Template:Filtered Table: Difference between revisions
Jump to navigation
Jump to search
Help
No edit summary |
No edit summary |
||
Line 179: | Line 179: | ||
| Centre for Secure Information Technologies||2012-09-11||[http://www.csit.qub.ac.uk/media/pdf/Filetoupload,252359,en.pdf World Cybersecurity Technology Research Summit (Belfast 2011) ]||Independent Report||||No | | Centre for Secure Information Technologies||2012-09-11||[http://www.csit.qub.ac.uk/media/pdf/Filetoupload,252359,en.pdf World Cybersecurity Technology Research Summit (Belfast 2011) ]||Independent Report||||No | ||
|- | |- | ||
| Clarke, Richard A. ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/Cyber_War Cyber War ]||Book ||3. [[The Threat and Skeptics]],<br>3.2.1 [[States]],<br>4.12 [[Cyberwar]]||Yes | | Clarke, Richard A. ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/Cyber_War Cyber War ]||Book ||3.1 [[The Threat and Skeptics]],<br>3.2.1 [[States]],<br>4.12 [[Cyberwar]]||Yes | ||
|- | |- | ||
| Clinton, Larry ||Undated ||[http://cyber.law.harvard.edu/cybersecurity/Cyber-Insurance_Metrics_and_Impact_on_Cyber-Security Cyber-Insurance Metrics and Impact on Cyber-Security ]||Online Paper ||4.2.3 [[Insurance]],<br>5.2 [[Private Efforts/Organizations]]||Yes | | Clinton, Larry ||Undated ||[http://cyber.law.harvard.edu/cybersecurity/Cyber-Insurance_Metrics_and_Impact_on_Cyber-Security Cyber-Insurance Metrics and Impact on Cyber-Security ]||Online Paper ||4.2.3 [[Insurance]],<br>5.2 [[Private Efforts/Organizations]]||Yes | ||
Line 379: | Line 379: | ||
| International Telecommunications Union ||2012-02-10||[http://www.itu.int/ITU-D/cyb/cybersecurity/docs/itu-toolkit-cybercrime-legislation.pdf ITU Toolkit for Cybercrime Legislation ]||ndependent Report||||No | | International Telecommunications Union ||2012-02-10||[http://www.itu.int/ITU-D/cyb/cybersecurity/docs/itu-toolkit-cybercrime-legislation.pdf ITU Toolkit for Cybercrime Legislation ]||ndependent Report||||No | ||
|- | |- | ||
| James Clapper, Director of National Intelligence ||2011-02-10||[http://www.dni.gov/testimonies/20110210_testimony_clapper.pdf Worldwide Threat Assessment of the U.S. Intelligence Community (Testimony) ]||U.S. Government Report||3. [[The Threat and Skeptics]],<br>3.2 [[Actors and Incentives]]||No | | James Clapper, Director of National Intelligence ||2011-02-10||[http://www.dni.gov/testimonies/20110210_testimony_clapper.pdf Worldwide Threat Assessment of the U.S. Intelligence Community (Testimony) ]||U.S. Government Report||3.1 [[The Threat and Skeptics]],<br>3.2 [[Actors and Incentives]]||No | ||
|- | |- | ||
| Johnson, Eric M. ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/Managing_Information_Risk_and_the_Economics_of_Security Managing Information Risk and the Economics of Security ]||Book ||4.2 [[Economics of Cybersecurity]],<br>4.2.1 [[Risk Management and Investment]],<br>5.1 [[Regulation/Liability]]||Yes | | Johnson, Eric M. ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/Managing_Information_Risk_and_the_Economics_of_Security Managing Information Risk and the Economics of Security ]||Book ||4.2 [[Economics of Cybersecurity]],<br>4.2.1 [[Risk Management and Investment]],<br>5.1 [[Regulation/Liability]]||Yes | ||
Line 507: | Line 507: | ||
| Romanosky et al. ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/Do_Data_Breach_Disclosure_Laws_Reduce_Identity_Theft Do Data Breach Disclosure Laws Reduce Identity Theft ]||Article ||4.2.2 [[Incentives]],<br>4.6 [[Information Sharing/Disclosure]],<br>5.1 [[Regulation/Liability]]||Yes | | Romanosky et al. ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/Do_Data_Breach_Disclosure_Laws_Reduce_Identity_Theft Do Data Breach Disclosure Laws Reduce Identity Theft ]||Article ||4.2.2 [[Incentives]],<br>4.6 [[Information Sharing/Disclosure]],<br>5.1 [[Regulation/Liability]]||Yes | ||
|- | |- | ||
