Template:Filtered Table: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 10: | Line 10: | ||
| align="center" style="background:#f0f0f0;"|'''Synopsis''' | | align="center" style="background:#f0f0f0;"|'''Synopsis''' | ||
|- | |- | ||
|- | |- | ||
| White House|| | | White House||2009||[http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure]||Government Report||1. Overview,<br>4.7 Public-Private Cooperation||No | ||
|- | |- | ||
| White House||2011- | | White House||2011-04||[http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy]||Government Report||4.9 Identity Management,<br>4.7 Public-Private Cooperation||No | ||
|- | |- | ||
| | | White House||2011-05||[http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World]||Government Report||1. Overview||No | ||
|- | |- | ||
| | | NSTC||2011-12||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/fed_cybersecurity_rd_strategic_plan_2011.pdf Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program]||Government Report||5.3 Government Organizations||No | ||
|- | |- | ||
| White House||2012- | | White House||2012-01||[http://www.whitehouse.gov/sites/default/files/national_strategy_for_global_supply_chain_security.pdf National Strategy for Global Supply Chain Security]||Government Report||4.3 Supply Chain Issues||No | ||
|- | |- | ||
| | | White House||2012-02||[http://www.whitehouse.gov/sites/default/files/privacy-final.pdf Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy]||Government Report||4.10 Privacy,<br>5.1 Regulation/Liability||No | ||
|- | |- | ||
| Kundra, Vivek|| | | Kundra, Vivek||2011-02-08||[http://www.cio.gov/documents/federal-cloud-computing-strategy.pdf Federal Cloud Computing Strategy]||Government Report||3.3.3.3 Cloud Computing,<br>3.3.1.1 Government Networks (.gov),<br>5.3 Government Organizations||No | ||
|- | |- | ||
| | | Kundra, Vivek||2010-12-09||[http://www.cio.gov/documents/25-point-implementation-plan-to-reform-federal%20it.pdf 25 Point Implementation Plan to Reform Federal Information Technology Management]||Government Report||5.3 Government Organizations,<br>3.3.1.1 Government Networks (.gov),<br>3.3.3.3 Cloud Computing||No | ||
|- | |- | ||
| PCAST|| | | PCAST||2010-12||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-nitrd-report-2010.pdf Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technology]||Government Report||5.3 Government Organizations,<br>4.10 Privacy,<br>4.3 Supply Chain Issues||No | ||
|- | |- | ||
| | | PCAST||2011-06||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-advanced-manufacturing-june2011.pdf Report to the President on Ensuring American Leadership in Advanced Manufacturing]||Government Report||5.3 Government Organizations,<br>4.2.1 Risk Management and Investment||No | ||
|- | |- | ||
| DHS||2009- | | DHS||2009-11||[http://www.cyber.st.dhs.gov/docs/DHS-Cybersecurity-Roadmap.pdf A Roadmap for Cybersecurity Research]||Government Report||1. Overview,<br>4.2.1 Risk management and Investment||No | ||
|- | |- | ||
| DHS|| | | DHS||2009-09-16||[http://www.cyber.st.dhs.gov/docs/National_Cyber_Leap_Year_Summit_2009_Co-Chairs_Report.pdf National Cyber Leap Year Summit 2009: Co-Chairs' Report]||Government Report||4.2 Economics of Cybersecurity,<br>3.3 Security Targets,<br>4.8 Attribution||No | ||
|- | |- | ||
| Department of Commerce, Internet Policy Task Force||2011-06||[http://www.nist.gov/itl/upload/Cybersecurity_Green-Paper_FinalVersion.pdf Cybersecurity, Innovation and the Internet Economy]||Government Report||||No | | DHS||2010-09||[http://www.federalnewsradio.com/pdfs/NCIRP_Interim_Version_September_2010.pdf National Cyber Incident Response Plan]||Government Report||5.3 Government Organizations,<br>3. Threats and Actors||No | ||
|- | |||
| Department of Commerce, Internet Policy Task Force||2011-06||[http://www.nist.gov/itl/upload/Cybersecurity_Green-Paper_FinalVersion.pdf Cybersecurity, Innovation and the Internet Economy]||Government Report||4.7 Public-Private Cooperation,<br>4.2 Economics of Cybersecurity||No | |||
