Template:Filtered Table: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 11: | Line 11: | ||
|- | |- | ||
|- | |- | ||
| Anderson, Ross ||1909-06-24||[http://cyber.law.harvard.edu/cybersecurity/Why_Information_Security_is_Hard Why Information Security is Hard ]|| | | Anderson, Ross ||1909-06-24||[http://cyber.law.harvard.edu/cybersecurity/Why_Information_Security_is_Hard Why Information Security is Hard ]||Article ||4.2.1 [[Risk Management and Investment]],<br>4.2.2 [[Incentives]],<br>5.1 [[Regulation/Liability]]||Yes | ||
|- | |- | ||
| Anderson, Ross ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/The_Economics_of_Information_Security The Economics of Information Security ]||Journal Article ||4.2 [[Economics of Cybersecurity]],<br>5.1 [[Regulation/Liability]],<br>5.7 [[Technology]]||Yes | | Anderson, Ross ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/The_Economics_of_Information_Security The Economics of Information Security ]||Journal Article ||4.2 [[Economics of Cybersecurity]],<br>5.1 [[Regulation/Liability]],<br>5.7 [[Technology]]||Yes | ||
Line 21: | Line 21: | ||
| Arora et al. ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/Does_Information_Security_Attack_Frequency_Increase_With_Vulnerability_Disclosure Does Information Security Attack Frequency Increase With Vulnerability Disclosure ]||Journal Article ||4.2.1 [[Risk Management and Investment]],<br>4.6 [[Information Sharing/Disclosure]]||Yes | | Arora et al. ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/Does_Information_Security_Attack_Frequency_Increase_With_Vulnerability_Disclosure Does Information Security Attack Frequency Increase With Vulnerability Disclosure ]||Journal Article ||4.2.1 [[Risk Management and Investment]],<br>4.6 [[Information Sharing/Disclosure]]||Yes | ||
|- | |- | ||
| Aviram, Amitai ||1909-06-27||[http://cyber.law.harvard.edu/cybersecurity/Overcoming_Impediments_to_Information_Sharing Overcoming Impediments to Information Sharing ]|| | | Aviram, Amitai ||1909-06-27||[http://cyber.law.harvard.edu/cybersecurity/Overcoming_Impediments_to_Information_Sharing Overcoming Impediments to Information Sharing ]||Journal Article ||4.2.1 [[Risk Management and Investment]],<br>4.6 [[Information Sharing/Disclosure]],<br>4.7 [[Public-Private Cooperation]]||Yes | ||
|- | |- | ||
| Barkham, Jason ||1909-06-24||[http://cyber.law.harvard.edu/cybersecurity/Information_Warfare_and_International_Law_on_the_Use_of_Force Information Warfare and International Law on the Use of Force ]|| | | Barkham, Jason ||1909-06-24||[http://cyber.law.harvard.edu/cybersecurity/Information_Warfare_and_International_Law_on_the_Use_of_Force Information Warfare and International Law on the Use of Force ]||Journal Article ||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes | ||
|- | |- | ||
| Beard, Jack M. ||1909-07-02||[http://cyber.law.harvard.edu/cybersecurity/Law_and_War_in_the_Virtual_Era Law and War in the Virtual Era ]|| | | Beard, Jack M. ||1909-07-02||[http://cyber.law.harvard.edu/cybersecurity/Law_and_War_in_the_Virtual_Era Law and War in the Virtual Era ]||Journal Article ||4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes | ||
|- | |- | ||
| Bohme, Rainer ||1909-06-28||[http://cyber.law.harvard.edu/cybersecurity/Cyber-Insurance_Revisited Cyber-Insurance Revisited ]|| | | Bohme, Rainer ||1909-06-28||[http://cyber.law.harvard.edu/cybersecurity/Cyber-Insurance_Revisited Cyber-Insurance Revisited ]||Article ||4.2.2 [[Incentives]],<br>4.2.3 [[Insurance]],<br>,4.2.5 [[Market Failure]]||Yes | ||
|- | |- | ||
| Bohme, Rainer ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/Models_and_Measures_for_Correlation_in_Cyber-Insurance Models and Measures for Correlation in Cyber-Insurance ]|| | | Bohme, Rainer ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/Models_and_Measures_for_Correlation_in_Cyber-Insurance Models and Measures for Correlation in Cyber-Insurance ]||Article ||4.2.3 [[Insurance]],<br>5.2 [[Private Efforts/Organizations]]||Yes | ||
|- | |- | ||
| Bohme, Rainer ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/Modeling_Cyber-Insurance Modeling Cyber-Insurance ]|| | | Bohme, Rainer ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/Modeling_Cyber-Insurance Modeling Cyber-Insurance ]||Article ||4.2.2 [[Incentives]],<br>4.2.3 [[Insurance]],<br>,5.2 [[Private Efforts/Organizations]]||Yes | ||
|- | |- | ||
| Booz Allen Hamilton and the Economist Intelligence Unit ||2012-01-15||[http://www.cyberhub.com/CyberPowerIndex Cyber Power Index ]||Industry Report||4. [[Issues]],<br>4.1 [[Metrics]],<br>5. [[Approaches]]||No | | Booz Allen Hamilton and the Economist Intelligence Unit ||2012-01-15||[http://www.cyberhub.com/CyberPowerIndex Cyber Power Index ]||Industry Report||4. [[Issues]],<br>4.1 [[Metrics]],<br>5. [[Approaches]]||No | ||
|- | |- | ||
| Brown, Davis ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/A_Proposal_for_an_International_Convention_To_Regulate_the_Use_of_Information_Systems_in_Armed_Conflict A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict ]|| | | Brown, Davis ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/A_Proposal_for_an_International_Convention_To_Regulate_the_Use_of_Information_Systems_in_Armed_Conflict A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict ]||Journal Article ||3.3.2.1 Military networks (.gov),<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes | ||
|- | |- | ||
| Business Roundtable||2012-10-11||[http://businessroundtable.org/uploads/studies-reports/downloads/2011_10_Mission_Critical_A_Public-Private_Strategy_for_Effective_Cybersecurity.pdf Mission Critical: A Public-Private Strategy for Effective Cybersecurity ]||Independent Report||||No | | Business Roundtable||2012-10-11||[http://businessroundtable.org/uploads/studies-reports/downloads/2011_10_Mission_Critical_A_Public-Private_Strategy_for_Effective_Cybersecurity.pdf Mission Critical: A Public-Private Strategy for Effective Cybersecurity ]||Independent Report||||No | ||
Line 43: | Line 43: | ||
| Business Software Alliance, Center for Democracy & Technology, U.S. Chamber of Commerce, Internet Security Alliance, Tech America ||2011-03-08||[http://www.cdt.org/files/pdfs/20110308_cbyersec_paper.pdf Improving our Nation’s Cybersecurity through the Public-Private Partnership: a White Paper ]||Industry Report||4.6 [[Information Sharing/Disclosure]],<br>4.7 [[Public-Private Cooperation]],<br>5. [[Approaches]]||No | | Business Software Alliance, Center for Democracy & Technology, U.S. Chamber of Commerce, Internet Security Alliance, Tech America ||2011-03-08||[http://www.cdt.org/files/pdfs/20110308_cbyersec_paper.pdf Improving our Nation’s Cybersecurity through the Public-Private Partnership: a White Paper ]||Industry Report||4.6 [[Information Sharing/Disclosure]],<br>4.7 [[Public-Private Cooperation]],<br>5. [[Approaches]]||No | ||
|- | |- | ||
| Cabinet Office (United Kingdom) ||2012-11-11||[http://www.cabinetoffice.gov.uk/sites/default/files/resources/uk-cyber-security-strategy-final.pdf The UK Cyber Security Strategy: Protecting and promoting the UK in a digital world ]||Non- | | Cabinet Office (United Kingdom) ||2012-11-11||[http://www.cabinetoffice.gov.uk/sites/default/files/resources/uk-cyber-security-strategy-final.pdf The UK Cyber Security Strategy: Protecting and promoting the UK in a digital world ]||Non-U.S. Government Report||3. [[Threats and Actors]],<br>4.7 [[Public-Private Cooperation]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| Camp, L. Jean ||1909-06-27||[http://cyber.law.harvard.edu/cybersecurity/Economics_of_Information_Security Economics of Information Security ]||Book ||4.2 [[Economics of Cybersecurity]],<br>5.1 [[Regulation/Liability]]||Yes | | Camp, L. Jean ||1909-06-27||[http://cyber.law.harvard.edu/cybersecurity/Economics_of_Information_Security Economics of Information Security ]||Book ||4.2 [[Economics of Cybersecurity]],<br>5.1 [[Regulation/Liability]]||Yes | ||
Line 71: | Line 71: | ||
| Cyber Security Forum Initiative ||2011-05-09||[http://www.unveillance.com/wp-content/uploads/2011/05/Project_Cyber_Dawn_Public.pdf Cyber Dawn: Libya ]||Industry Report||3. [[Threats and Actors]],<br>4. [[Issues]],<br>5. [[Approaches]]||No | | Cyber Security Forum Initiative ||2011-05-09||[http://www.unveillance.com/wp-content/uploads/2011/05/Project_Cyber_Dawn_Public.pdf Cyber Dawn: Libya ]||Industry Report||3. [[Threats and Actors]],<br>4. [[Issues]],<br>5. [[Approaches]]||No | ||
|- | |- | ||
| Department of Commerce ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/Defense_Industrial_Base_Assessment Defense Industrial Base Assessment ]||Government Report ||3.2.5 [[Criminals and Criminal Organizations]],<br>3.3.1 [[Public Critical Infrastructure]],<br>4.7 [[Public-Private Cooperation]]||Yes | | Department of Commerce ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/Defense_Industrial_Base_Assessment Defense Industrial Base Assessment ]||U.S. Government Report ||3.2.5 [[Criminals and Criminal Organizations]],<br>3.3.1 [[Public Critical Infrastructure]],<br>4.7 [[Public-Private Cooperation]]||Yes | ||
|- | |- | ||
| Department of Commerce ||2011-06-14||[http://www.nist.gov/nstic/2012-nstic-governance-recs.pdf Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace ]||Government Report ||4.7 [[Public-Private Cooperation]],<br>4.9 [[Identity Management]],<br>5.3 [[Government Organizations]]||No | | Department of Commerce ||2011-06-14||[http://www.nist.gov/nstic/2012-nstic-governance-recs.pdf Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace ]||U.S. Government Report ||4.7 [[Public-Private Cooperation]],<br>4.9 [[Identity Management]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| Department of Commerce, Internet Policy Task Force||2011-06||[http://www.nist.gov/itl/upload/Cybersecurity_Green-Paper_FinalVersion.pdf Cybersecurity, Innovation and the Internet Economy]||Government Report||4.2 [[Economics of Cybersecurity]],<br>4.7 [[Public-Private Cooperation]]||No | | Department of Commerce, Internet Policy Task Force||2011-06||[http://www.nist.gov/itl/upload/Cybersecurity_Green-Paper_FinalVersion.pdf Cybersecurity, Innovation and the Internet Economy]||U.S. Government Report||4.2 [[Economics of Cybersecurity]],<br>4.7 [[Public-Private Cooperation]]||No | ||
|- | |- | ||
| Department of Defense ||1909-06-22||[http://cyber.law.harvard.edu/cybersecurity/An_Assessment_of_International_Legal_Issues_in_Information_Operations An Assessment of International Legal Issues in Information Operations ]||Government Report ||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes | | Department of Defense ||1909-06-22||[http://cyber.law.harvard.edu/cybersecurity/An_Assessment_of_International_Legal_Issues_in_Information_Operations An Assessment of International Legal Issues in Information Operations ]||U.S. Government Report ||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes | ||
|- | |- | ||
| Department of Defense ||1909-06-28||[http://cyber.law.harvard.edu/cybersecurity/Strategy_for_Homeland_Defense_and_Civil_Support Strategy for Homeland Defense and Civil Support ]||Government Report ||3.2.4 [[Terrorists]],<br>3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]]||Yes | | Department of Defense ||1909-06-28||[http://cyber.law.harvard.edu/cybersecurity/Strategy_for_Homeland_Defense_and_Civil_Support Strategy for Homeland Defense and Civil Support ]||U.S. Government Report ||3.2.4 [[Terrorists]],<br>3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]]||Yes | ||
|- | |- | ||
| Department of Defense ||1909-06-30||[http://cyber.law.harvard.edu/cybersecurity/Mission_Impact_of_Foreign_Influence_on_DoD_Software Mission Impact of Foreign Influence on DoD Software ]||Government Report ||3.2.4 [[Terrorists]],<br>3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]]||Yes | | Department of Defense ||1909-06-30||[http://cyber.law.harvard.edu/cybersecurity/Mission_Impact_of_Foreign_Influence_on_DoD_Software Mission Impact of Foreign Influence on DoD Software ]||U.S. Government Report ||3.2.4 [[Terrorists]],<br>3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]]||Yes | ||
|- | |- | ||
| Department of Defense ||2012-04-11||[http://www.nsci-va.org/CyberReferenceLib/2011-04-Cyber%20Ops%20Personnel.pdf Cyber Operations Personnel Report (DoD) ]||Government Report||||No | | Department of Defense ||2012-04-11||[http://www.nsci-va.org/CyberReferenceLib/2011-04-Cyber%20Ops%20Personnel.pdf Cyber Operations Personnel Report (DoD) ]||U.S. Government Report||||No | ||
|- | |- | ||
| Department of Energy||2012-04||[http://energy.gov/sites/prod/files/OAS-RA-12-04.pdf The Department's Management of the Smart Grid Investment Grant Program]||Government Report||3.3.2.1 [[Electricity, Oil and Natural Gas]],<br>4.2.1 [[Risk Management and Investment]]||No | | Department of Energy||2012-04||[http://energy.gov/sites/prod/files/OAS-RA-12-04.pdf The Department's Management of the Smart Grid Investment Grant Program]||U.S. Government Report||3.3.2.1 [[Electricity, Oil and Natural Gas]],<br>4.2.1 [[Risk Management and Investment]]||No | ||
|- | |- | ||
| Department of Energy (DOE) Inspector General ||2012-01-01||[http://energy.gov/ig/downloads/departments-management-smart-grid-investment-grant-program-oas-ra-12-04 The Department’s Management of the Smart Grid Investment Grant Program ]||Government Report ||3.3.2.1 [[Electricity, Oil and Natural Gas]],<br>5.3 [[Government Organizations]]||No | | Department of Energy (DOE) Inspector General ||2012-01-01||[http://energy.gov/ig/downloads/departments-management-smart-grid-investment-grant-program-oas-ra-12-04 The Department’s Management of the Smart Grid Investment Grant Program ]||U.S. Government Report ||3.3.2.1 [[Electricity, Oil and Natural Gas]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| Department of Energy, Idaho National Laboratory ||2010-05-01||[http://www.fas.org/sgp/eprint/nstb.pdf NSTB Assessments Summary Report: Common Industrial Control System Cyber Security Weaknesses ]||Government Report||3.3.2 [[Private Critical Infrastructure]],<br>5.7 [[Technology]]||No | | Department of Energy, Idaho National Laboratory ||2010-05-01||[http://www.fas.org/sgp/eprint/nstb.pdf NSTB Assessments Summary Report: Common Industrial Control System Cyber Security Weaknesses ]||U.S. Government Report||3.3.2 [[Private Critical Infrastructure]],<br>5.7 [[Technology]]||No | ||
|- | |- | ||
