Template:Filtered Table: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 132: Line 132:
! align="center" style="background:#f0f0f0;"|'''Type'''
! align="center" style="background:#f0f0f0;"|'''Type'''
! align="center" style="background:#f0f0f0;"|'''Category'''
! align="center" style="background:#f0f0f0;"|'''Category'''
! align="center" style="background:#f0f0f0;"|'''Synopsis'''
! align="center" style="background:#f0f0f0;"|'''Wiki Entry'''
|-
|-
|-
|-
| Schneier, Bruce ||2003--||[[Beyond_Fear|Beyond Fear ]]||Book ||3.2 [[Actors and Incentives]],<br>4.5 [[Psychology and Politics]],<br>5.6 [[Deterrence]]||Yes
| Schneier, Bruce ||2003||[[Beyond_Fear|Beyond Fear ]]||Book ||3.2 [[Actors and Incentives]],<br>4.5 [[Psychology and Politics]],<br>5.6 [[Deterrence]]||Yes
|-
|-
| Camp, L. Jean ||2004--||[[Economics_of_Information_Security|Economics of Information Security ]]||Book ||4.2 [[Economics of Cybersecurity]],<br>5.1 [[Regulation/Liability]]||Yes
| Camp, L. Jean ||2004||[[Economics_of_Information_Security|Economics of Information Security ]]||Book ||4.2 [[Economics of Cybersecurity]],<br>5.1 [[Regulation/Liability]]||Yes
|-
|-
| Camp, L. Jean ||2004--||[[Pricing_Security|Pricing Security ]]||Book ||4.2.1 [[Risk Management and Investment]],<br>4.2.2 [[Incentives]]||Yes
| Camp, L. Jean ||2004||[[Pricing_Security|Pricing Security ]]||Book ||4.2.1 [[Risk Management and Investment]],<br>4.2.2 [[Incentives]]||Yes
|-
|-
| Varian, Hal ||2004--||[[System_Reliability_and_Free_Riding|System Reliability and Free Riding ]]||Book ||4.2 [[Economics of Cybersecurity]]||Yes
| Varian, Hal ||2004||[[System_Reliability_and_Free_Riding|System Reliability and Free Riding ]]||Book ||4.2 [[Economics of Cybersecurity]]||Yes
|-
|-
| Grady, Mark F. ||2006--||[[The_Law_and_Economics_of_Cybersecurity|The Law and Economics of Cybersecurity ]]||Book ||4.2 [[Economics of Cybersecurity]],<br>5.1 [[Regulation/Liability]]||Yes
| Grady, Mark F. ||2006||[[The_Law_and_Economics_of_Cybersecurity|The Law and Economics of Cybersecurity ]]||Book ||4.2 [[Economics of Cybersecurity]],<br>5.1 [[Regulation/Liability]]||Yes
|-
|-
| Gandal, Neil ||2008--||[[An_Introduction_to_Key_Themes_in_the_Economics_of_Cyber_Security|An Introduction to Key Themes in the Economics of Cyber Security ]]||Book ||4.2 [[Economics of Cybersecurity]],<br>4.2.2 [[Incentives]],<br>5.7 [[Technology]]||Yes
| Gandal, Neil ||2008||[[An_Introduction_to_Key_Themes_in_the_Economics_of_Cyber_Security|An Introduction to Key Themes in the Economics of Cyber Security ]]||Book ||4.2 [[Economics of Cybersecurity]],<br>4.2.2 [[Incentives]],<br>5.7 [[Technology]]||Yes
|-
|-
| Johnson, Eric M. ||2008--||[[Managing_Information_Risk_and_the_Economics_of_Security|Managing Information Risk and the Economics of Security ]]||Book ||4.2 [[Economics of Cybersecurity]],<br>4.2.1 [[Risk Management and Investment]],<br>5.1 [[Regulation/Liability]]||Yes