| Rotenberg et. al. ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/The_Cyber_War_Threat_Has_Been_Grossly_Exaggerated The Cyber War Threat Has Been Grossly Exaggerated ]||Debate ||3. [[The Threat and Skeptics]],<br>3.2.1 [[States]],<br>4.12 [[Cyberwar]]||Yes | | Rotenberg et. al. ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/The_Cyber_War_Threat_Has_Been_Grossly_Exaggerated The Cyber War Threat Has Been Grossly Exaggerated ]||Debate ||3.1 [[The Threat and Skeptics]],<br>3.2.1 [[States]],<br>4.12 [[Cyberwar]]||Yes | ||
|- | |- | ||
| Schmitt Michael N ||2002||[http://www.icrc.org/eng/assets/files/other/365_400_schmitt.pdf Wired warfare: Computer network attack and jus in bello]||Journal Article||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes | | Schmitt Michael N ||2002||[http://www.icrc.org/eng/assets/files/other/365_400_schmitt.pdf Wired warfare: Computer network attack and jus in bello]||Journal Article||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes | ||
Line 563: | Line 563: | ||
| U.S. House Committee on Appropriations (closed/classified) (Subcommittee on Energy and Power)||2011-03-31||[http://www.dhs.gov/ynews/testimony/testimony_1301595025263.shtm Budget Hearing - National Protection and Programs Directorate, Cybersecurity and Infrastructure Protection Programs ]||U.S. Government Hearing||4.2 [[Economics of Cybersecurity]],<br>5.3 [[Government Organizations]]||No | | U.S. House Committee on Appropriations (closed/classified) (Subcommittee on Energy and Power)||2011-03-31||[http://www.dhs.gov/ynews/testimony/testimony_1301595025263.shtm Budget Hearing - National Protection and Programs Directorate, Cybersecurity and Infrastructure Protection Programs ]||U.S. Government Hearing||4.2 [[Economics of Cybersecurity]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities)||2011-02-11||[http://armedservices.house.gov/index.cfm/hearings-display?ContentRecord_id=90d8a16a-23b7-4b9c-a732-cb10ab20e579&ContentType_id=14f995b9-dfa5-407a-9d35-56cc7152a7ed&Group_id=64562e79-731a-4ac6-aab0-7bd8d1b7e890&MonthDisplay=2&YearDisplay=2011 What Should the Department of Defense’s Role in Cyber Be?]||U.S. Government Hearing||3. [[The Threat and Skeptics]],<br>4.12 [[Cyberwar]],<br>5.3 [[Government Organizations]]||No | | U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities)||2011-02-11||[http://armedservices.house.gov/index.cfm/hearings-display?ContentRecord_id=90d8a16a-23b7-4b9c-a732-cb10ab20e579&ContentType_id=14f995b9-dfa5-407a-9d35-56cc7152a7ed&Group_id=64562e79-731a-4ac6-aab0-7bd8d1b7e890&MonthDisplay=2&YearDisplay=2011 What Should the Department of Defense’s Role in Cyber Be?]||U.S. Government Hearing||3.1 [[The Threat and Skeptics]],<br>4.12 [[Cyberwar]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities)||2011-03-16||[http://armedservices.house.gov/index.cfm/hearings-display?ContentRecord_id=79ce7b4c-f88b-40bf-9540-efdb3a2d26b2&ContentType_id=14f995b9-dfa5-407a-9d35-56cc7152a7ed&Group_id=64562e79-731a-4ac6-aab0-7bd8d1b7e890&MonthDisplay=3&YearDisplay=2011 2012 Budget Request from U.S. Cyber Command]||U.S. Government Hearing||3.3.1.2 [[Military Networks (.mil)]],<br>4.2 [[Economics of Cybersecurity]]||No | | U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities)||2011-03-16||[http://armedservices.house.gov/index.cfm/hearings-display?ContentRecord_id=79ce7b4c-f88b-40bf-9540-efdb3a2d26b2&ContentType_id=14f995b9-dfa5-407a-9d35-56cc7152a7ed&Group_id=64562e79-731a-4ac6-aab0-7bd8d1b7e890&MonthDisplay=3&YearDisplay=2011 2012 Budget Request from U.S. Cyber Command]||U.S. Government Hearing||3.3.1.2 [[Military Networks (.mil)]],<br>4.2 [[Economics of Cybersecurity]]||No | ||
Line 599: | Line 599: | ||