| Department of Energy, Office of Electricity Delivery & Energy Reliability ||1899-12-30||[http://energy.gov/oe/technology-development/energy-delivery-systems-cybersecurity Cybersecurity for Energy Delivery Systems Program ]||Government Report ||3.3.2.1 [[Electricity, Oil and Natural Gas]],<br>4.2.1 [[Risk Management and Investment]],<br>5.3 [[Government Organizations]]||No | | Department of Energy, Office of Electricity Delivery & Energy Reliability ||1899-12-30||[http://energy.gov/oe/technology-development/energy-delivery-systems-cybersecurity Cybersecurity for Energy Delivery Systems Program ]||U.S. Government Report ||3.3.2.1 [[Electricity, Oil and Natural Gas]],<br>4.2.1 [[Risk Management and Investment]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| Department of Homeland Security ||1909-06-26||[http://cyber.law.harvard.edu/cybersecurity/The_National_Strategy_for_the_Physical_Protection_of_Critical_Infrastructures_and_Key_Assets The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets ]||Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>3.3.2 [[Private Critical Infrastructure]],<br>5.3 [[Government Organizations]]||Yes | | Department of Homeland Security ||1909-06-26||[http://cyber.law.harvard.edu/cybersecurity/The_National_Strategy_for_the_Physical_Protection_of_Critical_Infrastructures_and_Key_Assets The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets ]||U.S. Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>3.3.2 [[Private Critical Infrastructure]],<br>5.3 [[Government Organizations]]||Yes | ||
|- | |- | ||
| Department of Homeland Security ||1909-07-02||[http://cyber.law.harvard.edu/cybersecurity/A_Roadmap_for_Cybersecurity_Research A Roadmap for Cybersecurity Research ]||Government Report ||3.3 [[Security Targets]],<br>5.3 [[Government Organizations]]||Yes | | Department of Homeland Security ||1909-07-02||[http://cyber.law.harvard.edu/cybersecurity/A_Roadmap_for_Cybersecurity_Research A Roadmap for Cybersecurity Research ]||U.S. Government Report ||3.3 [[Security Targets]],<br>5.3 [[Government Organizations]]||Yes | ||
|- | |- | ||
| Department of Justice||2011-04||[http://www.justice.gov/oig/reports/FBI/a1122r.pdf The Federal Bureau of Investigation's Ability to Address the National Security Cyber Intrusion Threat]||Government Report||4.6 [[Information Sharing/Disclosure]],<br>4.11 [[Cybercrime]],<br>5.3 [[Government Organizations]]||No | | Department of Justice||2011-04||[http://www.justice.gov/oig/reports/FBI/a1122r.pdf The Federal Bureau of Investigation's Ability to Address the National Security Cyber Intrusion Threat]||U.S. Government Report||4.6 [[Information Sharing/Disclosure]],<br>4.11 [[Cybercrime]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| Deputy Chief of Staff for Intelligence ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/Critical_Infrastructure_Threats_and_Terrorism Critical Infrastructure Threats and Terrorism ]||Government Report ||3.3 [[Security Targets]],<br>4.11 [[Cybercrime]],<br>4.12 [[Cyberwar]]||Yes | | Deputy Chief of Staff for Intelligence ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/Critical_Infrastructure_Threats_and_Terrorism Critical Infrastructure Threats and Terrorism ]||U.S. Government Report ||3.3 [[Security Targets]],<br>4.11 [[Cybercrime]],<br>4.12 [[Cyberwar]]||Yes | ||
|- | |- | ||
| DHS||2009-09-16||[http://www.cyber.st.dhs.gov/docs/National_Cyber_Leap_Year_Summit_2009_Co-Chairs_Report.pdf National Cyber Leap Year Summit 2009: Co-Chairs' Report]||Government Report||3.3 [[Security Targets]],<br>4.2 [[Economics of Cybersecurity]],<br>4.8 [[Attribution]]||No | | DHS||2009-09-16||[http://www.cyber.st.dhs.gov/docs/National_Cyber_Leap_Year_Summit_2009_Co-Chairs_Report.pdf National Cyber Leap Year Summit 2009: Co-Chairs' Report]||U.S. Government Report||3.3 [[Security Targets]],<br>4.2 [[Economics of Cybersecurity]],<br>4.8 [[Attribution]]||No | ||
|- | |- | ||
| DHS||2007-06||[http://www.oig.dhs.gov/assets/Mgmt/OIG_07-48_Jun07.pdf Challenges Remain in Securing the Nation’s Cyber Infrastructure]||Government Report||4.6 Information Sharing,<br>4.7 [[Public-Private Cooperation]],<br>5.3 [[Government Organizations]]||No | | DHS||2007-06||[http://www.oig.dhs.gov/assets/Mgmt/OIG_07-48_Jun07.pdf Challenges Remain in Securing the Nation’s Cyber Infrastructure]||U.S. Government Report||4.6 Information Sharing,<br>4.7 [[Public-Private Cooperation]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| DHS||2009-11||[http://www.cyber.st.dhs.gov/docs/DHS-Cybersecurity-Roadmap.pdf A Roadmap for Cybersecurity Research]||Government Report||1. [[Overview]],<br>4.2.1 [[Risk Management and Investment]]||No | | DHS||2009-11||[http://www.cyber.st.dhs.gov/docs/DHS-Cybersecurity-Roadmap.pdf A Roadmap for Cybersecurity Research]||U.S. Government Report||1. [[Overview]],<br>4.2.1 [[Risk Management and Investment]]||No | ||
|- | |- | ||
| DHS||2010-08||[http://www.dhs.gov/xoig/assets/mgmtrpts/OIG_10-111_Aug10.pdf DHS Needs to Improve the Security Posture of Its Cybersecurity Program Systems]||Government Report||3.3.1.1 [[Government Networks (.gov)]],<br>5.3 [[Government Organizations]]||No | | DHS||2010-08||[http://www.dhs.gov/xoig/assets/mgmtrpts/OIG_10-111_Aug10.pdf DHS Needs to Improve the Security Posture of Its Cybersecurity Program Systems]||U.S. Government Report||3.3.1.1 [[Government Networks (.gov)]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| DHS||2010-09||[http://www.federalnewsradio.com/pdfs/NCIRP_Interim_Version_September_2010.pdf National Cyber Incident Response Plan]||Government Report||3. [[Threats and Actors]],<br>5.3 [[Government Organizations]]||No | | DHS||2010-09||[http://www.federalnewsradio.com/pdfs/NCIRP_Interim_Version_September_2010.pdf National Cyber Incident Response Plan]||U.S. Government Report||3. [[Threats and Actors]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| DHS||2011-11||[http://www.dhs.gov/xlibrary/assets/nppd/blueprint-for-a-secure-cyber-future.pdf Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise]||Government Report||3.3 [[Security Targets]],<br>5.3 [[Government Organizations]]||No | | DHS||2011-11||[http://www.dhs.gov/xlibrary/assets/nppd/blueprint-for-a-secure-cyber-future.pdf Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise]||U.S. Government Report||3.3 [[Security Targets]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| DOD ||2011-07-14||[http://www.defense.gov/news/d20110714cyber.pdf Department of Defense Strategy for Operating in Cyberspace ]||Government Report ||3.3.1.2 [[Military Networks (.mil)]],<br>5.3 [[Government Organizations]]||No | | DOD ||2011-07-14||[http://www.defense.gov/news/d20110714cyber.pdf Department of Defense Strategy for Operating in Cyberspace ]||U.S. Government Report ||3.3.1.2 [[Military Networks (.mil)]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| DOD ||2011-11-15||[http://www.defense.gov/home/features/2011/0411_cyberstrategy/docs/NDAA%20Section%20934%20Report_For%20webpage.pdf Department of Defense Cyberspace Policy Report : A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934 ]||Government Report||4.12 [[Cyberwar]],<br>5.3 [[Government Organizations]],<br>5.7 [[Technology]]||No | | DOD ||2011-11-15||[http://www.defense.gov/home/features/2011/0411_cyberstrategy/docs/NDAA%20Section%20934%20Report_For%20webpage.pdf Department of Defense Cyberspace Policy Report : A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934 ]||U.S. Government Report||4.12 [[Cyberwar]],<br>5.3 [[Government Organizations]],<br>5.7 [[Technology]]||No | ||
|- | |- | ||
| DOD ||2012-02-16||[http://www.fas.org/sgp/othergov/dod/5200_01v1.pdf DOD Information Security Program: Overview, Classification, and Declassification ]||Government Report ||4.6 [[Information Sharing/Disclosure]],<br>5.3 [[Government Organizations]]||No | | DOD ||2012-02-16||[http://www.fas.org/sgp/othergov/dod/5200_01v1.pdf DOD Information Security Program: Overview, Classification, and Declassification ]||U.S. Government Report ||4.6 [[Information Sharing/Disclosure]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| DOD ||2011-04||[http://www.nsci-va.org/CyberReferenceLib/2011-04-Cyber%20Ops%20Personnel.pdf Cyber Operations Personnel Report (DOD) ]||Government Report ||||No | | DOD ||2011-04||[http://www.nsci-va.org/CyberReferenceLib/2011-04-Cyber%20Ops%20Personnel.pdf Cyber Operations Personnel Report (DOD) ]||U.S. Government Report ||||No | ||
|- | |- | ||
| Dörmann, Knut ||1909-06-27||[http://cyber.law.harvard.edu/cybersecurity/Applicability_of_the_Additional_Protocols_to_Computer_Network_Attacks Applicability of the Additional Protocols to Computer Network Attacks ]||Independent Report ||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes | | Dörmann, Knut ||1909-06-27||[http://cyber.law.harvard.edu/cybersecurity/Applicability_of_the_Additional_Protocols_to_Computer_Network_Attacks Applicability of the Additional Protocols to Computer Network Attacks ]||Independent Report ||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes | ||
Line 131: | Line 131: | ||
| Energetics Inc. ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/Roadmap_to_Secure_Control_Systems_in_the_Energy_Sector Roadmap to Secure Control Systems in the Energy Sector ]||Independent Report ||3.3.1 [[Public Critical Infrastructure]],<br>4.7 [[Public-Private Cooperation]]||Yes | | Energetics Inc. ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/Roadmap_to_Secure_Control_Systems_in_the_Energy_Sector Roadmap to Secure Control Systems in the Energy Sector ]||Independent Report ||3.3.1 [[Public Critical Infrastructure]],<br>4.7 [[Public-Private Cooperation]]||Yes | ||
|- | |- | ||
| Energy Sector Control Systems Working Group||2011-09||[http://www.cyber.st.dhs.gov/wp-content/uploads/2011/09/Energy_Roadmap.pdf Roadmap to Achieve Energy Delivery Systems Cybersecurity]||Government Report||3.3.2.1 [[Electricity, Oil and Natural Gas]],<br>4.7 [[Public-Private Cooperation]]||No | | Energy Sector Control Systems Working Group||2011-09||[http://www.cyber.st.dhs.gov/wp-content/uploads/2011/09/Energy_Roadmap.pdf Roadmap to Achieve Energy Delivery Systems Cybersecurity]||U.S. Government Report||3.3.2.1 [[Electricity, Oil and Natural Gas]],<br>4.7 [[Public-Private Cooperation]]||No | ||
|- | |- | ||
| Epstein, Richard A. ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/Cybersecurity_in_the_Payment_Card_Industry Cybersecurity in the Payment Card Industry ]|| | | Epstein, Richard A. ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/Cybersecurity_in_the_Payment_Card_Industry Cybersecurity in the Payment Card Industry ]||Journal Article ||3.2.5 [[Criminals and Criminal Organizations]],<br>4.11 [[Cybercrime]],<br>5.1 [[Regulation/Liability]]||Yes | ||
|- | |- | ||
| European Network and Information Security Agency ||2010-10-07||[http://www.enisa.europa.eu/media/press-releases/stuxnet-analysis Stuxnet Analysis ]||Non- | | European Network and Information Security Agency ||2010-10-07||[http://www.enisa.europa.eu/media/press-releases/stuxnet-analysis Stuxnet Analysis ]||Non-U.S. Government Report||3. [[Threats and Actors]],<br>5.7 [[Technology]]||No | ||
|- | |- | ||
| European Network and Information Security Agency (ENISA) ||2011-04-11||[http://www.enisa.europa.eu/act/res/other-areas/inter-x/report/interx-report Resilience of the Internet Interconnection Ecosystem, at: ]||Non- | | European Network and Information Security Agency (ENISA) ||2011-04-11||[http://www.enisa.europa.eu/act/res/other-areas/inter-x/report/interx-report Resilience of the Internet Interconnection Ecosystem, at: ]||Non-U.S. Government Report||3. [[Threats and Actors]],<br>4. [[Issues]],<br>5. [[Approaches]]||No | ||
|- | |- | ||
| Federal CIO Council ||2012-01-04||[http://www.gsa.gov/portal/category/102371 Federal Risk and Authorization Management Program (FedRAMP) ]||Government Report ||3.3.3.3 [[Cloud Computing]],<br>5.3 [[Government Organizations]]||No | | Federal CIO Council ||2012-01-04||[http://www.gsa.gov/portal/category/102371 Federal Risk and Authorization Management Program (FedRAMP) ]||U.S. Government Report ||3.3.3.3 [[Cloud Computing]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| Federal Communications Commission (FCC) ||2010-04-21||[http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-305618A1.doc Explore the reliability and resiliency of commercial broadband communications networks ]||Government Report||3.3.3 [[Communications]],<br>5.1 [[Regulation/Liability]],<br>5.3 [[Government Organizations]]||No | | Federal Communications Commission (FCC) ||2010-04-21||[http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-305618A1.doc Explore the reliability and resiliency of commercial broadband communications networks ]||U.S. Government Report||3.3.3 [[Communications]],<br>5.1 [[Regulation/Liability]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| Federal Communications Commission (FCC) ||2011-06-03||[ FCC's Plan for Ensuring the Security of Telecommunications Networks ftp://ftp.fcc.gov/pub/Daily_Releases/Daily_Business/2011/ db0610/DOC-307454A1.txt ]||Government Report||||No | | Federal Communications Commission (FCC) ||2011-06-03||[ FCC's Plan for Ensuring the Security of Telecommunications Networks ftp://ftp.fcc.gov/pub/Daily_Releases/Daily_Business/2011/ db0610/DOC-307454A1.txt ]||U.S. Government Report||||No | ||
|- | |- | ||
| Financial Services Sector Coordinating Council for Critical Infrastructure Protection ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/Research_Agenda_for_the_Banking_and_Finance_Sector Research Agenda for the Banking and Finance Sector ]||Independent Report ||3.3.2.2 [[Financial Institutions and Networks]],<br>4.1 [[Metrics]],<br>4.2.1 [[Risk Management and Investment]]||Yes | | Financial Services Sector Coordinating Council for Critical Infrastructure Protection ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/Research_Agenda_for_the_Banking_and_Finance_Sector Research Agenda for the Banking and Finance Sector ]||Independent Report ||3.3.2.2 [[Financial Institutions and Networks]],<br>4.1 [[Metrics]],<br>4.2.1 [[Risk Management and Investment]]||Yes | ||
|- | |- | ||
| Fischer, Eric A.<br />CRS||2012-04-23||[http://www.fas.org/sgp/crs/natsec/R42114.pdf Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions]||Government Report||3.3 [[Security Targets]],<br>5.1 [[Regulation/Liability]]||No | | Fischer, Eric A.<br />CRS||2012-04-23||[http://www.fas.org/sgp/crs/natsec/R42114.pdf Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions]||U.S. Government Report||3.3 [[Security Targets]],<br>5.1 [[Regulation/Liability]]||No | ||
|- | |- | ||
| Franklin, Jason, et. al ||1909-06-30||[http://cyber.law.harvard.edu/cybersecurity/An_Inquiry_into_the_Nature_and_Causes_of_the_Wealth_of_Internet_Miscreants An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ]|| | | Franklin, Jason, et. al ||1909-06-30||[http://cyber.law.harvard.edu/cybersecurity/An_Inquiry_into_the_Nature_and_Causes_of_the_Wealth_of_Internet_Miscreants An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ]||Article ||3.2.5 [[Criminals and Criminal Organizations]],<br>4.2 [[Economics of Cybersecurity]],<br>4.11 [[Cybercrime]]||Yes | ||
