Template:Filtered Table: Difference between revisions
Jump to navigation
Jump to search
Help
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
{| class="dt_types" | |||
|- | |||
|Government Report | |||
|- | |||
|U.S. Government Report | |||
|- | |||
|U.S. Government Hearing | |||
|- | |||
|Non-U.S. Government Report | |||
|- | |||
|Independent Report | |||
|- | |||
|Industry Report | |||
|- | |||
|Book | |||
|- | |||
|Journal Article | |||
|- | |||
|Article | |||
|} | |||
{| class="wikitable | {| class="dt_categories" | ||
|- | |||
|1. Overview | |||
|- | |||
|3. Threats and Actors | |||
|- | |||
|3.1 The Threat and Skeptics | |||
|- | |||
|3.2 Actors and Incentives | |||
|- | |||
|3.2.1 States | |||
|- | |||
|3.2.2 Groups | |||
|- | |||
|3.2.3 Hacktivists | |||
|- | |||
|3.2.4 Terrorists | |||
|- | |||
|3.2.5 Criminals and Criminal Organizations | |||
|- | |||
|3.3 Security Targets | |||
|- | |||
|3.3.1 Public Critical Infrastructure | |||
|- | |||
|3.3.1.1 Government Networks (.gov) | |||
|- | |||
|3.3.1.2 Military Networks (.mil) | |||
|- | |||
|3.3.2 Private Critical Infrastructure | |||
|- | |||
|3.3.2.1 Electricity, Oil and Natural Gas | |||
|- | |||
|3.3.2.2 Financial Institutions and Networks | |||
|- | |||
|3.3.2.3 Transportation | |||
|- | |||
|3.3.2.4 Water, Sewer, etc. | |||
|- | |||
|3.3.3 Communications | |||
|- | |||
|3.3.3.1 Telephone | |||
|- | |||
|3.3.3.2 Public Data Networks | |||
|- | |||
|3.3.3.3 Cloud Computing | |||
|- | |||
|4. Issues | |||
|- | |||
|4.1 Metrics | |||
|- | |||
|4.2 Economics of Cybersecurity | |||
|- | |||
|4.2.1 Risk Management and Investment | |||
|- | |||
|4.2.2 Incentives | |||
|- | |||
|4.2.3 Insurance | |||
|- | |||
|4.2.4 Behavioral Economics | |||
|- | |||
|4.2.5 Market Failure | |||
|- | |||
|4.3 Supply Chain Issues | |||
|- | |||
|4.4 Usability/Human Factors | |||
|- | |||
|4.5 Psychology and Politics | |||
|- | |||
|4.6 Information Sharing/Disclosure | |||
|- | |||
|4.7 Public-Private Cooperation | |||
|- | |||
|4.8 Attribution | |||
|- | |||
|4.9 Identity Management | |||
|- | |||
|4.10 Privacy | |||
|- | |||
|4.11 Cybercrime | |||
|- | |||
|4.12 Cyberwar | |||
|- | |||
|4.13 Espionage | |||
|- | |||
|4.13.1 Government to Government | |||
|- | |||
|4.13.2 Industrial | |||
|- | |||
|4.13.3 Media Perceptions | |||
|- | |||
|5. Approaches | |||
|- | |||
|5.1 Regulation/Liability | |||
|- | |||
|5.2 Private Efforts/Organizations | |||
|- | |||
|5.3 Government Organizations | |||
|- | |||
|5.4 International Cooperation | |||
|- | |||
|5.5 International Law (including Laws of War) | |||
|- | |||
|5.6 Deterrence | |||
|- | |||
|5.7 Technology | |||
|} | |||
{| class="wikitable datatable" data-type-filter="{{{1}}}" data-category-filter="{{{2}}}" data-search-filter="{{{3}}}" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | |||
|- | |- | ||
! align="center" style="background-color:#f0f0f0;"|'''Author/Agency''' | ! align="center" style="background-color:#f0f0f0;"|'''Author/Agency''' |
Revision as of 16:18, 31 July 2012
Types
Government Report
U.S. Government Report
U.S. Government Hearing
Non-U.S. Government Report
Independent Report
Industry Report
Book
Journal Article
Article
Categories
Exclude Subcatgeories
Search