| Johnson, Eric M. ||2008||[[Managing_Information_Risk_and_the_Economics_of_Security|Managing Information Risk and the Economics of Security ]]||Book ||4.2 [[Economics of Cybersecurity]],<br>4.2.1 [[Risk Management and Investment]],<br>5.1 [[Regulation/Liability]]||Yes
|-
|-
| Schneier, Bruce ||2008--||[[Schneier_on_Security|Schneier on Security ]]||Book ||3.2 [[Actors and Incentives]],<br>4.4 [[Usability/Human Factors]],<br>5.1 [[Regulation/Liability]]||Yes
| Schneier, Bruce ||2008||[[Schneier_on_Security|Schneier on Security ]]||Book ||3.2 [[Actors and Incentives]],<br>4.4 [[Usability/Human Factors]],<br>5.1 [[Regulation/Liability]]||Yes
|-
|-
| Anderson, Ross J. ||2008--||[[Security_Engineering|Security Engineering ]]||Book ||3.2 [[Security Targets]],<br>4.2 [[Economics of Cybersecurity]],<br>5.1 [[Regulation/Liability]]||Yes
| Anderson, Ross J. ||2008||[[Security_Engineering|Security Engineering ]]||Book ||3.2 [[Security Targets]],<br>4.2 [[Economics of Cybersecurity]],<br>5.1 [[Regulation/Liability]]||Yes
|-
|-
| Zittrain, Jonathan L. ||2008--||[[The_Future_of_the_Internet_and_How_To_Stop_It|The Future of the Internet and How To Stop It ]]||Book ||4.4 [[Usability/Human Factors]],<br>5.1 [[Regulation/Liability]]||Yes
| Zittrain, Jonathan L. ||2008||[[The_Future_of_the_Internet_and_How_To_Stop_It|The Future of the Internet and How To Stop It ]]||Book ||4.4 [[Usability/Human Factors]],<br>5.1 [[Regulation/Liability]]||Yes
|-
|-
| Kramer, Franklin D., et. al ||2009--||[[Cyberpower_and_National_Security|Cyberpower and National Security ]]||Book ||1. [[Overview]]||Yes
| Kramer, Franklin D., et. al ||2009||[[Cyberpower_and_National_Security|Cyberpower and National Security ]]||Book ||1. [[Overview]]||Yes
|-
|-
| Moore, Tyler ||2009--||[[The_Impact_of_Incentives_on_Notice_and_Take-down|The Impact of Incentives on Notice and Take-down ]]||Book ||4.2.2 [[Incentives]],<br>4.11 [[Cybercrime]],<br>5.4 [[International Cooperation]]||Yes
| Moore, Tyler ||2009||[[The_Impact_of_Incentives_on_Notice_and_Take-down|The Impact of Incentives on Notice and Take-down ]]||Book ||4.2.2 [[Incentives]],<br>4.11 [[Cybercrime]],<br>5.4 [[International Cooperation]]||Yes
|-
|-
| Nye, Joseph ||2010--||[[Cyber_Power|Cyber Power ]]||Book ||4.12 [[Cyberwar]],<br>4.13 [[Espionage]],<br>5.5 [[International Law (including Laws of War)]]||Yes
| Nye, Joseph ||2010||[[Cyber_Power|Cyber Power ]]||Book ||4.12 [[Cyberwar]],<br>4.13 [[Espionage]],<br>5.5 [[International Law (including Laws of War)]]||Yes
|-
|-
| Clarke, Richard A. ||2010--||[[Cyber_War|Cyber War ]]||Book ||3.1 [[The Threat and Skeptics]],<br>3.2.1 [[States]],<br>4.12 [[Cyberwar]]||Yes
| Clarke, Richard A. ||2010||[[Cyber_War|Cyber War ]]||Book ||3.1 [[The Threat and Skeptics]],<br>3.2.1 [[States]],<br>4.12 [[Cyberwar]]||Yes
|-
|-
| Rotenberg et. al. ||2010--||[[The_Cyber_War_Threat_Has_Been_Grossly_Exaggerated|The Cyber War Threat Has Been Grossly Exaggerated ]]||Article||3.1 [[The Threat and Skeptics]],<br>3.2.1 [[States]],<br>4.12 [[Cyberwar]]||Yes
| Rotenberg et. al. ||2010||[[The_Cyber_War_Threat_Has_Been_Grossly_Exaggerated|The Cyber War Threat Has Been Grossly Exaggerated ]]||Article||3.1 [[The Threat and Skeptics]],<br>3.2.1 [[States]],<br>4.12 [[Cyberwar]]||Yes