|- | |- | ||
| Gandal, Neil ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/An_Introduction_to_Key_Themes_in_the_Economics_of_Cyber_Security An Introduction to Key Themes in the Economics of Cyber Security ]||Book Chapter ||4.2 [[Economics of Cybersecurity]],<br>4.2.2 [[Incentives]],<br>5.7 [[Technology]]||Yes | | Gandal, Neil ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/An_Introduction_to_Key_Themes_in_the_Economics_of_Cyber_Security An Introduction to Key Themes in the Economics of Cyber Security ]||Book Chapter ||4.2 [[Economics of Cybersecurity]],<br>4.2.2 [[Incentives]],<br>5.7 [[Technology]]||Yes | ||
|- | |- | ||
| GAO||2003-08-27||[http://www.gao.gov/products/GAO-03-760 Efforts to Improve Information sharing Need to Be Strengthened ]||Government Report ||4.6 [[Information Sharing/Disclosure]],<br>5.3 [[Government Organizations]]||No | | GAO||2003-08-27||[http://www.gao.gov/products/GAO-03-760 Efforts to Improve Information sharing Need to Be Strengthened ]||U.S. Government Report ||4.6 [[Information Sharing/Disclosure]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| GAO||2004-05-28||[http://www.gao.gov/assets/160/157541.pdf Technology Assessment: Cybersecurity for Critical Infrastructure Protection]||Government Report||3.3 [[Security Targets]],<br>4.7 [[Public-Private Cooperation]],<br>5.7 [[Technology]]||No | | GAO||2004-05-28||[http://www.gao.gov/assets/160/157541.pdf Technology Assessment: Cybersecurity for Critical Infrastructure Protection]||U.S. Government Report||3.3 [[Security Targets]],<br>4.7 [[Public-Private Cooperation]],<br>5.7 [[Technology]]||No | ||
|- | |- | ||
| GAO||2008-07-31||[http://www.gao.gov/assets/280/279084.pdf Cyber Analysis And Warning: DHS Faces Challenges in Establishing a Comprehensive National Capability]||Government Report||5.3 [[Government Organizations]]||No | | GAO||2008-07-31||[http://www.gao.gov/assets/280/279084.pdf Cyber Analysis And Warning: DHS Faces Challenges in Establishing a Comprehensive National Capability]||U.S. Government Report||5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| GAO||2009-09-24||[http://www.gao.gov/new.items/d09969.pdf Critical Infrastructure Protection: Current Cyber Sector-Specific Planning Approach Needs Reassessment]||Government Report||3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]]||No | | GAO||2009-09-24||[http://www.gao.gov/new.items/d09969.pdf Critical Infrastructure Protection: Current Cyber Sector-Specific Planning Approach Needs Reassessment]||U.S. Government Report||3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| GAO||2009-11-17||[http://www.gao.gov/products/GAO-10-230t Continued Efforts Are Needed to Protect Information Systems from Evolving Threats ]||Government Report ||3.2 [[Actors and Incentives]],<br>3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]]||No | | GAO||2009-11-17||[http://www.gao.gov/products/GAO-10-230t Continued Efforts Are Needed to Protect Information Systems from Evolving Threats ]||U.S. Government Report ||3.2 [[Actors and Incentives]],<br>3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| GAO||2010-03-05||[http://www.gao.gov/products/GAO-10-338 Cybersecurity: Progress Made But Challenges Remain in Defining and Coordinating the Comprehensive National Initiative ]||Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]]||No | | GAO||2010-03-05||[http://www.gao.gov/products/GAO-10-338 Cybersecurity: Progress Made But Challenges Remain in Defining and Coordinating the Comprehensive National Initiative ]||U.S. Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| GAO||2010-03-16||[http://www.gao.gov/products/GAO-11-463T Cybersecurity: Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats ]||Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]]||No | | GAO||2010-03-16||[http://www.gao.gov/products/GAO-11-463T Cybersecurity: Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats ]||U.S. Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| GAO||2010-03-24||[http://www.gao.gov/products/GAO-10-536t Information Security: Concerted Response Needed to Resolve Persistent Weaknesses, at: ]||Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]]||No | | GAO||2010-03-24||[http://www.gao.gov/products/GAO-10-536t Information Security: Concerted Response Needed to Resolve Persistent Weaknesses, at: ]||U.S. Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| GAO||2010-04-12||[http://www.gao.gov/products/GAO-10-237 Concerted Effort Needed to Consolidate and Secure Internet Connections at Federal Agencies ]||Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]],<br>5.7 [[Technology]]||No | | GAO||2010-04-12||[http://www.gao.gov/products/GAO-10-237 Concerted Effort Needed to Consolidate and Secure Internet Connections at Federal Agencies ]||U.S. Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]],<br>5.7 [[Technology]]||No | ||
|- | |- | ||
| GAO||2010-06-03||[http://www.gao.gov/assets/310/305208.pdf Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development]||Government Report||4.7 [[Public-Private Cooperation]],<br>5.3 [[Government Organizations]]||No | | GAO||2010-06-03||[http://www.gao.gov/assets/310/305208.pdf Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development]||U.S. Government Report||4.7 [[Public-Private Cooperation]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| GAO||2010-06-16||[http://www.gao.gov/products/GAO-10-834t Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats ]||Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]]||No | | GAO||2010-06-16||[http://www.gao.gov/products/GAO-10-834t Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats ]||U.S. Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| GAO||2010-07-01||[http://www.gao.gov/products/GAO-10-513 Federal Guidance Needed to Address Control Issues With Implementing Cloud Computing ]||Government Report ||3.3.3.3 [[Cloud Computing]],<br>5.3 [[Government Organizations]]||No | | GAO||2010-07-01||[http://www.gao.gov/products/GAO-10-513 Federal Guidance Needed to Address Control Issues With Implementing Cloud Computing ]||U.S. Government Report ||3.3.3.3 [[Cloud Computing]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| GAO||2010-07-15||[http://www.gao.gov/products/GAO-10-628 Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed ]||Government Report ||4.6 [[Information Sharing/Disclosure]],<br>4.7 [[Public-Private Cooperation]],<br>5.3 [[Government Organizations]]||No | | GAO||2010-07-15||[http://www.gao.gov/products/GAO-10-628 Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed ]||U.S. Government Report ||4.6 [[Information Sharing/Disclosure]],<br>4.7 [[Public-Private Cooperation]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| GAO||2010-08-02||[http://www.gao.gov/products/GAO-10-606 United States Faces Challenges in Addressing Global Cybersecurity and Governance ]||Government Report ||4.7 [[Public-Private Cooperation]],<br>5.3 [[Government Organizations]],<br>5.4 [[International Cooperation]]||No | | GAO||2010-08-02||[http://www.gao.gov/products/GAO-10-606 United States Faces Challenges in Addressing Global Cybersecurity and Governance ]||U.S. Government Report ||4.7 [[Public-Private Cooperation]],<br>5.3 [[Government Organizations]],<br>5.4 [[International Cooperation]]||No | ||
|- | |- | ||
| GAO||2010-09-15||[http://www.gao.gov/products/GAO-10-916 Information Security: Progress Made on Harmonizing Policies and Guidance for National Security and Non-National Security Systems ]||Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]]||No | | GAO||2010-09-15||[http://www.gao.gov/products/GAO-10-916 Information Security: Progress Made on Harmonizing Policies and Guidance for National Security and Non-National Security Systems ]||U.S. Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| GAO||2010-09-23||[http://www.gao.gov/products/GAO-10-772 DHS Efforts to Assess and Promote Resiliency Are Evolving but Program Management Could Be Strengthened ]||Government Report ||3.3 [[Security Targets]],<br>5.3 [[Government Organizations]]||No | | GAO||2010-09-23||[http://www.gao.gov/products/GAO-10-772 DHS Efforts to Assess and Promote Resiliency Are Evolving but Program Management Could Be Strengthened ]||U.S. Government Report ||3.3 [[Security Targets]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| GAO||2010-10-06||[http://www.gao.gov/products/GAO-11-24 Cyberspace Policy: Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed ]||Government Report ||5.1 [[Regulation/Liability]],<br>5.3 [[Government Organizations]]||No | | GAO||2010-10-06||[http://www.gao.gov/products/GAO-11-24 Cyberspace Policy: Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed ]||U.S. Government Report ||5.1 [[Regulation/Liability]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| GAO||2010-11-30||[http://www.gao.gov/products/GAO-11-43 Information Security: Federal Agencies Have Taken Steps to Secure Wireless Networks, but Further Actions Can Mitigate Risk ]||Government Report ||3.3.3 [[Communications]],<br>5.3 [[Government Organizations]],<br>5.7 [[Technology]]||No | | GAO||2010-11-30||[http://www.gao.gov/products/GAO-11-43 Information Security: Federal Agencies Have Taken Steps to Secure Wireless Networks, but Further Actions Can Mitigate Risk ]||U.S. Government Report ||3.3.3 [[Communications]],<br>5.3 [[Government Organizations]],<br>5.7 [[Technology]]||No | ||
|- | |- | ||
| GAO||2011-01-12||[http://www.gao.gov/products/GAO-11-117 Electricity Grid Modernization: Progress Being Made on Cybersecurity Guidelines, but Key Challenges Remain to be Addressed ]||Government Report ||3.3.2.1 [[Electricity, Oil and Natural Gas]],<br>5.1 [[Regulation/Liability]],<br>5.3 [[Government Organizations]]||No | | GAO||2011-01-12||[http://www.gao.gov/products/GAO-11-117 Electricity Grid Modernization: Progress Being Made on Cybersecurity Guidelines, but Key Challenges Remain to be Addressed ]||U.S. Government Report ||3.3.2.1 [[Electricity, Oil and Natural Gas]],<br>5.1 [[Regulation/Liability]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| GAO||2011-03-16||[http://www.gao.gov/products/GAO-11-463T Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure and Federal Information Systems ]||Government Report ||3.3 [[Security Targets]],<br>5.1 [[Regulation/Liability]],<br>5.3 [[Government Organizations]]||No | | GAO||2011-03-16||[http://www.gao.gov/products/GAO-11-463T Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure and Federal Information Systems ]||U.S. Government Report ||3.3 [[Security Targets]],<br>5.1 [[Regulation/Liability]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| GAO||2011-07-08||[http://www.gao.gov/products/GAO-11-149 Information Security: State Has Taken Steps to Implement a Continuous Monitoring Application, but Key Challenges Remain ]||Government Report ||3.3.1.1 [[Government Networks (.gov)]],<br>5.3 [[Government Organizations]],<br>5.7 [[Technology]]||No | | GAO||2011-07-08||[http://www.gao.gov/products/GAO-11-149 Information Security: State Has Taken Steps to Implement a Continuous Monitoring Application, but Key Challenges Remain ]||U.S. Government Report ||3.3.1.1 [[Government Networks (.gov)]],<br>5.3 [[Government Organizations]],<br>5.7 [[Technology]]||No | ||
|- | |- | ||
| GAO||2011-07-25||[http://www.gao.gov/products/GAO-11-75 Defense Department Cyber Efforts: DoD Faces Challenges in Its Cyber Activities ]||Government Report ||3.3.1.2 [[Military Networks (.mil)]],<br>5.3 [[Government Organizations]]||No | | GAO||2011-07-25||[http://www.gao.gov/products/GAO-11-75 Defense Department Cyber Efforts: DoD Faces Challenges in Its Cyber Activities ]||U.S. Government Report ||3.3.1.2 [[Military Networks (.mil)]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| GAO||2011-07-26||[http://www.gao.gov/products/GAO-11-463T Continued Attention Needed to Protect Our Nation’s Critical Infrastructure ]||Government Report ||3.3 [[Security Targets]],<br>5.1 [[Regulation/Liability]],<br>5.3 [[Government Organizations]]||No | | GAO||2011-07-26||[http://www.gao.gov/products/GAO-11-463T Continued Attention Needed to Protect Our Nation’s Critical Infrastructure ]||U.S. Government Report ||3.3 [[Security Targets]],<br>5.1 [[Regulation/Liability]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| GAO||2011-07-29||[http://www.gao.gov/products/GAO-11-695R Defense Department Cyber Efforts: Definitions, Focal Point, and Methodology Needed for DoD to Develop Full-Spectrum Cyberspace Budget Estimates ]||Government Report ||3.3.1.2 [[Military Networks (.mil)]],<br>4.2 [[Economics of Cybersecurity]],<br>5.3 [[Government Organizations]]||No | | GAO||2011-07-29||[http://www.gao.gov/products/GAO-11-695R Defense Department Cyber Efforts: Definitions, Focal Point, and Methodology Needed for DoD to Develop Full-Spectrum Cyberspace Budget Estimates ]||U.S. Government Report ||3.3.1.2 [[Military Networks (.mil)]],<br>4.2 [[Economics of Cybersecurity]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| GAO||2011-10-03||[http://www.gao.gov/products/GAO-12-137 Information Security: Weaknesses Continue Amid New Federal Efforts to Implement Requirements ]||Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>4.4 [[Usability/Human Factors]],<br>5.3 [[Government Organizations]]||No | | GAO||2011-10-03||[http://www.gao.gov/products/GAO-12-137 Information Security: Weaknesses Continue Amid New Federal Efforts to Implement Requirements ]||U.S. Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>4.4 [[Usability/Human Factors]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| GAO||2011-10-05||[http://www.gao.gov/products/GAO-12-130T Information Security: Additional Guidance Needed to Address Cloud Computing Concerns ]||Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>3.3.3.3 [[Cloud Computing]],<br>5.3 [[Government Organizations]]||No | | GAO||2011-10-05||[http://www.gao.gov/products/GAO-12-130T Information Security: Additional Guidance Needed to Address Cloud Computing Concerns ]||U.S. Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>3.3.3.3 [[Cloud Computing]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| GAO||2011-10-17||[http://www.gao.gov/products/GAO-11-634 Federal Chief Information Officers: Opportunities Exist to Improve Role in Information Technology Management ]||Government Report ||5.1 [[Regulation/Liability]],<br>5.3 [[Government Organizations]]||No | | GAO||2011-10-17||[http://www.gao.gov/products/GAO-11-634 Federal Chief Information Officers: Opportunities Exist to Improve Role in Information Technology Management ]||U.S. Government Report ||5.1 [[Regulation/Liability]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| GAO||2011-11-29||[http://www.gao.gov/products/GAO-12-8 Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination, at: ]||Government Report ||4.2 [[Economics of Cybersecurity]],<br>4.4 [[Usability/Human Factors]],<br>5.3 [[Government Organizations]]||No | | GAO||2011-11-29||[http://www.gao.gov/products/GAO-12-8 Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination, at: ]||U.S. Government Report ||4.2 [[Economics of Cybersecurity]],<br>4.4 [[Usability/Human Factors]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| GAO||2011-12-09||[http://www.gao.gov/products/GAO-12-92 Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use ]||Government Report ||3.3 [[Security Targets]],<br>5.1 [[Regulation/Liability]],<br>5.3 [[Government Organizations]]||No | | GAO||2011-12-09||[http://www.gao.gov/products/GAO-12-92 Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use ]||U.S. Government Report ||3.3 [[Security Targets]],<br>5.1 [[Regulation/Liability]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| GAO||2012-01-13||[http://www.gao.gov/assets/590/587681.pdf Defense Contracting: Improved Policies and Tools Could Help Increase Competition on DOD's National Security Exception Procurements]||Government Report||3.3.1.2 [[Military Networks (.mil)]],<br>4.7 [[Public-Private Cooperation]]||No | | GAO||2012-01-13||[http://www.gao.gov/assets/590/587681.pdf Defense Contracting: Improved Policies and Tools Could Help Increase Competition on DOD's National Security Exception Procurements]||U.S. Government Report||3.3.1.2 [[Military Networks (.mil)]],<br>4.7 [[Public-Private Cooperation]]||No | ||