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-02-11||[http://homeland.house.gov/hearing/subcommittee-hearing-%E2%80%9Cpreventing-chemical-terrorism-building-foundation-security-our-nation Preventing Chemical Terrorism: Building a Foundation of Security at Our Nation’s Chemical Facilities]||U.S. Government Hearing||3.3.2 [[Private Critical Infrastructure]],<br>5.1 [[Regulation/Liability]],<br>5.7 [[Technology]]||No | | U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-02-11||[http://homeland.house.gov/hearing/subcommittee-hearing-%E2%80%9Cpreventing-chemical-terrorism-building-foundation-security-our-nation Preventing Chemical Terrorism: Building a Foundation of Security at Our Nation’s Chemical Facilities]||U.S. Government Hearing||3.3.2 [[Private Critical Infrastructure]],<br>5.1 [[Regulation/Liability]],<br>5.7 [[Technology]]||No | ||
|- | |- | ||
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-03-16||[http://homeland.house.gov/hearing/subcommittee-hearing-examining-cyber-threat-critical-infrastructure-and-american-economy Examining the Cyber Threat to Critical Infrastructure and the American Economy]||U.S. Government Hearing||3. [[The Threat and Skeptics]],<br>3.3 [[Security Targets]],<br>4.2 [[Economics of Cybersecurity]]||No | | U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-03-16||[http://homeland.house.gov/hearing/subcommittee-hearing-examining-cyber-threat-critical-infrastructure-and-american-economy Examining the Cyber Threat to Critical Infrastructure and the American Economy]||U.S. Government Hearing||3.1 [[The Threat and Skeptics]],<br>3.3 [[Security Targets]],<br>4.2 [[Economics of Cybersecurity]]||No | ||
|- | |- | ||
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-04-15||[http://homeland.house.gov/hearing/subcommittee-hearing-%E2%80%9C-dhs-cybersecurity-mission-promoting-innovation-and-securing-critical DHS Cybersecurity Mission: Promoting Innovation and Securing Critical Infrastructure]||U.S. Government Hearing||3.3.2 [[Private Critical Infrastructure]],<br>4.7 [[Public-Private Cooperation]],<br>5.1 [[Regulation/Liability]]||No | | U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-04-15||[http://homeland.house.gov/hearing/subcommittee-hearing-%E2%80%9C-dhs-cybersecurity-mission-promoting-innovation-and-securing-critical DHS Cybersecurity Mission: Promoting Innovation and Securing Critical Infrastructure]||U.S. Government Hearing||3.3.2 [[Private Critical Infrastructure]],<br>4.7 [[Public-Private Cooperation]],<br>5.1 [[Regulation/Liability]]||No | ||
Line 605: | Line 605: | ||
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-06-24||[http://homeland.house.gov/hearing/subcommittee-hearing-examining-homeland-security-impact-obamaadministrations-cybersecurity Examining the Homeland Security Impact of the Obama Administration’s Cybersecurity Proposal]||U.S. Government Hearing||3.3.1.1 [[Government Networks (.gov)]],<br>4.9 [[Identity Management]],<br>5.3 [[Government Organizations]]||No | | U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-06-24||[http://homeland.house.gov/hearing/subcommittee-hearing-examining-homeland-security-impact-obamaadministrations-cybersecurity Examining the Homeland Security Impact of the Obama Administration’s Cybersecurity Proposal]||U.S. Government Hearing||3.3.1.1 [[Government Networks (.gov)]],<br>4.9 [[Identity Management]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-12-06||[http://homeland.house.gov/hearing/subcommittee-hearing-hearing-draft-legislative-proposal-cybersecurity Hearing on Draft Legislative Proposal on Cybersecurity]||U.S. Government Hearing||3. [[The Threat and Skeptics]],<br>4.7 [[Public-Private Cooperation]],<br>5.1 [[Regulation/Liability]]||No | | U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-12-06||[http://homeland.house.gov/hearing/subcommittee-hearing-hearing-draft-legislative-proposal-cybersecurity Hearing on Draft Legislative Proposal on Cybersecurity]||U.S. Government Hearing||3.1 [[The Threat and Skeptics]],<br>4.7 [[Public-Private Cooperation]],<br>5.1 [[Regulation/Liability]]||No | ||