|- | |- | ||
| DOD ||2011-07-14||[http://www.defense.gov/news/d20110714cyber.pdf Department of Defense Strategy for Operating in Cyberspace ]||Government Report ||||No | | DOD ||2011-07-14||[http://www.defense.gov/news/d20110714cyber.pdf Department of Defense Strategy for Operating in Cyberspace ]||Government Report ||||No | ||
|- | |- | ||
| DHS||2011-11||[http://www.dhs.gov/xlibrary/assets/nppd/blueprint-for-a-secure-cyber-future.pdf Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise]||Government Report||||No | | DHS||2011-11||[http://www.dhs.gov/xlibrary/assets/nppd/blueprint-for-a-secure-cyber-future.pdf Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise]||Government Report||5.3 Government Organizations,<br>3.3 Security Targets||No | ||
|- | |- | ||
| National Initiative for Cybersecurity Education||2011-08-11||[http://csrc.nist.gov/nice/documents/nicestratplan/Draft_NICE-Strategic-Plan_Aug2011.pdf National Initiative for Cybersecurity Education Strategic Plan: Building a Digital Nation]||Government Report||||No | | National Initiative for Cybersecurity Education||2011-08-11||[http://csrc.nist.gov/nice/documents/nicestratplan/Draft_NICE-Strategic-Plan_Aug2011.pdf National Initiative for Cybersecurity Education Strategic Plan: Building a Digital Nation]||Government Report||1. Overview,<br>5.3 Government Organizations||No | ||
|- | |- | ||
| Energy Sector Control Systems Working Group||2011-09||[http://www.cyber.st.dhs.gov/wp-content/uploads/2011/09/Energy_Roadmap.pdf Roadmap to Achieve Energy Delivery Systems Cybersecurity]||Government Report||||No | | Energy Sector Control Systems Working Group||2011-09||[http://www.cyber.st.dhs.gov/wp-content/uploads/2011/09/Energy_Roadmap.pdf Roadmap to Achieve Energy Delivery Systems Cybersecurity]||Government Report||3.3.2.1 Electricity, Oil and Natural Gas,<br>4.7 Public-Private Cooperation||No | ||
|- | |- | ||
| GAO||2011-07-25||[http://www.gao.gov/products/GAO-11-75 Defense Department Cyber Efforts: DoD Faces Challenges in Its Cyber Activities ]||Government Report ||||No | | GAO||2011-07-25||[http://www.gao.gov/products/GAO-11-75 Defense Department Cyber Efforts: DoD Faces Challenges in Its Cyber Activities ]||Government Report ||||No | ||
Line 59: | Line 59: | ||
| GAO||2010-06-16||[http://www.gao.gov/products/GAO-10-834t Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats ]||Government Report ||||No | | GAO||2010-06-16||[http://www.gao.gov/products/GAO-10-834t Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats ]||Government Report ||||No | ||
|- | |- | ||
| GAO||2009-07||[http://www.gao.gov/new.items/d09546.pdf Information Security: Agencies Continue to Report Progress, but Need to. Mitigate Persistent Weaknesses]||Government Report||||No | | GAO||2009-07||[http://www.gao.gov/new.items/d09546.pdf Information Security: Agencies Continue to Report Progress, but Need to. Mitigate Persistent Weaknesses]||Government Report||3.3.1.1 Government Networks (.gov),<br>5.3 Government Organizations||No | ||
|- | |||
| GAO||2009-09-24||[http://www.gao.gov/new.items/d09969.pdf Critical Infrastructure Protection: Current Cyber Sector-Specific Planning Approach Needs Reassessment]||Government Report||3.3.1 Public Critical Infrastructure,<br>Government Organizations||No | |||
|- | |- | ||
| GAO||2009-09 | | GAO||2009-09||[http://www.gao.gov/new.items/d09617.pdf Information Security: Concerted Effort Needed to Improve Federal Performance Measures]||Government Report||5.3 Government Organizations,<br> 3.3.1 Public Critical Infrastructure||No | ||
|- | |- | ||
| GAO|| | | GAO||2010-06-03||[http://www.gao.gov/assets/310/305208.pdf Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development]||Government Report||5.3 Government Organizations,<br> 4.7 Public-Private Cooperation||No | ||