|- | |- | ||
| GAO||2012-02-28||[http://www.csit.qub.ac.uk/media/pdf/Filetoupload,252359,en.pdf Cybersecurity: Challenges to Securing the Modernized Electricity Grid ]||Government Report ||||No | | GAO||2012-02-28||[http://www.csit.qub.ac.uk/media/pdf/Filetoupload,252359,en.pdf Cybersecurity: Challenges to Securing the Modernized Electricity Grid ]||U.S. Government Report ||||No | ||
|- | |- | ||
| GAO||2009-07||[http://www.gao.gov/new.items/d09546.pdf Information Security: Agencies Continue to Report Progress, but Need to. Mitigate Persistent Weaknesses]||Government Report||3.3.1.1 [[Government Networks (.gov)]],<br>5.3 [[Government Organizations]]||No | | GAO||2009-07||[http://www.gao.gov/new.items/d09546.pdf Information Security: Agencies Continue to Report Progress, but Need to. Mitigate Persistent Weaknesses]||U.S. Government Report||3.3.1.1 [[Government Networks (.gov)]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| GAO||2009-09||[http://www.gao.gov/new.items/d09617.pdf Information Security: Concerted Effort Needed to Improve Federal Performance Measures]||Government Report||3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]]||No | | GAO||2009-09||[http://www.gao.gov/new.items/d09617.pdf Information Security: Concerted Effort Needed to Improve Federal Performance Measures]||U.S. Government Report||3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| GAO ||2011-10-05||[http://www.gao.gov/products/GAO-12-130T Information Security: Additional Guidance Needed to Address Cloud Computing Concerns ]||Government Report ||3.3.3.3 [[Cloud Computing]],<br>5.3 [[Government Organizations]]||No | | GAO ||2011-10-05||[http://www.gao.gov/products/GAO-12-130T Information Security: Additional Guidance Needed to Address Cloud Computing Concerns ]||U.S. Government Report ||3.3.3.3 [[Cloud Computing]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| General Accountability Office (GAO) ||2010-07-15||[http://www.gao.gov/products/GAO-10-628 Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed ]||Government Report||3.3 [[Security Targets]],<br>4.6 [[Information Sharing/Disclosure]],<br>4.7 [[Public-Private Cooperation]]||No | | General Accountability Office (GAO) ||2010-07-15||[http://www.gao.gov/products/GAO-10-628 Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed ]||U.S. Government Report||3.3 [[Security Targets]],<br>4.6 [[Information Sharing/Disclosure]],<br>4.7 [[Public-Private Cooperation]]||No | ||
|- | |- | ||
| General Accountability Office (GAO) ||2011-01-12||[http://www.gao.gov/products/GAO-11-117 Electricity Grid Modernization: Progress Being Made on Cybersecurity Guidelines, but Key Challenges Remain to be Addressed ]||Government Report||3.3.2.1 [[Electricity, Oil and Natural Gas]],<br>5.1 [[Regulation/Liability]],<br>5.3 [[Government Organizations]]||No | | General Accountability Office (GAO) ||2011-01-12||[http://www.gao.gov/products/GAO-11-117 Electricity Grid Modernization: Progress Being Made on Cybersecurity Guidelines, but Key Challenges Remain to be Addressed ]||U.S. Government Report||3.3.2.1 [[Electricity, Oil and Natural Gas]],<br>5.1 [[Regulation/Liability]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| General Accountability Office (GAO) ||2011-03-16||[http://www.gao.gov/products/GAO-11-463T Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure and Federal Information Systems ]||Government Report||3. [[Threats and Actors]],<br>3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]]||No | | General Accountability Office (GAO) ||2011-03-16||[http://www.gao.gov/products/GAO-11-463T Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure and Federal Information Systems ]||U.S. Government Report||3. [[Threats and Actors]],<br>3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| General Accountability Office (GAO) ||2011-07-29||[http://www.gao.gov/products/GAO-11-695R Defense Department Cyber Efforts: Definitions, Focal Point, and Methodology Needed for DOD to Develop Full-Spectrum Cyberspace Budget Estimates ]||Government Report ||4.2 [[Economics of Cybersecurity]],<br>5.3 [[Government Organizations]]||No | | General Accountability Office (GAO) ||2011-07-29||[http://www.gao.gov/products/GAO-11-695R Defense Department Cyber Efforts: Definitions, Focal Point, and Methodology Needed for DOD to Develop Full-Spectrum Cyberspace Budget Estimates ]||U.S. Government Report ||4.2 [[Economics of Cybersecurity]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| General Accountability Office (GAO) ||2011-11-29||[http://www.gao.gov/products/GAO-12-8 Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination ]||Government Report||3.3.1 [[Public Critical Infrastructure]],<br>4.4 [[Usability/Human Factors]],<br>5.3 [[Government Organizations]]||No | | General Accountability Office (GAO) ||2011-11-29||[http://www.gao.gov/products/GAO-12-8 Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination ]||U.S. Government Report||3.3.1 [[Public Critical Infrastructure]],<br>4.4 [[Usability/Human Factors]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| General Accountability Office (GAO) ||2011-12-09||[http://www.gao.gov/products/GAO-12-92 Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use ]||Government Report ||||No | | General Accountability Office (GAO) ||2011-12-09||[http://www.gao.gov/products/GAO-12-92 Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use ]||U.S. Government Report ||||No | ||
|- | |- | ||
| General Services Administration (GSA) ||2012-02-07||[http://www.gsa.gov/graphics/staffoffices/FedRAMP_CONOPS.pdf Concept of Operations: FedRAMP ]||Government Report ||3.3.3.3 [[Cloud Computing]],<br>5.3 [[Government Organizations]]||No | | General Services Administration (GSA) ||2012-02-07||[http://www.gsa.gov/graphics/staffoffices/FedRAMP_CONOPS.pdf Concept of Operations: FedRAMP ]||U.S. Government Report ||3.3.3.3 [[Cloud Computing]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| Grady, Mark F. ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/The_Law_and_Economics_of_Cybersecurity The Law and Economics of Cybersecurity ]||Book ||4.2 [[Economics of Cybersecurity]],<br>5.1 [[Regulation/Liability]]||Yes | | Grady, Mark F. ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/The_Law_and_Economics_of_Cybersecurity The Law and Economics of Cybersecurity ]||Book ||4.2 [[Economics of Cybersecurity]],<br>5.1 [[Regulation/Liability]]||Yes | ||
Line 239: | Line 239: | ||
| Graham David E ||2010||[http://cyber.law.harvard.edu/cybersecurity/Cyber_Threats_and_the_Law_of_War Cyber Threats and the Law of War]||Journal Article||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes | | Graham David E ||2010||[http://cyber.law.harvard.edu/cybersecurity/Cyber_Threats_and_the_Law_of_War Cyber Threats and the Law of War]||Journal Article||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes | ||
|- | |- | ||
| Granick, Jennifer Stisa ||1909-06-28||[http://cyber.law.harvard.edu/cybersecurity/The_Price_of_Restricting_Vulnerability_Publications The Price of Restricting Vulnerability Publications ]|| | | Granick, Jennifer Stisa ||1909-06-28||[http://cyber.law.harvard.edu/cybersecurity/The_Price_of_Restricting_Vulnerability_Publications The Price of Restricting Vulnerability Publications ]||Journal Article ||4.2 [[Economics of Cybersecurity]],<br>4.6 [[Information Sharing/Disclosure]],<br>5.1 [[Regulation/Liability]]||Yes | ||
|- | |- | ||
| Hollis, Duncan B. ||1909-06-30||[http://cyber.law.harvard.edu/cybersecurity/Why_States_Need_an_International_Law_for_Information_Operations Why States Need an International Law for Information Operations ]|| | | Hollis, Duncan B. ||1909-06-30||[http://cyber.law.harvard.edu/cybersecurity/Why_States_Need_an_International_Law_for_Information_Operations Why States Need an International Law for Information Operations ]||Journal Article ||4.12 [[Cyberwar]],<br>4.13.1 [[Government to Government|Government to Government Espionage]],<br>5.5 [[International Law (including Laws of War)]]||Yes | ||
|- | |- | ||
| HP TippingPoint DVLabs ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/2010_Top_Cyber_Security_Risks_Report 2010 Top Cyber Security Risks Report ]||Industry report ||4.11 [[Cybercrime]],<br>5.7 [[Technology]]||Yes | | HP TippingPoint DVLabs ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/2010_Top_Cyber_Security_Risks_Report 2010 Top Cyber Security Risks Report ]||Industry report ||4.11 [[Cybercrime]],<br>5.7 [[Technology]]||Yes | ||
Line 255: | Line 255: | ||
| International Telecommunications Union ||2012-02-10||[http://www.itu.int/ITU-D/cyb/cybersecurity/docs/itu-toolkit-cybercrime-legislation.pdf ITU Toolkit for Cybercrime Legislation ]||ndependent Report||||No | | International Telecommunications Union ||2012-02-10||[http://www.itu.int/ITU-D/cyb/cybersecurity/docs/itu-toolkit-cybercrime-legislation.pdf ITU Toolkit for Cybercrime Legislation ]||ndependent Report||||No | ||
|- | |- | ||
| James Clapper, Director of National Intelligence ||2011-02-10||[http://www.dni.gov/testimonies/20110210_testimony_clapper.pdf Worldwide Threat Assessment of the U.S. Intelligence Community (Testimony) ]||Government Report||3. [[The Threat and Skeptics]],<br>3.2 [[Actors and Incentives]]||No | | James Clapper, Director of National Intelligence ||2011-02-10||[http://www.dni.gov/testimonies/20110210_testimony_clapper.pdf Worldwide Threat Assessment of the U.S. Intelligence Community (Testimony) ]||U.S. Government Report||3. [[The Threat and Skeptics]],<br>3.2 [[Actors and Incentives]]||No | ||
|- | |- | ||
| Johnson, Eric M. ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/Managing_Information_Risk_and_the_Economics_of_Security Managing Information Risk and the Economics of Security ]||Book ||4.2 [[Economics of Cybersecurity]],<br>4.2.1 [[Risk Management and Investment]],<br>5.1 [[Regulation/Liability]]||Yes | | Johnson, Eric M. ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/Managing_Information_Risk_and_the_Economics_of_Security Managing Information Risk and the Economics of Security ]||Book ||4.2 [[Economics of Cybersecurity]],<br>4.2.1 [[Risk Management and Investment]],<br>5.1 [[Regulation/Liability]]||Yes | ||
|- | |- | ||
| Johnson, Vincent R. ||1909-06-28||[http://cyber.law.harvard.edu/cybersecurity/Cybersecurity,_Identity_Theft,_and_the_Limits_of_Tort_Liability Cybersecurity, Identity Theft, and the Limits of Tort Liability ]|| | | Johnson, Vincent R. ||1909-06-28||[http://cyber.law.harvard.edu/cybersecurity/Cybersecurity,_Identity_Theft,_and_the_Limits_of_Tort_Liability Cybersecurity, Identity Theft, and the Limits of Tort Liability ]||Journal Article ||4.9 [[Identity Management]],<br>4.10 [[Privacy]],<br>5.1 [[Regulation/Liability]]||Yes | ||
|- | |- | ||
| Joint Workshop of the National Security Threats in Cyberspace and the National Strategy Forum ||2009-09-15||[http://nationalstrategy.com/Portals/0/National%20Security%20Threats%20in%20Cyberspace%20FINAL%2009-15-09.pdf National Security Threats in Cyberspace ]||Independent Report||||No | | Joint Workshop of the National Security Threats in Cyberspace and the National Strategy Forum ||2009-09-15||[http://nationalstrategy.com/Portals/0/National%20Security%20Threats%20in%20Cyberspace%20FINAL%2009-15-09.pdf National Security Threats in Cyberspace ]||Independent Report||||No | ||
Line 265: | Line 265: | ||
| Journal of Strategic Studies ||2011-10-05||[http://www.tandfonline.com/doi/abs/10.1080/01402390.2011.6089393 Cyber War Will Not Take Place ]||Journal Article||||No | | Journal of Strategic Studies ||2011-10-05||[http://www.tandfonline.com/doi/abs/10.1080/01402390.2011.6089393 Cyber War Will Not Take Place ]||Journal Article||||No | ||
|- | |- | ||
| Kerr, Paul K. et al.<br />CRS||2010-12-09||[http://www.fas.org/sgp/crs/natsec/R41524.pdf The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability]||Government Report||3.3 [[Security Targets]],<br>4.12 [[Cyberwar]],<br>5.4 International Law (including Laws of War)||No | | Kerr, Paul K. et al.<br />CRS||2010-12-09||[http://www.fas.org/sgp/crs/natsec/R41524.pdf The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability]||U.S. Government Report||3.3 [[Security Targets]],<br>4.12 [[Cyberwar]],<br>5.4 International Law (including Laws of War)||No | ||
|- | |- | ||
| Kobayashi, Bruce H. ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/An_Economic_Analysis_of_the_Private_and_Social_Costs_of_the_Provision_of_Cybersecurity_and_Other_Public_Security_Goods An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods ]||Journal Article ||4.2 [[Economics of Cybersecurity]],<br>4.2.2 [[Incentives]],<br>5.6 [[Deterrence]]||Yes | | Kobayashi, Bruce H. ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/An_Economic_Analysis_of_the_Private_and_Social_Costs_of_the_Provision_of_Cybersecurity_and_Other_Public_Security_Goods An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods ]||Journal Article ||4.2 [[Economics of Cybersecurity]],<br>4.2.2 [[Incentives]],<br>5.6 [[Deterrence]]||Yes | ||
Line 273: | Line 273: | ||
| Kramer, Franklin D., et. al ||1909-07-02||[http://cyber.law.harvard.edu/cybersecurity/Cyberpower_and_National_Security Cyberpower and National Security ]||Book ||1. [[Overview]]||Yes | | Kramer, Franklin D., et. al ||1909-07-02||[http://cyber.law.harvard.edu/cybersecurity/Cyberpower_and_National_Security Cyberpower and National Security ]||Book ||1. [[Overview]]||Yes | ||