|-
|-
| Joint Workshop of the National Security Threats in Cyberspace and the National Strategy Forum ||2009-09-15||[http://nationalstrategy.com/Portals/0/National%20Security%20Threats%20in%20Cyberspace%20FINAL%2009-15-09.pdf National Security Threats in Cyberspace ]||Independent Report||||No
| Joint Workshop of the National Security Threats in Cyberspace and the National Strategy Forum ||2009-09-15||[http://nationalstrategy.com/Portals/0/National%20Security%20Threats%20in%20Cyberspace%20FINAL%2009-15-09.pdf National Security Threats in Cyberspace ]||Independent Report||||No
Line 215: Line 215:
| Organization for Economic Co-operation and Development (OECD) ||2012-01-10||[http://www.oecd-ilibrary.org/docserver/download/fulltext/5k9h2q8v9bln.pdf?expires=1330527950&id=id&accname=guest&checksum=F4470043AC638BE19D5131C3D5CE5EA4 ICT Applications for the Smart Grid: Opportunities and Policy Implications ]||Independent Report ||||No
| Organization for Economic Co-operation and Development (OECD) ||2012-01-10||[http://www.oecd-ilibrary.org/docserver/download/fulltext/5k9h2q8v9bln.pdf?expires=1330527950&id=id&accname=guest&checksum=F4470043AC638BE19D5131C3D5CE5EA4 ICT Applications for the Smart Grid: Opportunities and Policy Implications ]||Independent Report ||||No
|-
|-
| National Research Council ||1999--||[[Trust_in_Cyberspace|Trust in Cyberspace ]]||Independent Report ||3.3.3.2 [[Public Data Networks]],<br>4.2.2 [[Incentives]],<br>4.7 [[Public-Private Cooperation]]||Yes
| National Research Council ||1999||[[Trust_in_Cyberspace|Trust in Cyberspace ]]||Independent Report ||3.3.3.2 [[Public Data Networks]],<br>4.2.2 [[Incentives]],<br>4.7 [[Public-Private Cooperation]]||Yes
|-
|-
| Anderson, Ross ||2001--||[[Why_Information_Security_is_Hard|Why Information Security is Hard ]]||Independent Report ||4.2.1 [[Risk Management and Investment]],<br>4.2.2 [[Incentives]],<br>5.1 [[Regulation/Liability]]||Yes
| Anderson, Ross ||2001||[[Why_Information_Security_is_Hard|Why Information Security is Hard ]]||Independent Report ||4.2.1 [[Risk Management and Investment]],<br>4.2.2 [[Incentives]],<br>5.1 [[Regulation/Liability]]||Yes
|-
|-
| Computing Research Association ||2003-||[[Four_Grand_Challenges_in_Trustworthy_Computing|Four Grand Challenges in Trustworthy Computing ]]||Independent Report ||4.4 [[Usability/Human Factors]],<br>4.6 [[Information Sharing/Disclosure]],<br>4.9 [[Identity Management]]||Yes
| Computing Research Association ||2003-||[[Four_Grand_Challenges_in_Trustworthy_Computing|Four Grand Challenges in Trustworthy Computing ]]||Independent Report ||4.4 [[Usability/Human Factors]],<br>4.6 [[Information Sharing/Disclosure]],<br>4.9 [[Identity Management]]||Yes
|-
|-
| Institute for Information Infrastructure Protection ||2003--||[[Cyber_Security_Research_and_Development_Agenda|Cyber Security Research and Development Agenda ]]||Independent Report ||4.1 [[Metrics]],<br>4.2.1 [[Risk Management and Investment]],<br>5.1 [[Regulation/Liability]]||Yes
