietoturvaryhm伯a> - TIEKEn ty?yhm䮼/font>


PKT-yritysten tietoturvallisuusopas - Oppaassa selostetaan, mit?aki sanoo tietoturvallisuudesta ja mit?bsp; oikeudenk?nneist?n opittu. Annetaan ohjeita yrityksen tietoturvallisuusohjelman laatimiseksi, k?itell?n yrityksen tietoturvallisuusvastuita ja selvitell?n tietoaineiston luokittelua. Teollisuuden ja Ty?antajain keskusliitto.

Systeemity?ehti. N:o 3/99 - Tietoturvallisuus erikoisnumero.

Tietoj?jestelmien tarkastus ja valvonta ry - on tietoj?jestelmien tarkastuksen, valvonnan ja tietoturvallisuuden kanssa ty?kentelevien yhdistys. Tavoitteena kehitt? ja edist? tietoj?jestelmien rakentamis- ja tietojenk?ittelytapaa sek?ll?it? j?enten ammattitaitoa.

Tietosuojavaltuutetun toimisto

Tietotekniikan kehitt?iskeskus ry (TIEKE) - on tietotekniikan toimialan kansallinen yhteisty?rganisaatio, jonka tarkoituksena on palvella j?enist?? sek?aamme koko elinkeinoel?? toimimalla yhteisty?oorumina tietoyhteiskunnan k?t?t?en kehitt?isess䮼/font>

Tietoturva ry - tukee j?enten pyrkimyksi?ehitt? ja yll?it? tietoturvatoiminnan ammattitaitoa ja laatua, edist? tietoturvallisuutta ja hyvien tietoturvatapojen noudattamista.

Tietoturvan ongelmat korvien v?iss伯a> - Helsingin yliopiston psykologian professorin G?e Nymannin haastattelu Hesarissa 24.9.99.

TIVEKE - Liikenneministeri? kansallinen tietoverkkojen kehitt?isohjelma

Valtion tietoturvallisuuden johtoryhm伯a> - Valtiovarainministeri漯font>

Valtiovarainministeri漯a> - Hallinnon kehitt?inen - Valtion tietoturvallisuuden johtoryhm?bsp;? Tietoturvallisuuteen liittyv? t?keimm? s?d?set ja ohjeet.


Back To Top


Liikan Jitsu mainpage





Spensort Education & Training Services (Website)
Education &
 Training Services


Silenus Oy



Link to the Shaolin Kung Fu On-Line Book Store >>
Chinese  manuscript translations


Link to Turtle Press martial arts webshop
Books & Videos


Events & Bookings

Liikan Jitsu Meetup


Siblinks: Home | Up | Parkour & Tricking | Laugh-Links | Edulightenment | Security Infosites

Legal Notices

This site was last updated 03/08/18