|- | |- | ||
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2012-02-01||[http://homeland.house.gov/markup/subcommittee-markup-hr-3674 Consideration and Markup of H.R. 3674]||U.S. Government Hearing||4.6 Information Sharing,<br>4.7 [[Public-Private Cooperation]],<br>5.1 [[Regulation/Liability]]||No | | U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2012-02-01||[http://homeland.house.gov/markup/subcommittee-markup-hr-3674 Consideration and Markup of H.R. 3674]||U.S. Government Hearing||4.6 Information Sharing,<br>4.7 [[Public-Private Cooperation]],<br>5.1 [[Regulation/Liability]]||No | ||
Line 613: | Line 613: | ||
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies)||2011-05-26||[http://homeland.house.gov/hearing/subcommittee-hearing-%E2%80%9Cunlocking-safety-act%E2%80%99s-potential-promote-technology-and-combat Unlocking the SAFETY Act’s [Support Anti-terrorism by Fostering Effective Technologies - P.L. 107-296] Potential to Promote Technology and Combat Terrorism]||U.S. Government Hearing||4.11 [[Cybercrime]],<br>5.1 [[Regulation/Liability]],<br>5.7 [[Technology]]||No | | U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies)||2011-05-26||[http://homeland.house.gov/hearing/subcommittee-hearing-%E2%80%9Cunlocking-safety-act%E2%80%99s-potential-promote-technology-and-combat Unlocking the SAFETY Act’s [Support Anti-terrorism by Fostering Effective Technologies - P.L. 107-296] Potential to Promote Technology and Combat Terrorism]||U.S. Government Hearing||4.11 [[Cybercrime]],<br>5.1 [[Regulation/Liability]],<br>5.7 [[Technology]]||No | ||
|- | |- | ||
| U.S. House Committee on Homeland Security (Subcommittee on Oversight, Investigations and Management)||2012-04-24||[http://homeland.house.gov/hearing/subcommittee-hearing-america-under-cyber-attack-why-urgent-action-needed America is Under Cyber Attack: Why Urgent Action is Needed]||U.S. Government Hearing||3. [[The Threat and Skeptics]],<br>3.2 [[Actors and Incentives]]||No | | U.S. House Committee on Homeland Security (Subcommittee on Oversight, Investigations and Management)||2012-04-24||[http://homeland.house.gov/hearing/subcommittee-hearing-america-under-cyber-attack-why-urgent-action-needed America is Under Cyber Attack: Why Urgent Action is Needed]||U.S. Government Hearing||3.1 [[The Threat and Skeptics]],<br>3.2 [[Actors and Incentives]]||No | ||
|- | |- | ||
| U.S. House Committee on Oversight and Government Reform||2011-07-07||[http://oversight.house.gov/hearing/cybersecurity-assessing-the-nations-ability-to-address-the-growing-cyber-threat/ Cybersecurity: Assessing the Nation’s Ability to Address the Growing Cyber Threat]||U.S. Government Hearing||3.3 [[Security Targets]],<br>4.7 [[Public-Private Cooperation]],<br>5.3 [[Government Organizations]]||No | | U.S. House Committee on Oversight and Government Reform||2011-07-07||[http://oversight.house.gov/hearing/cybersecurity-assessing-the-nations-ability-to-address-the-growing-cyber-threat/ Cybersecurity: Assessing the Nation’s Ability to Address the Growing Cyber Threat]||U.S. Government Hearing||3.3 [[Security Targets]],<br>4.7 [[Public-Private Cooperation]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| U.S. House Committee on Oversight and Government Reform (Subcommittee on National Security, Homeland Defense and Foreign Operations)||2011-05-25||[http://oversight.house.gov/hearing/cybersecurity-assessing-the-immediate-threat-to-the-united-states/ Cybersecurity: Assessing the Immediate Threat to the United States]||U.S. Government Hearing||3. [[The Threat and Skeptics]],<br>3.3.1 [[Public Critical Infrastructure]],<br>4.7 [[Public-Private Cooperation]]||No | | U.S. House Committee on Oversight and Government Reform (Subcommittee on National Security, Homeland Defense and Foreign Operations)||2011-05-25||[http://oversight.house.gov/hearing/cybersecurity-assessing-the-immediate-threat-to-the-united-states/ Cybersecurity: Assessing the Immediate Threat to the United States]||U.S. Government Hearing||3.1 [[The Threat and Skeptics]],<br>3.3.1 [[Public Critical Infrastructure]],<br>4.7 [[Public-Private Cooperation]]||No | ||