| Institute for Information Infrastructure Protection ||2003||[[Cyber_Security_Research_and_Development_Agenda|Cyber Security Research and Development Agenda ]]||Independent Report ||4.1 [[Metrics]],<br>4.2.1 [[Risk Management and Investment]],<br>5.1 [[Regulation/Liability]]||Yes
|-
|-
| Dörmann, Knut ||2004--||[[Applicability_of_the_Additional_Protocols_to_Computer_Network_Attacks|Applicability of the Additional Protocols to Computer Network Attacks ]]||Independent Report ||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes
| Dörmann, Knut ||2004||[[Applicability_of_the_Additional_Protocols_to_Computer_Network_Attacks|Applicability of the Additional Protocols to Computer Network Attacks ]]||Independent Report ||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes
|-
|-
| Schmitt, Michael N., et. al ||2004--||[[Computers_and_War|Computers and War ]]||Independent Report ||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes
| Schmitt, Michael N., et. al ||2004||[[Computers_and_War|Computers and War ]]||Independent Report ||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes
|-
|-
| Lernard, Thomas M. ||2005--||[[An_Economic_Analysis_of_Notification_Requirements_for_Data_Security_Breaches|An Economic Analysis of Notification Requirements for Data Security Breaches ]]||Independent Report ||4.2 [[Economics of Cybersecurity]],<br>4.6 [[Information Sharing/Disclosure]],<br>5.1 [[Regulation/Liability]]||Yes
| Lernard, Thomas M. ||2005||[[An_Economic_Analysis_of_Notification_Requirements_for_Data_Security_Breaches|An Economic Analysis of Notification Requirements for Data Security Breaches ]]||Independent Report ||4.2 [[Economics of Cybersecurity]],<br>4.6 [[Information Sharing/Disclosure]],<br>5.1 [[Regulation/Liability]]||Yes
|-
|-
| Bohme, Rainer ||2005--||[[Cyber-Insurance_Revisited|Cyber-Insurance Revisited ]]||Independent Report ||4.2.2 [[Incentives]],<br>4.2.3 [[Insurance]],<br>,4.2.5 [[Market Failure]]||Yes
| Bohme, Rainer ||2005||[[Cyber-Insurance_Revisited|Cyber-Insurance Revisited ]]||Independent Report ||4.2.2 [[Incentives]],<br>4.2.3 [[Insurance]],<br>,4.2.5 [[Market Failure]]||Yes
|-
|-
| Bohme, Rainer ||2006--||[[Models_and_Measures_for_Correlation_in_Cyber-Insurance|Models and Measures for Correlation in Cyber-Insurance ]]||Independent Report ||4.2.3 [[Insurance]],<br>5.2 [[Private Efforts/Organizations]]||Yes
| Bohme, Rainer ||2006||[[Models_and_Measures_for_Correlation_in_Cyber-Insurance|Models and Measures for Correlation in Cyber-Insurance ]]||Independent Report ||4.2.3 [[Insurance]],<br>5.2 [[Private Efforts/Organizations]]||Yes
|-
|-
| Energetics Inc. ||2006--||[[Roadmap_to_Secure_Control_Systems_in_the_Energy_Sector|Roadmap to Secure Control Systems in the Energy Sector ]]||Independent Report ||3.3.1 [[Public Critical Infrastructure]],<br>4.7 [[Public-Private Cooperation]]||Yes
