Deterrence: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 1: Line 1:
''[[Table of Contents | TOC->]][[Approaches | Approaches->]][[Deterrence]]''
''[[Table of Contents | TOC->]][[Approaches | Approaches->]][[Deterrence]]''


Anderson, Ross, et. al (2008) [[Security Economics and the Internal Market]]
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
 
|-
Johnson, Eric M. (2008) [[Managing Information Risk and the Economics of Security]]
! style="background-color: #efefef;" | Author 1
 
! style="background-color: #efefef;" | Author 2
Kobayashi, Bruce H. (2006) [[An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods]]
! style="background-color: #efefef;" | Year
 
! style="background-color: #efefef;" | Title
Korns, Stephen W.  (2009) [[Cyber Operations]]
! style="background-color: #efefef;" | Source
 
! style="background-color: #efefef;" | Expertise
National Cyber Defense Initiative (2009) [[National Cyber Defense Financial Services Workshop Report]]
! style="background-color: #efefef;" class="unsortable" | Full Text 
 
|-
National Cyber Security Summit Task Force (2004) [[Information Security Governance]]
| Anderson, Ross, et. al || ||2008||[[Security Economics and the Internal Market]]|| ||None||
 
|-
National Research Council (2007) [[Toward a Safer and More Secure Cyberspace]]
| Johnson, Eric M. || ||2008||[[Managing Information Risk and the Economics of Security]]|| ||None||
 
|-
Schneier, Bruce (2003) [[Beyond Fear]]
| Kobayashi, Bruce H. || ||2006||[[An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods]]|| ||None||
 
|-
Sklerov, Matthew J. (2009) [[Solving the Dilemma of State Responses to Cyberattacks]]  
| Korns, Stephen W.  || ||2009||[[Cyber Operations]]|| ||None||
 
|-
Todd, Graham H. (2009) [[Armed Attack in Cyberspace]]  
| National Cyber Defense Initiative || ||2009||[[National Cyber Defense Financial Services Workshop Report]]|| ||None||
 
|-
Watts, Sean (2010) [[Combatant Status and Computer Network Attack]]
| National Cyber Security Summit Task Force || ||2004||[[Information Security Governance]]|| ||None||
|-
| National Research Council || ||2007||[[Toward a Safer and More Secure Cyberspace]]|| ||None||
|-
| Schneier, Bruce || ||2003||[[Beyond Fear]]|| ||None||
|-
| Sklerov, Matthew J. || ||2009||[[Solving the Dilemma of State Responses to Cyberattacks]]|| ||None||
|-
| Todd, Graham H. || ||2009||[[Armed Attack in Cyberspace]]|| ||None||
|-
| Watts, Sean || ||2010||[[Combatant Status and Computer Network Attack]]|| ||None||
|}


*'''''Subcategories:''''' ''None''
*'''''Subcategories:''''' ''None''


''[[Table of Contents | Jump to Table of Contents]]''
''[[Table of Contents | Jump to Table of Contents]]''

Revision as of 11:31, 10 August 2010

TOC-> Approaches->Deterrence

Author 1 Author 2 Year Title Source Expertise Full Text
Anderson, Ross, et. al 2008 Security Economics and the Internal Market None
Johnson, Eric M. 2008 Managing Information Risk and the Economics of Security None
Kobayashi, Bruce H. 2006 An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods None
Korns, Stephen W. 2009 Cyber Operations None
National Cyber Defense Initiative 2009 National Cyber Defense Financial Services Workshop Report None
National Cyber Security Summit Task Force 2004 Information Security Governance None
National Research Council 2007 Toward a Safer and More Secure Cyberspace None
Schneier, Bruce 2003 Beyond Fear None
Sklerov, Matthew J. 2009 Solving the Dilemma of State Responses to Cyberattacks None
Todd, Graham H. 2009 Armed Attack in Cyberspace None
Watts, Sean 2010 Combatant Status and Computer Network Attack None
  • Subcategories: None

Jump to Table of Contents