Private Efforts/Organizations: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 27: Line 27:
|National Institute of Standards and Technology||||2006||[[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]||Government Report||Moderate:Technology||[http://www.cyber.st.dhs.gov/docs/NIST%20Guide%20to%20Supervisory%20and%20Data%20Acquisition-SCADA%20and%20Industrial%20Control%20Systems%20Security%20(2007).pdf ''Pdf'']
|National Institute of Standards and Technology||||2006||[[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]||Government Report||Moderate:Technology||[http://www.cyber.st.dhs.gov/docs/NIST%20Guide%20to%20Supervisory%20and%20Data%20Acquisition-SCADA%20and%20Industrial%20Control%20Systems%20Security%20(2007).pdf ''Pdf'']
|-
|-
|Networking and Information Technology Research and Development||||2009||[[National Cyber Leap Year Summit 2009, Co-Chairs' Report]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/National_Cyber_Leap_Year_Summit_2009_Co-Chairs_Report.pdf ''Pdf'']
|Networking and Information Technology Research and Development||||2009||[[National Cyber Leap Year Summit 2009, Co-Chairs' Report]]||Government Report||Low:Technology||[http://www.cyber.st.dhs.gov/docs/National_Cyber_Leap_Year_Summit_2009_Co-Chairs_Report.pdf ''Pdf'']
|-
|-
|President's Commission on Critical Infrastructure Protection||||1997||[[Critical Foundations]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/PCCIP%20Report%201997.pdf ''Pdf'']
|President's Commission on Critical Infrastructure Protection||||1997||[[Critical Foundations]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/PCCIP%20Report%201997.pdf ''Pdf'']

Revision as of 10:58, 9 September 2010

TOC-> Approaches->Private Efforts/Organizations

Author 1 Author 2 Year Title Source Expertise Full Text
Bohme, Rainer Kataria, Gaurav 2006 Models and Measures for Correlation in Cyber-Insurance Conf. Paper High:Economics Pdf
Bohme, Rainer Schwartz, Galina 2010 Modeling Cyber-Insurance Conf. Paper High:Economics Pdf
Clinton, Larry Undated Cyber-Insurance Metrics and Impact on Cyber-Security Online Paper Low:Technology; Low:Law Pdf
Moore, Tyler Clayton, Richard 2009 The Impact of Incentives on Notice and Take-down Book Chapter Moderate:Technology; Low:Law Pdf
National Cyber Defense Initiative 2009 National Cyber Defense Financial Services Workshop Report Independent Report Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance Pdf
National Cyber Security Summit Task Force 2004 Information Security Governance Government Report Moderate:Executive Administration Pdf
National Infrastructure Advisory Council 2004 Hardening The Internet Government Report High:Technology Pdf
National Institute of Standards and Technology 2006 SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security Government Report Moderate:Technology Pdf
Networking and Information Technology Research and Development 2009 National Cyber Leap Year Summit 2009, Co-Chairs' Report Government Report Low:Technology Pdf
President's Commission on Critical Infrastructure Protection 1997 Critical Foundations Government Report None Pdf
Verizon 2010 2010 Data Breach Investigations Report Industry Report Low:Technology Pdf
White House 2009 Cyberspace Policy Review Government Report None Pdf
  • Subcategories: None

Jump to Table of Contents