|- | |- | ||
| GAO|| | | GAO||2008-07-31||[http://www.gao.gov/assets/280/279084.pdf Cyber Analysis And Warning: DHS Faces Challenges in Establishing a Comprehensive National Capability]||Government Report||5.3 Government Organizations||No | ||
|- | |- | ||
| GAO||2004-05-28||[http://www.gao.gov/assets/160/157541.pdf Technology Assessment: Cybersecurity for Critical Infrastructure Protection]||Government Report||5.7 Technology,<br>3.3 Security Targets,<br>4.7 Public-Private Cooperation||No | |||
| GAO||2004-05-28||[http://www.gao.gov/assets/160/157541.pdf Technology Assessment: Cybersecurity for Critical Infrastructure Protection]||Government Report||||No | |||
|- | |- | ||
| GAO||2010-07-15||[http://www.gao.gov/assets/310/307222.pdf Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed]||Government Report||||No | | GAO||2010-07-15||[http://www.gao.gov/assets/310/307222.pdf Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed]||Government Report||4.7 Public-Private Cooperation,<br>3.3.1.2 Military Networks (.mil)||No | ||
|- | |- | ||
| GAO||2012-01-13||[http://www.gao.gov/assets/590/587681.pdf Defense Contracting: Improved Policies and Tools Could Help Increase Competition on DOD's National Security Exception Procurements]||Government Report||||No | | GAO||2012-01-13||[http://www.gao.gov/assets/590/587681.pdf Defense Contracting: Improved Policies and Tools Could Help Increase Competition on DOD's National Security Exception Procurements]||Government Report||4.7 Public-Private Cooperation,<br>3.3.1.2 Military Networks (.mil)||No | ||
|- | |- | ||
| Fischer, Eric A.<br />CRS||2012-04-23||[http://www.fas.org/sgp/crs/natsec/R42114.pdf Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions]||Government Report||||No | | Fischer, Eric A.<br />CRS||2012-04-23||[http://www.fas.org/sgp/crs/natsec/R42114.pdf Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions]||Government Report||5.1 Regulation/Liability,<br>3.3 Security Targets||No | ||
|- | |- | ||
| Kerr, Paul K. et al.<br />CRS||2010-12-09||[http://www.fas.org/sgp/crs/natsec/R41524.pdf The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability]||Government Report||||No | | Kerr, Paul K. et al.<br />CRS||2010-12-09||[http://www.fas.org/sgp/crs/natsec/R41524.pdf The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability]||Government Report||5.4 International Law (including Laws of War),<br> 3.3 Security Targets,<br> 4.12 Cyberwar||No | ||
|- | |- | ||
| Wilson, Clay<br />CRS||2007-03-20||[http://www.fas.org/sgp/crs/natsec/RL31787.pdf Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues]||Government Report||||No | | Wilson, Clay<br />CRS||2007-03-20||[http://www.fas.org/sgp/crs/natsec/RL31787.pdf Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues]||Government Report||4.12 Cyberwar,<br>3.3 Security Targets||No | ||
|- | |- | ||
| Department of Energy||2012-04||[http://energy.gov/sites/prod/files/OAS-RA-12-04.pdf The Department's Management of the Smart Grid Investment Grant Program]||Government Report||||No | | Department of Energy||2012-04||[http://energy.gov/sites/prod/files/OAS-RA-12-04.pdf The Department's Management of the Smart Grid Investment Grant Program]||Government Report||3.3.2.1 Electricity, Oil and Natural Gas,<br>4.2.1 Risk Management and Investment||No | ||
|- | |- | ||
| Department of Justice||2011-04||[http://www.justice.gov/oig/reports/FBI/a1122r.pdf The Federal Bureau of Investigation's Ability to Address the National Security Cyber Intrusion Threat]||Government Report||||No | | Department of Justice||2011-04||[http://www.justice.gov/oig/reports/FBI/a1122r.pdf The Federal Bureau of Investigation's Ability to Address the National Security Cyber Intrusion Threat]||Government Report||5.3 Government Organizations,<br>4.11 Cybercrime,<br>4.6 Information Sharing/Disclosure||No | ||
|- | |- | ||