|- | |- | ||
| Kundra, Vivek||2010-12-09||[http://www.cio.gov/documents/25-point-implementation-plan-to-reform-federal%20it.pdf 25 Point Implementation Plan to Reform Federal Information Technology Management]||Government Report||3.3.1.1 [[Government Networks (.gov)]],<br>3.3.3.3 [[Cloud Computing]],<br>5.3 [[Government Organizations]]||No | | Kundra, Vivek||2010-12-09||[http://www.cio.gov/documents/25-point-implementation-plan-to-reform-federal%20it.pdf 25 Point Implementation Plan to Reform Federal Information Technology Management]||U.S. Government Report||3.3.1.1 [[Government Networks (.gov)]],<br>3.3.3.3 [[Cloud Computing]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| Kundra, Vivek||2011-02-08||[http://www.cio.gov/documents/federal-cloud-computing-strategy.pdf Federal Cloud Computing Strategy]||Government Report||3.3.1.1 [[Government Networks (.gov)]],<br>3.3.3.3 [[Cloud Computing]],<br>5.3 [[Government Organizations]]||No | | Kundra, Vivek||2011-02-08||[http://www.cio.gov/documents/federal-cloud-computing-strategy.pdf Federal Cloud Computing Strategy]||U.S. Government Report||3.3.1.1 [[Government Networks (.gov)]],<br>3.3.3.3 [[Cloud Computing]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| Lernard, Thomas M. ||1909-06-28||[http://cyber.law.harvard.edu/cybersecurity/An_Economic_Analysis_of_Notification_Requirements_for_Data_Security_Breaches An Economic Analysis of Notification Requirements for Data Security Breaches ]||Online Paper ||4.2 [[Economics of Cybersecurity]],<br>4.6 [[Information Sharing/Disclosure]],<br>5.1 [[Regulation/Liability]]||Yes | | Lernard, Thomas M. ||1909-06-28||[http://cyber.law.harvard.edu/cybersecurity/An_Economic_Analysis_of_Notification_Requirements_for_Data_Security_Breaches An Economic Analysis of Notification Requirements for Data Security Breaches ]||Online Paper ||4.2 [[Economics of Cybersecurity]],<br>4.6 [[Information Sharing/Disclosure]],<br>5.1 [[Regulation/Liability]]||Yes | ||
Line 297: | Line 297: | ||
| Mitre Corp (JASON Program Office) ||2012-11-10||[http://www.fas.org/irp/agency/dod/jason/cyber.pdf Science of Cyber-Security ]||Independent Report||1. [[Overview]],<br>4. [[Issues]]||No | | Mitre Corp (JASON Program Office) ||2012-11-10||[http://www.fas.org/irp/agency/dod/jason/cyber.pdf Science of Cyber-Security ]||Independent Report||1. [[Overview]],<br>4. [[Issues]]||No | ||
|- | |- | ||
| Moore, Tyler ||1909-06-30||[http://cyber.law.harvard.edu/cybersecurity/Examining_the_Impact_of_Website_Take-down_on_Phishing Examining the Impact of Website Take-down on Phishing ]|| | | Moore, Tyler ||1909-06-30||[http://cyber.law.harvard.edu/cybersecurity/Examining_the_Impact_of_Website_Take-down_on_Phishing Examining the Impact of Website Take-down on Phishing ]||Article ||4.2 [[Economics of Cybersecurity]],<br>4.11 [[Cybercrime]],<br>5.7 [[Technology]]||Yes | ||
|- | |- | ||
| Moore, Tyler ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/The_Consequence_of_Non-Cooperation_in_the_Fight_Against_Phishing The Consequence of Non-Cooperation in the Fight Against Phishing ]|| | | Moore, Tyler ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/The_Consequence_of_Non-Cooperation_in_the_Fight_Against_Phishing The Consequence of Non-Cooperation in the Fight Against Phishing ]||Article ||3.3.2.2 [[Financial Institutions and Networks]],<br>4.2 [[Economics of Cybersecurity]],<br>4.6 [[Information Sharing/Disclosure]]||Yes | ||
|- | |- | ||
| Moore, Tyler ||1909-07-02||[http://cyber.law.harvard.edu/cybersecurity/The_Impact_of_Incentives_on_Notice_and_Take-down The Impact of Incentives on Notice and Take-down ]||Book Chapter ||4.2.2 [[Incentives]],<br>4.11 [[Cybercrime]],<br>5.4 [[International Cooperation]]||Yes | | Moore, Tyler ||1909-07-02||[http://cyber.law.harvard.edu/cybersecurity/The_Impact_of_Incentives_on_Notice_and_Take-down The Impact of Incentives on Notice and Take-down ]||Book Chapter ||4.2.2 [[Incentives]],<br>4.11 [[Cybercrime]],<br>5.4 [[International Cooperation]]||Yes | ||
Line 311: | Line 311: | ||
| National Cyber Security Alliance and Microsoft ||2011-05-13||[http://www.staysafeonline.org/sites/default/files/resource_documents/2011%20National%20K-12%20Study%20Final_0.pdf 2011 State of Cyberethics, Cybersafety and Cybersecurity Curriculum in the U.S. Survey ]||Industry Report||4.4 [[Usability/Human Factors]]||No | | National Cyber Security Alliance and Microsoft ||2011-05-13||[http://www.staysafeonline.org/sites/default/files/resource_documents/2011%20National%20K-12%20Study%20Final_0.pdf 2011 State of Cyberethics, Cybersafety and Cybersecurity Curriculum in the U.S. Survey ]||Industry Report||4.4 [[Usability/Human Factors]]||No | ||
|- | |- | ||
| National Cyber Security Summit Task Force ||1909-06-27||[http://cyber.law.harvard.edu/cybersecurity/Information_Security_Governance Information Security Governance ]||Government Report ||4.7 [[Public-Private Cooperation]],<br>5.2 [[Private Efforts/Organizations]],<br>5.3 [[Government Organizations]]||Yes | | National Cyber Security Summit Task Force ||1909-06-27||[http://cyber.law.harvard.edu/cybersecurity/Information_Security_Governance Information Security Governance ]||U.S. Government Report ||4.7 [[Public-Private Cooperation]],<br>5.2 [[Private Efforts/Organizations]],<br>5.3 [[Government Organizations]]||Yes | ||
|- | |- | ||
| National Infrastructure Advisory Council ||1909-06-27||[http://cyber.law.harvard.edu/cybersecurity/Hardening_The_Internet Hardening The Internet ]||Government Report ||3.3 [[Security Targets]],<br>4.7 [[Public-Private Cooperation]],<br>5.3 [[Government Organizations]]||Yes | | National Infrastructure Advisory Council ||1909-06-27||[http://cyber.law.harvard.edu/cybersecurity/Hardening_The_Internet Hardening The Internet ]||U.S. Government Report ||3.3 [[Security Targets]],<br>4.7 [[Public-Private Cooperation]],<br>5.3 [[Government Organizations]]||Yes | ||
|- | |- | ||
| National Initiative for Cybersecurity Education||2011-08-11||[http://csrc.nist.gov/nice/documents/nicestratplan/Draft_NICE-Strategic-Plan_Aug2011.pdf National Initiative for Cybersecurity Education Strategic Plan: Building a Digital Nation]||Government Report||1. [[Overview]],<br>5.3 [[Government Organizations]]||No | | National Initiative for Cybersecurity Education||2011-08-11||[http://csrc.nist.gov/nice/documents/nicestratplan/Draft_NICE-Strategic-Plan_Aug2011.pdf National Initiative for Cybersecurity Education Strategic Plan: Building a Digital Nation]||U.S. Government Report||1. [[Overview]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| National Initiative for Cybersecurity Education (NICE) ||2011-11-21||[http://csrc.nist.gov/nice/framework/documents/NICE-Cybersecurity-Workforce-Framework-printable.pdf NICE Cybersecurity Workforce Framework ]||Government Report||4.4 [[Usability/Human Factors]],<br>5.3 [[Government Organizations]]||No | | National Initiative for Cybersecurity Education (NICE) ||2011-11-21||[http://csrc.nist.gov/nice/framework/documents/NICE-Cybersecurity-Workforce-Framework-printable.pdf NICE Cybersecurity Workforce Framework ]||U.S. Government Report||4.4 [[Usability/Human Factors]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| National Institute of Standards and Technology ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/SP_800-82:_Guide_to_Supervisory_Control_and_Data_Acquisition_(SCADA)_and_Industrial_Control_Systems_Security SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security ]||Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>.2.1 Risk Management and Investment,<br>5.2 [[Private Efforts/Organizations]]||Yes | | National Institute of Standards and Technology ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/SP_800-82:_Guide_to_Supervisory_Control_and_Data_Acquisition_(SCADA)_and_Industrial_Control_Systems_Security SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security ]||U.S. Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>.2.1 Risk Management and Investment,<br>5.2 [[Private Efforts/Organizations]]||Yes | ||
|- | |- | ||
| National Institute of Standards and Technology (NIST) ||2010-09-02||[http://www.nist.gov/public_affairs/releases/nist-finalizes-initial-set-of-smart-grid-cyber-security-guidelines.cfm NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines ]||Government Report||3.3.2.1 [[Electricity, Oil and Natural Gas]],<br>5.1 [[Regulation/Liability]],<br>5.3 [[Government Organizations]]||No | | National Institute of Standards and Technology (NIST) ||2010-09-02||[http://www.nist.gov/public_affairs/releases/nist-finalizes-initial-set-of-smart-grid-cyber-security-guidelines.cfm NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines ]||U.S. Government Report||3.3.2.1 [[Electricity, Oil and Natural Gas]],<br>5.1 [[Regulation/Liability]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| National Research Council ||1909-06-22||[http://cyber.law.harvard.edu/cybersecurity/Trust_in_Cyberspace Trust in Cyberspace ]||Independent Report ||3.3.3.2 [[Public Data Networks]],<br>4.2.2 [[Incentives]],<br>4.7 [[Public-Private Cooperation]]||Yes | | National Research Council ||1909-06-22||[http://cyber.law.harvard.edu/cybersecurity/Trust_in_Cyberspace Trust in Cyberspace ]||Independent Report ||3.3.3.2 [[Public Data Networks]],<br>4.2.2 [[Incentives]],<br>4.7 [[Public-Private Cooperation]]||Yes | ||
Line 331: | Line 331: | ||
| National Research Council ||2010-10-05||[http://www.nap.edu/catalog.php?record_id=12997#description Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy ]||Independent Report||3. [[Threats and Actors]],<br>4. [[Issues]],<br>5. [[Approaches]]||No | | National Research Council ||2010-10-05||[http://www.nap.edu/catalog.php?record_id=12997#description Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy ]||Independent Report||3. [[Threats and Actors]],<br>4. [[Issues]],<br>5. [[Approaches]]||No | ||
|- | |- | ||
| National Research Council, Committee for Advancing Software-Intensive Systems Producibility ||2010-10-20||[http://www.nap.edu/catalog.php?record_id=12979 Critical Code: Software Producibility for Defense ]||Government Report ||3.3.1.2 [[Military Networks (.mil)]],<br>5.3 [[Government Organizations]],<br>5.7 [[Technology]]||No | | National Research Council, Committee for Advancing Software-Intensive Systems Producibility ||2010-10-20||[http://www.nap.edu/catalog.php?record_id=12979 Critical Code: Software Producibility for Defense ]||U.S. Government Report ||3.3.1.2 [[Military Networks (.mil)]],<br>5.3 [[Government Organizations]],<br>5.7 [[Technology]]||No | ||
|- | |- | ||
| National Science and Technology Council ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/Federal_Plan_for_Cyber_Security_and_Information_Assurance_Research_and_Development Federal Plan for Cyber Security and Information Assurance Research and Development ]||Government Report ||4.1 [[Metrics]],<br>4.7 Attribution,<bR>4.8 Public-Private Cooperation||Yes | | National Science and Technology Council ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/Federal_Plan_for_Cyber_Security_and_Information_Assurance_Research_and_Development Federal Plan for Cyber Security and Information Assurance Research and Development ]||U.S. Government Report ||4.1 [[Metrics]],<br>4.7 Attribution,<bR>4.8 Public-Private Cooperation||Yes | ||
|- | |- | ||
| National Science Foundation||2011-08-11||[http://www.livescience.com/15423-forefront-cyber-security-research-nsf-bts.html At the Forefront of Cyber Security Research ]||Government Report||5.7 [[Technology]]||No | | National Science Foundation||2011-08-11||[http://www.livescience.com/15423-forefront-cyber-security-research-nsf-bts.html At the Forefront of Cyber Security Research ]||U.S. Government Report||5.7 [[Technology]]||No | ||
|- | |- | ||
| National Science Foundation||2012-01-17||[http://www.nsf.gov/awardsearch/showAward.do?AwardNumber=1127185 Information Security Risk Taking ]||Government Report||4.1 [[Metrics]],<br>4.6 [[Information Sharing/Disclosure]],<br>5.3 [[Government Organizations]]||No | | National Science Foundation||2012-01-17||[http://www.nsf.gov/awardsearch/showAward.do?AwardNumber=1127185 Information Security Risk Taking ]||U.S. Government Report||4.1 [[Metrics]],<br>4.6 [[Information Sharing/Disclosure]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| National Security Cyberspace Institute||2012-07-11||[http://www.nsci-va.org/WhitePapers/2011-07-22-Cyber Analogies Whitepaper-K McKee.pdf A Review of Frequently Used Cyber Analogies ]||Independent Report||||No | | National Security Cyberspace Institute||2012-07-11||[http://www.nsci-va.org/WhitePapers/2011-07-22-Cyber Analogies Whitepaper-K McKee.pdf A Review of Frequently Used Cyber Analogies ]||Independent Report||||No | ||
Line 343: | Line 343: | ||
| National Security Initiative ||2010-10-18||[http://www.americansecuritychallenge.com/ American Security Challenge ]||Independent Report||||No | | National Security Initiative ||2010-10-18||[http://www.americansecuritychallenge.com/ American Security Challenge ]||Independent Report||||No | ||
|- | |- | ||
| Networking and Information Technology Research and Development ||1909-07-02||[http://cyber.law.harvard.edu/cybersecurity/National_Cyber_Leap_Year_Summit_2009,_Co-Chairs%27_Report National Cyber Leap Year Summit 2009, Co-Chairs' Report ]||Government Report ||4.6 [[Information Sharing/Disclosure]],<br>4.9 [[Identity Management]],<br>5.7 [[Technology]]||Yes | | Networking and Information Technology Research and Development ||1909-07-02||[http://cyber.law.harvard.edu/cybersecurity/National_Cyber_Leap_Year_Summit_2009,_Co-Chairs%27_Report National Cyber Leap Year Summit 2009, Co-Chairs' Report ]||U.S. Government Report ||4.6 [[Information Sharing/Disclosure]],<br>4.9 [[Identity Management]],<br>5.7 [[Technology]]||Yes | ||
|- | |- | ||
| NIST ||2011-09-01||[http://www.nist.gov/customcf/get_pdf.cfm?pub_id=909505 Cloud Computing Reference Architecture ]||Government Report ||3.3.3.3 [[Cloud Computing]]||No | | NIST ||2011-09-01||[http://www.nist.gov/customcf/get_pdf.cfm?pub_id=909505 Cloud Computing Reference Architecture ]||U.S. Government Report ||3.3.3.3 [[Cloud Computing]]||No | ||
|- | |- | ||