|- | |- | ||
| U.S. House Committee on Science, Space and Technology||2011-07-21||[http://science.house.gov/markup/full-committee-%E2%80%93-markup Markup on H.R. 2096, Cybersecurity Enhancement Act of 2011]||U.S. Government Hearing||4.2.1 [[Risk Management and Investment]],<br>5.1 [[Regulation/Liability]],<br>5.7 [[Technology]]||No | | U.S. House Committee on Science, Space and Technology||2011-07-21||[http://science.house.gov/markup/full-committee-%E2%80%93-markup Markup on H.R. 2096, Cybersecurity Enhancement Act of 2011]||U.S. Government Hearing||4.2.1 [[Risk Management and Investment]],<br>5.1 [[Regulation/Liability]],<br>5.7 [[Technology]]||No | ||
Line 635: | Line 635: | ||
| U.S. House Committee on the Judiciary (Subcommittee on Intellectual Property, Competition and the Internet)||2011-05-25||[http://judiciary.house.gov/hearings/hear_05252011.html Cybersecurity: Problems Innovative Solutions to Challenging]||U.S. Government Hearing||4.7 [[Public-Private Cooperation]],<br>4.11 [[Cybercrime]],<br>5.2 [[Private Efforts/Organizations]]||No | | U.S. House Committee on the Judiciary (Subcommittee on Intellectual Property, Competition and the Internet)||2011-05-25||[http://judiciary.house.gov/hearings/hear_05252011.html Cybersecurity: Problems Innovative Solutions to Challenging]||U.S. Government Hearing||4.7 [[Public-Private Cooperation]],<br>4.11 [[Cybercrime]],<br>5.2 [[Private Efforts/Organizations]]||No | ||
|- | |- | ||
| U.S. House Permenant Select Committee on Intelligence||2011-02-10||[https://intelligence.house.gov/hearing/full-committee-world-wide-threats-hearing World Wide Threats]||U.S. Government Hearing||3. [[The Threat and Skeptics]],<br>5.1 [[Regulation/Liability]],<br>5.3 [[Government Organizations]]||No | | U.S. House Permenant Select Committee on Intelligence||2011-02-10||[https://intelligence.house.gov/hearing/full-committee-world-wide-threats-hearing World Wide Threats]||U.S. Government Hearing||3.1 [[The Threat and Skeptics]],<br>5.1 [[Regulation/Liability]],<br>5.3 [[Government Organizations]]||No | ||
|- | |- | ||
| U.S. House Permenant Select Committee on Intelligence||2011-10-04||[https://intelligence.house.gov/hearing/cyber-threats-and-ongoing-efforts-protect-nation Cyber Threats and Ongoing Efforts to Protect the Nation]||U.S. Government Hearing||4.7 [[Public-Private Cooperation]],<br>4.13.2 [[Industrial|Industrial Espionage]],<br>5.4 [[International Cooperation]]||No | | U.S. House Permenant Select Committee on Intelligence||2011-10-04||[https://intelligence.house.gov/hearing/cyber-threats-and-ongoing-efforts-protect-nation Cyber Threats and Ongoing Efforts to Protect the Nation]||U.S. Government Hearing||4.7 [[Public-Private Cooperation]],<br>4.13.2 [[Industrial|Industrial Espionage]],<br>5.4 [[International Cooperation]]||No | ||
Line 745: | Line 745: | ||
| Zittrain, Jonathan L. ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/The_Future_of_the_Internet_and_How_To_Stop_It The Future of the Internet and How To Stop It ]||Book ||4.4 [[Usability/Human Factors]],<br>5.1 [[Regulation/Liability]]||Yes | | Zittrain, Jonathan L. ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/The_Future_of_the_Internet_and_How_To_Stop_It The Future of the Internet and How To Stop It ]||Book ||4.4 [[Usability/Human Factors]],<br>5.1 [[Regulation/Liability]]||Yes | ||
|} | |} | ||
Revision as of 17:13, 31 July 2012
Types
U.S. Government Report
U.S. Government Hearing
Non-U.S. Government Report
Independent Report
Industry Report
Book
Journal Article
Article
Categories
Exclude Subcatgeories
Search