Communications: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 2: Line 2:


Anderson, Ross J. (2008) [[Security Engineering]]
Anderson, Ross J. (2008) [[Security Engineering]]
Deputy Chief of Staff for Intelligence (2006) [[Critical Infrastructure Threats and Terrorism]]


Kramer, Franklin D., et. al (2009) [[Cyberpower and National Security]]
Kramer, Franklin D., et. al (2009) [[Cyberpower and National Security]]
Line 22: Line 20:
|-
|-
|Department of Homeland Security||||2003||[[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]||Government Report||None||[http://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf  ''Pdf'']
|Department of Homeland Security||||2003||[[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]||Government Report||None||[http://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf  ''Pdf'']
|-
|Deputy Chief of Staff for Intelligence||||2006||[[Critical Infrastructure Threats and Terrorism]]||Government Report||Low:Organizational Analysis; Low:Risk Management||[http://www.fas.org/irp/threat/terrorism/sup2.pdf  ''Pdf'']
|}
|}



Revision as of 10:28, 11 August 2010

TOC-> Threats and Actors-> Security Targets->Communications

Anderson, Ross J. (2008) Security Engineering

Kramer, Franklin D., et. al (2009) Cyberpower and National Security

National Cyber Defense Initiative (2009) National Cyber Defense Financial Services Workshop Report

National Research Council (1999) Trust in Cyberspace

Author 1 Author 2 Year Title Source Expertise Full Text
Department of Homeland Security 2003 The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets Government Report None Pdf
Deputy Chief of Staff for Intelligence 2006 Critical Infrastructure Threats and Terrorism Government Report Low:Organizational Analysis; Low:Risk Management Pdf

Subcategories:

Jump to Table of Contents