| DHS||2010-08||[http://www.dhs.gov/xoig/assets/mgmtrpts/OIG_10-111_Aug10.pdf DHS Needs to Improve the Security Posture of Its Cybersecurity Program Systems]||Government Report||||No | | DHS||2010-08||[http://www.dhs.gov/xoig/assets/mgmtrpts/OIG_10-111_Aug10.pdf DHS Needs to Improve the Security Posture of Its Cybersecurity Program Systems]||Government Report||3.3.1.1 Government Networks (.gov),<br>5.3 Government Organizations||No | ||
|- | |- | ||
| DHS||2007-06||[http://www.oig.dhs.gov/assets/Mgmt/OIG_07-48_Jun07.pdf Challenges Remain in Securing the Nation’s Cyber Infrastructure]||Government Report||||No | | DHS||2007-06||[http://www.oig.dhs.gov/assets/Mgmt/OIG_07-48_Jun07.pdf Challenges Remain in Securing the Nation’s Cyber Infrastructure]||Government Report||5.3 Government Organizations,<br>4.7 Public-Private Cooperation,<br>4.6 Information Sharing||No | ||
|} | |} | ||
<includeonly>[[Template:Filtered Table|Filtered Table Template]]</includeonly> | <includeonly>[[Template:Filtered Table|Filtered Table Template]]</includeonly> |
Revision as of 12:51, 20 June 2012
Filtering for type: All Types
Author/Agency | Date | Title | Type | Category | Synopsis |
White House | 2009 | Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure | Government Report | 1. Overview, 4.7 Public-Private Cooperation |
No |
White House | 2011-04 | National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy | Government Report | 4.9 Identity Management, 4.7 Public-Private Cooperation |
No |
White House | 2011-05 | International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World | Government Report | 1. Overview | No |
NSTC | 2011-12 | Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program | Government Report | 5.3 Government Organizations | No |
White House | 2012-01 | National Strategy for Global Supply Chain Security | Government Report | 4.3 Supply Chain Issues | No |
White House | 2012-02 | Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy | Government Report | 4.10 Privacy, 5.1 Regulation/Liability |
No |
Kundra, Vivek | 2011-02-08 | Federal Cloud Computing Strategy | Government Report | 3.3.3.3 Cloud Computing, 3.3.1.1 Government Networks (.gov), 5.3 Government Organizations |
No |
Kundra, Vivek | 2010-12-09 | 25 Point Implementation Plan to Reform Federal Information Technology Management | Government Report | 5.3 Government Organizations, 3.3.1.1 Government Networks (.gov), 3.3.3.3 Cloud Computing |
No |
PCAST | 2010-12 | Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technology | Government Report | 5.3 Government Organizations, 4.10 Privacy, 4.3 Supply Chain Issues |
No |
PCAST | 2011-06 | Report to the President on Ensuring American Leadership in Advanced Manufacturing | Government Report | 5.3 Government Organizations, 4.2.1 Risk Management and Investment |
No |
DHS | 2009-11 | A Roadmap for Cybersecurity Research | Government Report | 1. Overview, 4.2.1 Risk management and Investment |
No |
DHS | 2009-09-16 | National Cyber Leap Year Summit 2009: Co-Chairs' Report | Government Report | 4.2 Economics of Cybersecurity, 3.3 Security Targets, 4.8 Attribution |
No |
DHS | 2010-09 | National Cyber Incident Response Plan | Government Report | 5.3 Government Organizations, 3. Threats and Actors |
No |
Department of Commerce, Internet Policy Task Force | 2011-06 | Cybersecurity, Innovation and the Internet Economy | Government Report | 4.7 Public-Private Cooperation, 4.2 Economics of Cybersecurity |
No |
DOD | 2011-07-14 | Department of Defense Strategy for Operating in Cyberspace | Government Report | No | |
DHS | 2011-11 | Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise | Government Report | 5.3 Government Organizations, 3.3 Security Targets |
No |
National Initiative for Cybersecurity Education | 2011-08-11 | National Initiative for Cybersecurity Education Strategic Plan: Building a Digital Nation | Government Report | 1. Overview, 5.3 Government Organizations |