| NIST ||2011-12-01||[http://www.nist.gov/itl/cloud/upload/SP_500_293_volumeII.pdf U.S. Government Cloud Computing Technology Roadmap, Release 1.0 (Draft), Volume II Useful Information for Cloud Adopters ]||Government Report ||3.3.3.3 [[Cloud Computing]],<br>5.3 [[Government Organizations]]||No | | NIST ||2011-12-01||[http://www.nist.gov/itl/cloud/upload/SP_500_293_volumeII.pdf U.S. Government Cloud Computing Technology Roadmap, Release 1.0 (Draft), Volume II Useful Information for Cloud Adopters ]||U.S. Government Report ||3.3.3.3 [[Cloud Computing]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| NIST ||2012-02-17||[http://www.nist.gov/nstic/2012-nstic-governance-recs.pdf Recommendations for Establishing an Identity Ecosystem Governance Structure for the National Strategy for Trusted Identities in Cyberspace ]||Government Report ||4.7 [[Public-Private Cooperation]],<br>4.9 [[Identity Management]],<br>5.3 [[Government Organizations]]||No | | NIST ||2012-02-17||[http://www.nist.gov/nstic/2012-nstic-governance-recs.pdf Recommendations for Establishing an Identity Ecosystem Governance Structure for the National Strategy for Trusted Identities in Cyberspace ]||U.S. Government Report ||4.7 [[Public-Private Cooperation]],<br>4.9 [[Identity Management]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| North American Electric Reliability Corp. (NERC) ||2011-01-26||[http://www.wired.com/images_blogs/threatlevel/2011/02/DoE-IG-Report-on-Grid-Security.pdf Federal Energy Regulatory Commission's Monitoring of Power Grid Cyber Security ]||Government Report||3.3.2.1 [[Electricity, Oil and Natural Gas]],<br>4.7 [[Public-Private Cooperation]],<br>5.1 [[Regulation/Liability]]||No | | North American Electric Reliability Corp. (NERC) ||2011-01-26||[http://www.wired.com/images_blogs/threatlevel/2011/02/DoE-IG-Report-on-Grid-Security.pdf Federal Energy Regulatory Commission's Monitoring of Power Grid Cyber Security ]||U.S. Government Report||3.3.2.1 [[Electricity, Oil and Natural Gas]],<br>4.7 [[Public-Private Cooperation]],<br>5.1 [[Regulation/Liability]]||No | ||
|- | |- | ||
| NSTC||2011-12||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/fed_cybersecurity_rd_strategic_plan_2011.pdf Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program]||Government Report||5.3 [[Government Organizations]]||No | | NSTC||2011-12||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/fed_cybersecurity_rd_strategic_plan_2011.pdf Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program]||U.S. Government Report||5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| Nye, Joseph ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/Cyber_Power Cyber Power ]||Book Chapter ||4.12 [[Cyberwar]],<br>4.13 [[Espionage]],<br>5.5 [[International Law (including Laws of War)]]||Yes | | Nye, Joseph ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/Cyber_Power Cyber Power ]||Book Chapter ||4.12 [[Cyberwar]],<br>4.13 [[Espionage]],<br>5.5 [[International Law (including Laws of War)]]||Yes | ||
|- | |- | ||
| Office of the National Counterintelligence Executive ||2011-11-03||[http://www.ncix.gov/publications/reports/fecie_all/Foreign_Economic_Collection_2011.pdf Foreign Spies Stealing US Economic Secrets in Cyberspace ]||Government Report||3. [[Threats and Actors]],<br>3.2 [[Actors and Incentives]],<br>4.13 [[Espionage]]||No | | Office of the National Counterintelligence Executive ||2011-11-03||[http://www.ncix.gov/publications/reports/fecie_all/Foreign_Economic_Collection_2011.pdf Foreign Spies Stealing US Economic Secrets in Cyberspace ]||U.S. Government Report||3. [[Threats and Actors]],<br>3.2 [[Actors and Incentives]],<br>4.13 [[Espionage]]||No | ||
|- | |- | ||
| Organisation for Economic Co-operation and Development (OECD) ||2010-11-12||[http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.165.2211&rep=rep1&type=pdf The Role of Internet Service Providers in Botnet Mitigation: an Empirical Analysis Bases on Spam Data ]||Independent Report||3. [[Threats and Actors]],<br>5.7 [[Technology]]||No | | Organisation for Economic Co-operation and Development (OECD) ||2010-11-12||[http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.165.2211&rep=rep1&type=pdf The Role of Internet Service Providers in Botnet Mitigation: an Empirical Analysis Bases on Spam Data ]||Independent Report||3. [[Threats and Actors]],<br>5.7 [[Technology]]||No | ||
|- | |- | ||
| Organization for Economic Co-operation and Development (OECD) ||2012-01-10||[http://www.oecd-ilibrary.org/docserver/download/fulltext/5k9h2q8v9bln.pdf?expires=1330527950&id=id&accname=guest&checksum=F4470043AC638BE19D5131C3D5CE5EA4 ICT Applications for the Smart Grid: Opportunities and Policy Implications ]||Government Report ||||No | | Organization for Economic Co-operation and Development (OECD) ||2012-01-10||[http://www.oecd-ilibrary.org/docserver/download/fulltext/5k9h2q8v9bln.pdf?expires=1330527950&id=id&accname=guest&checksum=F4470043AC638BE19D5131C3D5CE5EA4 ICT Applications for the Smart Grid: Opportunities and Policy Implications ]||U.S. Government Report ||||No | ||
|- | |- | ||
| PCAST||2010-12||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-nitrd-report-2010.pdf Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technology]||Government Report||4.3 [[Supply Chain Issues]],<br>4.10 [[Privacy]],<br>5.3 [[Government Organizations]]||No | | PCAST||2010-12||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-nitrd-report-2010.pdf Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technology]||U.S. Government Report||4.3 [[Supply Chain Issues]],<br>4.10 [[Privacy]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| PCAST||2011-06||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-advanced-manufacturing-june2011.pdf Report to the President on Ensuring American Leadership in Advanced Manufacturing]||Government Report||4.2.1 [[Risk Management and Investment]],<br>5.3 [[Government Organizations]]||No | | PCAST||2011-06||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-advanced-manufacturing-june2011.pdf Report to the President on Ensuring American Leadership in Advanced Manufacturing]||U.S. Government Report||4.2.1 [[Risk Management and Investment]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| Pew Research Center’s Internet & American Life Project ||2010-06-11||[http://pewinternet.org/Reports/2010/The-future-of-cloud-computing.aspx The future of cloud computing ]||Independent Report||3.3.3.3 [[Cloud Computing]]||No | | Pew Research Center’s Internet & American Life Project ||2010-06-11||[http://pewinternet.org/Reports/2010/The-future-of-cloud-computing.aspx The future of cloud computing ]||Independent Report||3.3.3.3 [[Cloud Computing]]||No | ||
|- | |- | ||
| Powell, Benjamin ||1909-06-28||[http://cyber.law.harvard.edu/cybersecurity/Is_Cybersecurity_a_Public_Good Is Cybersecurity a Public Good ]|| | | Powell, Benjamin ||1909-06-28||[http://cyber.law.harvard.edu/cybersecurity/Is_Cybersecurity_a_Public_Good Is Cybersecurity a Public Good ]||Journal Article ||4.2 [[Economics of Cybersecurity]],<br>4.2.5 [[Market Failure]],<br>5.1 [[Regulation/Liability]]||Yes | ||
|- | |- | ||
| President's Commission on Critical Infrastructure Protection ||1909-06-20||[http://cyber.law.harvard.edu/cybersecurity/Critical_Foundations Critical Foundations ]||Government Report ||3.3.2 [[Private Critical Infrastructure]],<br>3.3.3 [[Communications]],<br>5.3 [[Government Organizations]]||Yes | | President's Commission on Critical Infrastructure Protection ||1909-06-20||[http://cyber.law.harvard.edu/cybersecurity/Critical_Foundations Critical Foundations ]||U.S. Government Report ||3.3.2 [[Private Critical Infrastructure]],<br>3.3.3 [[Communications]],<br>5.3 [[Government Organizations]]||Yes | ||
|- | |- | ||
| President's Information Technology Advisory Council ||1909-06-28||[http://cyber.law.harvard.edu/cybersecurity/Cyber_Security:_A_Crisis_of_Prioritization Cyber Security: A Crisis of Prioritization ]||Government Report ||4.2.2 [[Incentives]],<br>4.7 [[Public-Private Cooperation]],<br>5.3 [[Government Organizations]]||Yes | | President's Information Technology Advisory Council ||1909-06-28||[http://cyber.law.harvard.edu/cybersecurity/Cyber_Security:_A_Crisis_of_Prioritization Cyber Security: A Crisis of Prioritization ]||U.S. Government Report ||4.2.2 [[Incentives]],<br>4.7 [[Public-Private Cooperation]],<br>5.3 [[Government Organizations]]||Yes | ||
|- | |- | ||
| Project on National Security Reform (PNSR) ||2012-11-10||[http://www.pnsr.org/data/images/pnsr_the_power_of_people_report.pdf The Power of People: Building an Integrated National Security Professional System for the 21st Century ]||Government Report||4.4 [[Usability/Human Factors]],<br>5.3 [[Government Organizations]]||No | | Project on National Security Reform (PNSR) ||2012-11-10||[http://www.pnsr.org/data/images/pnsr_the_power_of_people_report.pdf The Power of People: Building an Integrated National Security Professional System for the 21st Century ]||U.S. Government Report||4.4 [[Usability/Human Factors]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| Quadrennial Defense Review ||2010-07-30||[http://www.usip.org/quadrennial-defense-review-independent-panel-/view-the-report The QDR in Perspective: Meeting AmericaÅfs National Security Needs In the 21st Century (QDR Final Report) ]||Government Report ||3.3.1.2 [[Military Networks (.mil)]],<br>5.3 [[Government Organizations]]||No | | Quadrennial Defense Review ||2010-07-30||[http://www.usip.org/quadrennial-defense-review-independent-panel-/view-the-report The QDR in Perspective: Meeting AmericaÅfs National Security Needs In the 21st Century (QDR Final Report) ]||U.S. Government Report ||3.3.1.2 [[Military Networks (.mil)]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| RAND||2011-12-21||[http://www.rand.org/content/dam/rand/pubs/occasional_papers/2011/RAND_OP342.pdf A Cyberworm that Knows No Boundaries ]||Independent Report||3. [[Threats and Actors]],<br>5.3 [[Government Organizations]],<br>5.7 [[Technology]]||No | | RAND||2011-12-21||[http://www.rand.org/content/dam/rand/pubs/occasional_papers/2011/RAND_OP342.pdf A Cyberworm that Knows No Boundaries ]||Independent Report||3. [[Threats and Actors]],<br>5.3 [[Government Organizations]],<br>5.7 [[Technology]]||No | ||
|- | |- | ||
| Romanosky et al. ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/Do_Data_Breach_Disclosure_Laws_Reduce_Identity_Theft Do Data Breach Disclosure Laws Reduce Identity Theft ]|| | | Romanosky et al. ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/Do_Data_Breach_Disclosure_Laws_Reduce_Identity_Theft Do Data Breach Disclosure Laws Reduce Identity Theft ]||Article ||4.2.2 [[Incentives]],<br>4.6 [[Information Sharing/Disclosure]],<br>5.1 [[Regulation/Liability]]||Yes | ||
|- | |- | ||
| Rotenberg et. al. ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/The_Cyber_War_Threat_Has_Been_Grossly_Exaggerated The Cyber War Threat Has Been Grossly Exaggerated ]||Debate ||3. [[The Threat and Skeptics]],<br>3.2.1 [[States]],<br>4.12 [[Cyberwar]]||Yes | | Rotenberg et. al. ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/The_Cyber_War_Threat_Has_Been_Grossly_Exaggerated The Cyber War Threat Has Been Grossly Exaggerated ]||Debate ||3. [[The Threat and Skeptics]],<br>3.2.1 [[States]],<br>4.12 [[Cyberwar]]||Yes | ||
Line 389: | Line 389: | ||
| Schmitt Michael N ||2004||[http://cyber.law.harvard.edu/cybersecurity/Direct_Participation_in_Hostilities Direct Participation in Hostilities and 21st Century Armed Conflict]||Journal Article||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes | | Schmitt Michael N ||2004||[http://cyber.law.harvard.edu/cybersecurity/Direct_Participation_in_Hostilities Direct Participation in Hostilities and 21st Century Armed Conflict]||Journal Article||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes | ||
|- | |- | ||
| Schmitt, Michael N. ||1909-06-22||[http://cyber.law.harvard.edu/cybersecurity/Computer_Network_Attack_and_the_Use_of_Force_in_International_Law Computer Network Attack and the Use of Force in International Law ]|| | | Schmitt, Michael N. ||1909-06-22||[http://cyber.law.harvard.edu/cybersecurity/Computer_Network_Attack_and_the_Use_of_Force_in_International_Law Computer Network Attack and the Use of Force in International Law ]||Journal Article ||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes | ||
|- | |- | ||
| Schmitt, Michael N., et. al ||1909-06-27||[http://cyber.law.harvard.edu/cybersecurity/Computers_and_War Computers and War ]|| | | Schmitt, Michael N., et. al ||1909-06-27||[http://cyber.law.harvard.edu/cybersecurity/Computers_and_War Computers and War ]||Article ||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes | ||
|- | |- | ||
| Schneier, Bruce ||1909-06-26||[http://cyber.law.harvard.edu/cybersecurity/Beyond_Fear Beyond Fear ]||Book ||3.2 [[Actors and Incentives]],<br>4.5 [[Psychology and Politics]],<br>5.6 [[Deterrence]]||Yes | | Schneier, Bruce ||1909-06-26||[http://cyber.law.harvard.edu/cybersecurity/Beyond_Fear Beyond Fear ]||Book ||3.2 [[Actors and Incentives]],<br>4.5 [[Psychology and Politics]],<br>5.6 [[Deterrence]]||Yes | ||
Line 397: | Line 397: | ||
| Schneier, Bruce ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/Schneier_on_Security Schneier on Security ]||Book ||3.2 [[Actors and Incentives]],<br>4.4 [[Usability/Human Factors]],<br>5.1 [[Regulation/Liability]]||Yes | | Schneier, Bruce ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/Schneier_on_Security Schneier on Security ]||Book ||3.2 [[Actors and Incentives]],<br>4.4 [[Usability/Human Factors]],<br>5.1 [[Regulation/Liability]]||Yes | ||
|- | |- | ||
| Schwartz, Paul ||1909-06-30||[http://cyber.law.harvard.edu/cybersecurity/Notification_of_Data_Security_Breaches Notification of Data Security Breaches ]|| | | Schwartz, Paul ||1909-06-30||[http://cyber.law.harvard.edu/cybersecurity/Notification_of_Data_Security_Breaches Notification of Data Security Breaches ]||Journal Article ||4.2.2 [[Incentives]],<br>4.6 [[Information Sharing/Disclosure]],<br>5.1 [[Regulation/Liability]]||Yes | ||
|- | |- | ||
| Secretary of the Air Force ||2011-07-27||[http://www.e-publishing.af.mil/shared/media/epubs/AFI51-402.pdf Legal Reviews of Weapons and Cyber Capabilities ]||Government Report ||4.12 [[Cyberwar]],<br>5.3 [[Government Organizations]],<br>5.5 [[International Law (including Laws of War)]]||No | | Secretary of the Air Force ||2011-07-27||[http://www.e-publishing.af.mil/shared/media/epubs/AFI51-402.pdf Legal Reviews of Weapons and Cyber Capabilities ]||U.S. Government Report ||4.12 [[Cyberwar]],<br>5.3 [[Government Organizations]],<br>5.5 [[International Law (including Laws of War)]]||No | ||
|- | |- | ||
| Sklerov, Matthew J. ||1909-07-02||[http://cyber.law.harvard.edu/cybersecurity/Solving_the_Dilemma_of_State_Responses_to_Cyberattacks Solving the Dilemma of State Responses to Cyberattacks ]|| | | Sklerov, Matthew J. ||1909-07-02||[http://cyber.law.harvard.edu/cybersecurity/Solving_the_Dilemma_of_State_Responses_to_Cyberattacks Solving the Dilemma of State Responses to Cyberattacks ]||Journal Article ||3.2.1 [[States]],<br>4.8 [[Attribution]],<br>5.5 Internaitonal Law (including Laws of War)||Yes | ||