No |
Energy Sector Control Systems Working Group | 2011-09 | Roadmap to Achieve Energy Delivery Systems Cybersecurity | Government Report | 3.3.2.1 Electricity, Oil and Natural Gas, 4.7 Public-Private Cooperation |
No |
GAO | 2011-07-25 | Defense Department Cyber Efforts: DoD Faces Challenges in Its Cyber Activities | Government Report | No | |
GAO | 2011-11-29 | Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination | Government Report | No | |
GAO | 2011-07-26 | Continued Attention Needed to Protect Our Nation’s Critical Infrastructure | Government Report | No | |
GAO | 2011-10-03 | Information Security: Weaknesses Continue Amid New Federal Efforts to Implement Requirements | Government Report | No | |
GAO | 2010-10-06 | Cyberspace Policy: Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed | Government Report | No | |
GAO | 2010-06-16 | Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats | Government Report | No | |
GAO | 2009-07 | Information Security: Agencies Continue to Report Progress, but Need to. Mitigate Persistent Weaknesses | Government Report | 3.3.1.1 Government Networks (.gov), 5.3 Government Organizations |
No |
GAO | 2009-09-24 | Critical Infrastructure Protection: Current Cyber Sector-Specific Planning Approach Needs Reassessment | Government Report | 3.3.1 Public Critical Infrastructure, Government Organizations |
No |
GAO | 2009-09 | Information Security: Concerted Effort Needed to Improve Federal Performance Measures | Government Report | 5.3 Government Organizations, 3.3.1 Public Critical Infrastructure |
No |
GAO | 2010-06-03 | Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development | Government Report | 5.3 Government Organizations, 4.7 Public-Private Cooperation |
No |
GAO | 2008-07-31 | Cyber Analysis And Warning: DHS Faces Challenges in Establishing a Comprehensive National Capability | Government Report | 5.3 Government Organizations | No |
GAO | 2004-05-28 | Technology Assessment: Cybersecurity for Critical Infrastructure Protection | Government Report | 5.7 Technology, 3.3 Security Targets, 4.7 Public-Private Cooperation |
No |
GAO | 2010-07-15 | Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed | Government Report | 4.7 Public-Private Cooperation, 3.3.1.2 Military Networks (.mil) |
No |
GAO | 2012-01-13 | Defense Contracting: Improved Policies and Tools Could Help Increase Competition on DOD's National Security Exception Procurements | Government Report | 4.7 Public-Private Cooperation, 3.3.1.2 Military Networks (.mil) |
No |
Fischer, Eric A. CRS |
2012-04-23 | Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions | Government Report | 5.1 Regulation/Liability, 3.3 Security Targets |
No |
Kerr, Paul K. et al. CRS |
2010-12-09 | The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability | Government Report | 5.4 International Law (including Laws of War), 3.3 Security Targets, 4.12 Cyberwar |
No |
Wilson, Clay CRS |
2007-03-20 | Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues | Government Report | 4.12 Cyberwar, 3.3 Security Targets |
No |
Department of Energy | 2012-04 | The Department's Management of the Smart Grid Investment Grant Program | Government Report | 3.3.2.1 Electricity, Oil and Natural Gas, 4.2.1 Risk Management and Investment |
No |
Department of Justice | 2011-04 | The Federal Bureau of Investigation's Ability to Address the National Security Cyber Intrusion Threat | Government Report | 5.3 Government Organizations, 4.11 Cybercrime, 4.6 Information Sharing/Disclosure |
No |
DHS | 2010-08 | DHS Needs to Improve the Security Posture of Its Cybersecurity Program Systems | Government Report | 3.3.1.1 Government Networks (.gov), 5.3 Government Organizations |
No |
DHS | 2007-06 | Challenges Remain in Securing the Nation’s Cyber Infrastructure | Government Report | 5.3 Government Organizations, 4.7 Public-Private Cooperation, 4.6 Information Sharing |
No |