|- | |- | ||
| Software and Information Industry Association (SAII) ||2011-07-26||[http://www.siia.net/index.php?option=com_docman&task=doc_download&gid=3040&Itemid=318 Guide to Cloud Computing for Policy Makers ]||Government Report ||3.3.3.3 [[Cloud Computing]],<br>5.1 [[Regulation/Liability]],<br>5.7 [[Technology]]||No | | Software and Information Industry Association (SAII) ||2011-07-26||[http://www.siia.net/index.php?option=com_docman&task=doc_download&gid=3040&Itemid=318 Guide to Cloud Computing for Policy Makers ]||U.S. Government Report ||3.3.3.3 [[Cloud Computing]],<br>5.1 [[Regulation/Liability]],<br>5.7 [[Technology]]||No | ||
|- | |- | ||
| Stohl, Michael ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/Cyber_Terrorism Cyber Terrorism ]||Journal Article ||3.2.3 [[Hacktivists]],<br>3.2.4 [[Terrorists]],<br>4.5 [[Psychology and Politics]]||Yes | | Stohl, Michael ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/Cyber_Terrorism Cyber Terrorism ]||Journal Article ||3.2.3 [[Hacktivists]],<br>3.2.4 [[Terrorists]],<br>4.5 [[Psychology and Politics]]||Yes | ||
|- | |- | ||
| Swire, Peter P. ||1909-06-27||[http://cyber.law.harvard.edu/cybersecurity/A_Model_for_When_Disclosure_Helps_Security A Model for When Disclosure Helps Security ]|| | | Swire, Peter P. ||1909-06-27||[http://cyber.law.harvard.edu/cybersecurity/A_Model_for_When_Disclosure_Helps_Security A Model for When Disclosure Helps Security ]||Journal Article ||4.2.2 [[Incentives]],<br>4.6 [[Information Sharing/Disclosure]],<br>5.1 [[Regulation/Liability]]||Yes | ||
|- | |- | ||
| Swire, Peter P. ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/A_Theory_of_Disclosure_for_Security_and_Competitive_Reasons A Theory of Disclosure for Security and Competitive Reasons ]|| | | Swire, Peter P. ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/A_Theory_of_Disclosure_for_Security_and_Competitive_Reasons A Theory of Disclosure for Security and Competitive Reasons ]||Journal Article ||4.2 [[Economics of Cybersecurity]],<br>4.6 [[Information Sharing/Disclosure]],<br>5.1 [[Regulation/Liability]]||Yes | ||
|- | |- | ||
| Symantec||2011-10-24||[http://www.symantec.com/connect/w32_duqu_precursor_next_stuxnet W32.Duqu: The Precursor to the Next Stuxnet ]||Industry Report||3. [[Threats and Actors]],<br>5.7 [[Technology]]||No | | Symantec||2011-10-24||[http://www.symantec.com/connect/w32_duqu_precursor_next_stuxnet W32.Duqu: The Precursor to the Next Stuxnet ]||Industry Report||3. [[Threats and Actors]],<br>5.7 [[Technology]]||No | ||
Line 417: | Line 417: | ||
| Telang, Rahul ||1909-06-30||[http://cyber.law.harvard.edu/cybersecurity/Impact_of_Software_Vulnerability_Announcements_on_the_Market_Value_of_Software_Vendors Impact of Software Vulnerability Announcements on the Market Value of Software Vendors ]||Journal Article ||4.1 [[Metrics]],<br>4.2 [[Economics of Cybersecurity]],<br>4.6 [[Information Sharing/Disclosure]]||Yes | | Telang, Rahul ||1909-06-30||[http://cyber.law.harvard.edu/cybersecurity/Impact_of_Software_Vulnerability_Announcements_on_the_Market_Value_of_Software_Vendors Impact of Software Vulnerability Announcements on the Market Value of Software Vendors ]||Journal Article ||4.1 [[Metrics]],<br>4.2 [[Economics of Cybersecurity]],<br>4.6 [[Information Sharing/Disclosure]]||Yes | ||
|- | |- | ||
| Thom, Maxie ||2006||[http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA460393 Information Warfare Arms Control: Risks and Costs]||Government Report||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5. [[Approaches]]||Yes | | Thom, Maxie ||2006||[http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA460393 Information Warfare Arms Control: Risks and Costs]||U.S. Government Report||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5. [[Approaches]]||Yes | ||
|- | |- | ||
| Thomas, Rob ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/The_Underground_Economy The Underground Economy ]||Journal Article ||3.2.5 Criminals and Criminl Organizations,<br>3.3.2.2 [[Financial Institutions and Networks]],<br>4.11 [[Cybercrime]]||Yes | | Thomas, Rob ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/The_Underground_Economy The Underground Economy ]||Journal Article ||3.2.5 Criminals and Criminl Organizations,<br>3.3.2.2 [[Financial Institutions and Networks]],<br>4.11 [[Cybercrime]]||Yes | ||
Line 423: | Line 423: | ||
| Threat Level Blog (Wired) ||2010-12-27||[http://www.wired.com/threatlevel/2010/12/a-four-day-dive-into-stuxnets-heart/ A Four-Day Dive Into Stuxnet’s Heart ]||Independent Report||3. [[Threats and Actors]],<br>5.7 [[Technology]]||No | | Threat Level Blog (Wired) ||2010-12-27||[http://www.wired.com/threatlevel/2010/12/a-four-day-dive-into-stuxnets-heart/ A Four-Day Dive Into Stuxnet’s Heart ]||Independent Report||3. [[Threats and Actors]],<br>5.7 [[Technology]]||No | ||
|- | |- | ||
| Todd, Graham H. ||1909-07-02||[http://cyber.law.harvard.edu/cybersecurity/Armed_Attack_in_Cyberspace Armed Attack in Cyberspace ]|| | | Todd, Graham H. ||1909-07-02||[http://cyber.law.harvard.edu/cybersecurity/Armed_Attack_in_Cyberspace Armed Attack in Cyberspace ]||Journal Article ||3.2.1 [[States]],<br>4.8 [[Attribution]],<br>5.5 Internaitonal Law (including Laws of War)||Yes | ||
|- | |- | ||
| Trend Micro Incorporated ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/Trend_Micro_Annual_Report Trend Micro Annual Report ]||Industry Report ||4.11 [[Cybercrime]]||Yes | | Trend Micro Incorporated ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/Trend_Micro_Annual_Report Trend Micro Annual Report ]||Industry Report ||4.11 [[Cybercrime]]||Yes | ||
|- | |- | ||
| U.S. Air Force ||2010-07-15||[http://www.e-publishing.af.mil/shared/media/epubs/afdd3-12.pdf Cyberspace Operations: Air Force Doctrine Document 3-12 ]||Government Report ||3.3.1.2 [[Military Networks (.mil)]],<br>4.12 [[Cyberwar]],<br>5.3 [[Government Organizations]]||No | | U.S. Air Force ||2010-07-15||[http://www.e-publishing.af.mil/shared/media/epubs/afdd3-12.pdf Cyberspace Operations: Air Force Doctrine Document 3-12 ]||U.S. Government Report ||3.3.1.2 [[Military Networks (.mil)]],<br>4.12 [[Cyberwar]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| U.S. Army War College ||2011-05-09||[http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?pubid=10670 Cyber Infrastructure Protection ]||Government Report||||No | | U.S. Army War College ||2011-05-09||[http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?pubid=10670 Cyber Infrastructure Protection ]||U.S. Government Report||||No | ||
|- | |- | ||
| U.S. Army War College, Strategy Research Project ||2011-03-24||[http://www.dtic.mil/dtic/tr/fulltext/u2/a552990.pdf China’s Cyber Power and America’s National Security ]||Government Report||3.2.1 [[States]],<br>4.13 [[Espionage]],<br>5.3 [[Government Organizations]]||No | | U.S. Army War College, Strategy Research Project ||2011-03-24||[http://www.dtic.mil/dtic/tr/fulltext/u2/a552990.pdf China’s Cyber Power and America’s National Security ]||U.S. Government Report||3.2.1 [[States]],<br>4.13 [[Espionage]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| U.S. Department of Energy, Infrastructure Security and Energy Restoration ||2007-01-01||[http://www.oe.netl.doe.gov/docs/prepare/21stepsbooklet.pdf 21 Steps to Improve Cyber Security of SCADA Networks ]||Government Report||3.3 [[Security Targets]],<br>5.3 [[Government Organizations]],<br>5.7 [[Technology]]||No | | U.S. Department of Energy, Infrastructure Security and Energy Restoration ||2007-01-01||[http://www.oe.netl.doe.gov/docs/prepare/21stepsbooklet.pdf 21 Steps to Improve Cyber Security of SCADA Networks ]||U.S. Government Report||3.3 [[Security Targets]],<br>5.3 [[Government Organizations]],<br>5.7 [[Technology]]||No | ||
|- | |- | ||
| U.S. Deputy Secretary of Defense, William J. Lynn (Foreign Affairs) ||2010-009||[http://www.foreignaffairs.com/articles/66552/william-j-lynn-iii/defending-a-new-domain Defending a New Domain ]||Government Report ||||No | | U.S. Deputy Secretary of Defense, William J. Lynn (Foreign Affairs) ||2010-009||[http://www.foreignaffairs.com/articles/66552/william-j-lynn-iii/defending-a-new-domain Defending a New Domain ]||U.S. Government Report ||||No | ||
|- | |- | ||
| U.S. House Committee on Appropriations (closed/classified) (Subcommittee on Energy and Power)||2011-03-31||[http://www.dhs.gov/ynews/testimony/testimony_1301595025263.shtm Budget Hearing - National Protection and Programs Directorate, Cybersecurity and Infrastructure Protection Programs ]||U.S. Government Hearing||4.2 [[Economics of Cybersecurity]],<br>5.3 [[Government Organizations]]||No | | U.S. House Committee on Appropriations (closed/classified) (Subcommittee on Energy and Power)||2011-03-31||[http://www.dhs.gov/ynews/testimony/testimony_1301595025263.shtm Budget Hearing - National Protection and Programs Directorate, Cybersecurity and Infrastructure Protection Programs ]||U.S. Government Hearing||4.2 [[Economics of Cybersecurity]],<br>5.3 [[Government Organizations]]||No | ||
Line 517: | Line 517: | ||
| U.S. House Permenant Select Committee on Intelligence||2011-12-01||[https://intelligence.house.gov/markup/mark-hr-xxxx-%E2%80%9Ccyber-intelligence-sharing-and-protection-act-2011%E2%80%9D Markup: Draft Bill: Cyber Intelligence Sharing and Protection Act of 2011]||U.S. Government Hearing||4.6 Information Sharing,<br>5.1 [[Regulation/Liability]]||No | | U.S. House Permenant Select Committee on Intelligence||2011-12-01||[https://intelligence.house.gov/markup/mark-hr-xxxx-%E2%80%9Ccyber-intelligence-sharing-and-protection-act-2011%E2%80%9D Markup: Draft Bill: Cyber Intelligence Sharing and Protection Act of 2011]||U.S. Government Hearing||4.6 Information Sharing,<br>5.1 [[Regulation/Liability]]||No | ||
|- | |- | ||
| U.S. Navy ||2010-06-17||[http://www.doncio.navy.mil/PolicyView.aspx?ID=1804 DON (Department of the Navy) Cybersecurity/Information Assurance Workforce Management, Oversight and Compliance ]||Government Report ||3.3.1.2 [[Military Networks (.mil)]],<br>5.3 [[Government Organizations]]||No | | U.S. Navy ||2010-06-17||[http://www.doncio.navy.mil/PolicyView.aspx?ID=1804 DON (Department of the Navy) Cybersecurity/Information Assurance Workforce Management, Oversight and Compliance ]||U.S. Government Report ||3.3.1.2 [[Military Networks (.mil)]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| U.S. Senate Committee on Armed Services||2012-03-27||[http://armed-services.senate.gov/e_witnesslist.cfm?id=5283 To receive testimony on U.S. Strategic Command and U.S. Cyber Command in review of the Defense Authorization Request for Fiscal Year 2013 and the Future Years Defense Program.]||U.S. Government Hearing||3.2.1 [[States]],<br>4.2 [[Economics of Cybersecurity]],<br>4.12 [[Cyberwar]]||No | | U.S. Senate Committee on Armed Services||2012-03-27||[http://armed-services.senate.gov/e_witnesslist.cfm?id=5283 To receive testimony on U.S. Strategic Command and U.S. Cyber Command in review of the Defense Authorization Request for Fiscal Year 2013 and the Future Years Defense Program.]||U.S. Government Hearing||3.2.1 [[States]],<br>4.2 [[Economics of Cybersecurity]],<br>4.12 [[Cyberwar]]||No | ||
Line 553: | Line 553: | ||
| U.S. Senate Committee on Small Business and Entrepreneurship||2011-07-25||[http://www.sbc.senate.gov/public/index.cfm?p=Hearings&ContentRecord_id=6b4d51de-dd67-434b-869f-a717b315e6c2&ContentType_id=14f995b9-dfa5-407a-9d35-56cc7152a7ed&Group_id=43eb5e02-e987-4077-b9a7-1e5a9cf28964&MonthDisplay=7&YearDisplay=2011 Role of Small Business in Strengthening Cybersecurity Efforts in the United States]||U.S. Government Hearing||4.2.2 [[Incentives]],<br>4.7 [[Public-Private Cooperation]]||No | | U.S. Senate Committee on Small Business and Entrepreneurship||2011-07-25||[http://www.sbc.senate.gov/public/index.cfm?p=Hearings&ContentRecord_id=6b4d51de-dd67-434b-869f-a717b315e6c2&ContentType_id=14f995b9-dfa5-407a-9d35-56cc7152a7ed&Group_id=43eb5e02-e987-4077-b9a7-1e5a9cf28964&MonthDisplay=7&YearDisplay=2011 Role of Small Business in Strengthening Cybersecurity Efforts in the United States]||U.S. Government Hearing||4.2.2 [[Incentives]],<br>4.7 [[Public-Private Cooperation]]||No | ||
|- | |- | ||
| United States Secret Service ||1909-06-27||[http://cyber.law.harvard.edu/cybersecurity/Insider_Threat_Study Insider Threat Study ]||Government Report ||3.3.2.2 [[Financial Institutions and Networks]],<br>4.2.2 [[Incentives]],<br>4.4 Usability/Human Factor||Yes | | United States Secret Service ||1909-06-27||[http://cyber.law.harvard.edu/cybersecurity/Insider_Threat_Study Insider Threat Study ]||U.S. Government Report ||3.3.2.2 [[Financial Institutions and Networks]],<br>4.2.2 [[Incentives]],<br>4.4 Usability/Human Factor||Yes | ||
|- | |- | ||
| University of Southern California (USC) Information Sciences Institute, University of California Berkeley (UCB), McAfee Research ||2011-01-13||[http://www.isi.edu/deter/news/news.php?story=20 Design of the DETER Security Testbed ]||Independent Report||5.3 [[Government Organizations]],<br>5.7 [[Technology]]||No | | University of Southern California (USC) Information Sciences Institute, University of California Berkeley (UCB), McAfee Research ||2011-01-13||[http://www.isi.edu/deter/news/news.php?story=20 Design of the DETER Security Testbed ]||Independent Report||5.3 [[Government Organizations]],<br>5.7 [[Technology]]||No | ||
Line 565: | Line 565: | ||
| Verizon ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/2010_Data_Breach_Investigations_Report 2010 Data Breach Investigations Report ]||Industry Report ||3.3.2.2 [[Financial Institutions and Networks]],<br>4.11 [[Cybercrime]],<br>5.2 [[Private Efforts/Organizations]]||Yes | | Verizon ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/2010_Data_Breach_Investigations_Report 2010 Data Breach Investigations Report ]||Industry Report ||3.3.2.2 [[Financial Institutions and Networks]],<br>4.11 [[Cybercrime]],<br>5.2 [[Private Efforts/Organizations]]||Yes | ||
|- | |- | ||
| Watts, Sean ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Combatant Status and Computer Network Attack ]|| | | Watts, Sean ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Combatant Status and Computer Network Attack ]||Journal Article ||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes | ||
|- | |- | ||
| White House||2009||[http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure]||Government Report||1. [[Overview]],<br>4.7 [[Public-Private Cooperation]]||No | | White House||2009||[http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure]||U.S. Government Report||1. [[Overview]],<br>4.7 [[Public-Private Cooperation]]||No | ||
|- | |- | ||
| White House||2011-04||[http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy]||Government Report||4.7 [[Public-Private Cooperation]],<br>4.9 [[Identity Management]]||No | | White House||2011-04||[http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy]||U.S. Government Report||4.7 [[Public-Private Cooperation]],<br>4.9 [[Identity Management]]||No | ||
|- | |- | ||
| White House||2011-05||[http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World]||Government Report||1. [[Overview]]||No | | White House||2011-05||[http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World]||U.S. Government Report||1. [[Overview]]||No | ||
|- | |- | ||
| White House||2012-01||[http://www.whitehouse.gov/sites/default/files/national_strategy_for_global_supply_chain_security.pdf National Strategy for Global Supply Chain Security]||Government Report||4.3 [[Supply Chain Issues]]||No | | White House||2012-01||[http://www.whitehouse.gov/sites/default/files/national_strategy_for_global_supply_chain_security.pdf National Strategy for Global Supply Chain Security]||U.S. Government Report||4.3 [[Supply Chain Issues]]||No | ||
|- | |- | ||
| White House||2012-02||[http://www.whitehouse.gov/sites/default/files/privacy-final.pdf Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy]||Government Report||4.10 [[Privacy]],<br>5.1 [[Regulation/Liability]]||No | | White House||2012-02||[http://www.whitehouse.gov/sites/default/files/privacy-final.pdf Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy]||U.S. Government Report||4.10 [[Privacy]],<br>5.1 [[Regulation/Liability]]||No | ||
|- | |- | ||
| White House ||1909-06-26||[http://cyber.law.harvard.edu/cybersecurity/The_National_Strategy_to_Secure_Cyberspace The National Strategy to Secure Cyberspace ]||Government Report ||4.7 [[Public-Private Cooperation]],<br>5.3 [[Government Organizations]],<br>5.4 [[International Cooperation]]s||Yes | | White House ||1909-06-26||[http://cyber.law.harvard.edu/cybersecurity/The_National_Strategy_to_Secure_Cyberspace The National Strategy to Secure Cyberspace ]||U.S. Government Report ||4.7 [[Public-Private Cooperation]],<br>5.3 [[Government Organizations]],<br>5.4 [[International Cooperation]]s||Yes | ||
|- | |- | ||
| White House ||1909-07-02||[http://cyber.law.harvard.edu/cybersecurity/Cyberspace_Policy_Review Cyberspace Policy Review ]||Government Report ||4.7 [[Public-Private Cooperation]],<br>5.2 [[Private Efforts/Organizations]],<br>5.3 [[Government Organizations]]||Yes | | White House ||1909-07-02||[http://cyber.law.harvard.edu/cybersecurity/Cyberspace_Policy_Review Cyberspace Policy Review ]||U.S. Government Report ||4.7 [[Public-Private Cooperation]],<br>5.2 [[Private Efforts/Organizations]],<br>5.3 [[Government Organizations]]||Yes | ||
|- | |- | ||
| White House ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/The_Comprehensive_National_Cybersecurity_Initiative The Comprehensive National Cybersecurity Initiative ]||Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>3.3.2 [[Private Critical Infrastructure]],<br>5.3 [[Government Organizations]]||Yes | | White House ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/The_Comprehensive_National_Cybersecurity_Initiative The Comprehensive National Cybersecurity Initiative ]||U.S. Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>3.3.2 [[Private Critical Infrastructure]],<br>5.3 [[Government Organizations]]||Yes | ||
|- | |- | ||
| White House ||2010-12-16||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-nitrd-report-2010.pdf Designing A Digital Future: Federally Funded Research And Development In Networking And Information Technology ]||Government Report||3.3.1 [[Public Critical Infrastructure]],<br>4. [[Issues]],<br>5. [[Approaches]]||No | | White House ||2010-12-16||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-nitrd-report-2010.pdf Designing A Digital Future: Federally Funded Research And Development In Networking And Information Technology ]||U.S. Government Report||3.3.1 [[Public Critical Infrastructure]],<br>4. [[Issues]],<br>5. [[Approaches]]||No | ||
|- | |- | ||
| White House ||2011-02-13||[http://www.cio.gov/documents/Federal-Cloud-Computing-Strategy.pdf Federal Cloud Computing Strategy ]||Government Report ||3.3.3.3 [[Cloud Computing]],<br>5.3 [[Government Organizations]],<br>5.7 [[Technology]]||No | | White House ||2011-02-13||[http://www.cio.gov/documents/Federal-Cloud-Computing-Strategy.pdf Federal Cloud Computing Strategy ]||U.S. Government Report ||3.3.3.3 [[Cloud Computing]],<br>5.3 [[Government Organizations]],<br>5.7 [[Technology]]||No | ||
|- | |- | ||
| White House ||2011-04-15||[http://www.whitehouse.gov/the-press-office/2011/04/15/administration-releases-strategy-protect-online-consumers-and-support-in Administration Releases Strategy to Protect Online Consumers and Support Innovation and Fact Sheet on National Strategy for Trusted Identities in Cyberspace ]||Government Report ||4.7 [[Public-Private Cooperation]],<br>4.9 [[Identity Management]],<br>5.3 [[Government Organizations]]||No | | White House ||2011-04-15||[http://www.whitehouse.gov/the-press-office/2011/04/15/administration-releases-strategy-protect-online-consumers-and-support-in Administration Releases Strategy to Protect Online Consumers and Support Innovation and Fact Sheet on National Strategy for Trusted Identities in Cyberspace ]||U.S. Government Report ||4.7 [[Public-Private Cooperation]],<br>4.9 [[Identity Management]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| White House ||2011-04-15||[http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf National Strategy for Trusted Identities in Cyberspace ]||Government Report ||4.7 [[Public-Private Cooperation]],<br>4.9 [[Identity Management]],<br>5.3 [[Government Organizations]]||No | | White House ||2011-04-15||[http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf National Strategy for Trusted Identities in Cyberspace ]||U.S. Government Report ||4.7 [[Public-Private Cooperation]],<br>4.9 [[Identity Management]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| White House (Office of Science & Technology Policy) ||2010-12-06||[http://www.whitehouse.gov/blog/2010/12/06/partnership-cybersecurity-innovation Partnership for Cybersecurity Innovation ]||Government Report||3.3.2.2 [[Financial Institutions and Networks]],<br>4.7 [[Public-Private Cooperation]],<br>5.3 [[Government Organizations]]||No | | White House (Office of Science & Technology Policy) ||2010-12-06||[http://www.whitehouse.gov/blog/2010/12/06/partnership-cybersecurity-innovation Partnership for Cybersecurity Innovation ]||U.S. Government Report||3.3.2.2 [[Financial Institutions and Networks]],<br>4.7 [[Public-Private Cooperation]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| White House/Office of Management and Budget (OMB) ||2011-12-08||[http://www.cio.gov/fedrampmemo.pdf Security Authorization of Information Systems in Cloud Computing Environments (FedRAMP) ]||Government Report ||3.3.3.3 [[Cloud Computing]],<br>5.3 [[Government Organizations]]||No | | White House/Office of Management and Budget (OMB) ||2011-12-08||[http://www.cio.gov/fedrampmemo.pdf Security Authorization of Information Systems in Cloud Computing Environments (FedRAMP) ]||U.S. Government Report ||3.3.3.3 [[Cloud Computing]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| White House/OMB||2009-05-29||[http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf Cyberspace Policy Review: Assuring a Trusted and Resilient Communications Infrastructure ]||Government Report ||4. [[Issues]],<br>5. [[Approaches]]||No | | White House/OMB||2009-05-29||[http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf Cyberspace Policy Review: Assuring a Trusted and Resilient Communications Infrastructure ]||U.S. Government Report ||4. [[Issues]],<br>5. [[Approaches]]||No | ||
|- | |- | ||
| White House/OMB||2010-03-02||[http://www.whitehouse.gov/cybersecurity/comprehensive-national-cybersecurity-initiative Comprehensive National Cybersecurity Initiative (CNCI) ]||Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]],<br>5.7 [[Technology]]||No | | White House/OMB||2010-03-02||[http://www.whitehouse.gov/cybersecurity/comprehensive-national-cybersecurity-initiative Comprehensive National Cybersecurity Initiative (CNCI) ]||U.S. Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]],<br>5.7 [[Technology]]||No | ||
|- | |- | ||
| White House/OMB||2010-06-25||[http://www.dhs.gov/xlibrary/assets/ns_tic.pdf The National Strategy for Trusted Identities in Cyberspace: Creating Options for Enhanced Online Security and Privacy ]||Government Report ||4.7 [[Public-Private Cooperation]],<br>4.9 [[Identity Management]],<br>5.3 [[Government Organizations]]||No | | White House/OMB||2010-06-25||[http://www.dhs.gov/xlibrary/assets/ns_tic.pdf The National Strategy for Trusted Identities in Cyberspace: Creating Options for Enhanced Online Security and Privacy ]||U.S. Government Report ||4.7 [[Public-Private Cooperation]],<br>4.9 [[Identity Management]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| White House/OMB||2010-07-06||[http://www.whitehouse.gov/sites/default/files/omb/assets/memoranda_2010/m10-28.pdf Clarifying Cybersecurity Responsibilities ]||Government Report ||5.3 [[Government Organizations]]||No | | White House/OMB||2010-07-06||[http://www.whitehouse.gov/sites/default/files/omb/assets/memoranda_2010/m10-28.pdf Clarifying Cybersecurity Responsibilities ]||U.S. Government Report ||5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| White House/OMB||2010-12-09||[http://www.cio.gov/documents/25-Point-Implementation-Plan-to-Reform-Federal%20IT.pdf 25 Point Implementation Plan to Reform Federal Information Technology Management ]||Government Report ||4.2 [[Economics of Cybersecurity]],<br>5.3 [[Government Organizations]],<br>5.7 [[Technology]]||No | | White House/OMB||2010-12-09||[http://www.cio.gov/documents/25-Point-Implementation-Plan-to-Reform-Federal%20IT.pdf 25 Point Implementation Plan to Reform Federal Information Technology Management ]||U.S. Government Report ||4.2 [[Economics of Cybersecurity]],<br>5.3 [[Government Organizations]],<br>5.7 [[Technology]]||No | ||
|- | |- | ||
| White House/OMB||2011-02-13||[http://www.cio.gov/documents/Federal-Cloud-Computing-Strategy.pdf Federal Cloud Computing Strategy ]||Government Report ||3.3.3.3 [[Cloud Computing]],<br>5.3 [[Government Organizations]],<br>5.7 [[Technology]]||No | | White House/OMB||2011-02-13||[http://www.cio.gov/documents/Federal-Cloud-Computing-Strategy.pdf Federal Cloud Computing Strategy ]||U.S. Government Report ||3.3.3.3 [[Cloud Computing]],<br>5.3 [[Government Organizations]],<br>5.7 [[Technology]]||No | ||
|- | |- | ||
| White House/OMB||2011-05-12||[http://www.whitehouse.gov/the-press-office/2011/05/12/fact-sheet-cybersecurity-legislative-proposal Cybersecurity Legislative Proposal (Fact Sheet) ]||Government Report ||4. [[Issues]],<br>5.3 [[Government Organizations]]||No | | White House/OMB||2011-05-12||[http://www.whitehouse.gov/the-press-office/2011/05/12/fact-sheet-cybersecurity-legislative-proposal Cybersecurity Legislative Proposal (Fact Sheet) ]||U.S. Government Report ||4. [[Issues]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| White House/OMB||2011-05-16||[http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf International Strategy for Cyberspace ]||Government Report ||4.6 [[Information Sharing/Disclosure]],<br>5.3 [[Government Organizations]],<br>5.4 [[International Cooperation]]||No | | White House/OMB||2011-05-16||[http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf International Strategy for Cyberspace ]||U.S. Government Report ||4.6 [[Information Sharing/Disclosure]],<br>5.3 [[Government Organizations]],<br>5.4 [[International Cooperation]]||No | ||
|- | |- | ||
| White House/OMB||2011-09-14||[http://www.whitehouse.gov/sites/default/files/omb/memoranda/2011/m11-33.pdf FY 2012 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Managementa ]||Government Report ||4.6 [[Information Sharing/Disclosure]],<br>5.3 [[Government Organizations]]||No | | White House/OMB||2011-09-14||[http://www.whitehouse.gov/sites/default/files/omb/memoranda/2011/m11-33.pdf FY 2012 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Managementa ]||U.S. Government Report ||4.6 [[Information Sharing/Disclosure]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| White House/OMB||2011-10-07||[http://www.whitehouse.gov/the-press-office/2011/10/07/executive-order-structural-reforms-improve-security-classified-networks- Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information ]||Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>4.6 [[Information Sharing/Disclosure]],<br>5.3 [[Government Organizations]]||No | | White House/OMB||2011-10-07||[http://www.whitehouse.gov/the-press-office/2011/10/07/executive-order-structural-reforms-improve-security-classified-networks- Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information ]||U.S. Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>4.6 [[Information Sharing/Disclosure]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| White House/OMB||2011-12-06||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/fed_cybersecurity_rd_strategic_plan_2011.pdf Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program ]||Government Report ||5.3 [[Government Organizations]],<br>5.7 [[Technology]]||No | | White House/OMB||2011-12-06||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/fed_cybersecurity_rd_strategic_plan_2011.pdf Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program ]||U.S. Government Report ||5.3 [[Government Organizations]],<br>5.7 [[Technology]]||No | ||
|- | |- | ||
| Wilson, Clay<br />CRS||2007-03-20||[http://www.fas.org/sgp/crs/natsec/RL31787.pdf Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues]||Government Report||3.3 [[Security Targets]],<br>4.12 [[Cyberwar]]||No | | Wilson, Clay<br />CRS||2007-03-20||[http://www.fas.org/sgp/crs/natsec/RL31787.pdf Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues]||U.S. Government Report||3.3 [[Security Targets]],<br>4.12 [[Cyberwar]]||No | ||
|- | |- | ||
| Zittrain, Jonathan L. ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/The_Future_of_the_Internet_and_How_To_Stop_It The Future of the Internet and How To Stop It ]||Book ||4.4 [[Usability/Human Factors]],<br>5.1 [[Regulation/Liability]]||Yes | | Zittrain, Jonathan L. ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/The_Future_of_the_Internet_and_How_To_Stop_It The Future of the Internet and How To Stop It ]||Book ||4.4 [[Usability/Human Factors]],<br>5.1 [[Regulation/Liability]]||Yes | ||
|} | |} | ||
<includeonly>[[Template:Filtered Table|Filtered Table Template]]</includeonly> | <includeonly>[[Template:Filtered Table|Filtered Table Template]]</includeonly> |
Revision as of 15:13, 31 July 2012
Filtering for type: All Types