| Energetics Inc. ||2006||[[Roadmap_to_Secure_Control_Systems_in_the_Energy_Sector|Roadmap to Secure Control Systems in the Energy Sector ]]||Independent Report ||3.3.1 [[Public Critical Infrastructure]],<br>4.7 [[Public-Private Cooperation]]||Yes
|-
|-
| Franklin, Jason, et. al ||2007--||[[An_Inquiry_into_the_Nature_and_Causes_of_the_Wealth_of_Internet_Miscreants|An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ]]||Independent Report ||3.2.5 [[Criminals and Criminal Organizations]],<br>4.2 [[Economics of Cybersecurity]],<br>4.11 [[Cybercrime]]||Yes
| Franklin, Jason, et. al ||2007||[[An_Inquiry_into_the_Nature_and_Causes_of_the_Wealth_of_Internet_Miscreants|An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants ]]||Independent Report ||3.2.5 [[Criminals and Criminal Organizations]],<br>4.2 [[Economics of Cybersecurity]],<br>4.11 [[Cybercrime]]||Yes
|-
|-
| Moore, Tyler ||2007--||[[Examining_the_Impact_of_Website_Take-down_on_Phishing|Examining the Impact of Website Take-down on Phishing ]]||Independent Report ||4.2 [[Economics of Cybersecurity]],<br>4.11 [[Cybercrime]],<br>5.7 [[Technology]]||Yes
| Moore, Tyler ||2007||[[Examining_the_Impact_of_Website_Take-down_on_Phishing|Examining the Impact of Website Take-down on Phishing ]]||Independent Report ||4.2 [[Economics of Cybersecurity]],<br>4.11 [[Cybercrime]],<br>5.7 [[Technology]]||Yes
|-
|-
| National Research Council ||2007--||[[Toward_a_Safer_and_More_Secure_Cyberspace|Toward a Safer and More Secure Cyberspace ]]||Independent Report ||1. [[Overview]],<br>4.8 [[Attribution]],<br>5.6 [[Deterrence]]||Yes
| National Research Council ||2007||[[Toward_a_Safer_and_More_Secure_Cyberspace|Toward a Safer and More Secure Cyberspace ]]||Independent Report ||1. [[Overview]],<br>4.8 [[Attribution]],<br>5.6 [[Deterrence]]||Yes
|-
|-
| Romanosky et al. ||2008--||[[Do_Data_Breach_Disclosure_Laws_Reduce_Identity_Theft|Do Data Breach Disclosure Laws Reduce Identity Theft ]]||Independent Report ||4.2.2 [[Incentives]],<br>4.6 [[Information Sharing/Disclosure]],<br>5.1 [[Regulation/Liability]]||Yes
| Romanosky et al. ||2008||[[Do_Data_Breach_Disclosure_Laws_Reduce_Identity_Theft|Do Data Breach Disclosure Laws Reduce Identity Theft ]]||Independent Report ||4.2.2 [[Incentives]],<br>4.6 [[Information Sharing/Disclosure]],<br>5.1 [[Regulation/Liability]]||Yes
|-
|-
| Financial Services Sector Coordinating Council for Critical Infrastructure Protection ||2008--||[[Research_Agenda_for_the_Banking_and_Finance_Sector|Research Agenda for the Banking and Finance Sector ]]||Independent Report ||3.3.2.2 [[Financial Institutions and Networks]],<br>4.1 [[Metrics]],<br>4.2.1 [[Risk Management and Investment]]||Yes
| Financial Services Sector Coordinating Council for Critical Infrastructure Protection ||2008||[[Research_Agenda_for_the_Banking_and_Finance_Sector|Research Agenda for the Banking and Finance Sector ]]||Independent Report ||3.3.2.2 [[Financial Institutions and Networks]],<br>4.1 [[Metrics]],<br>4.2.1 [[Risk Management and Investment]]||Yes
|-
|-
| Center for Strategic and International Studies ||2008--||[[Securing_Cyberspace_for_the_44th_Presidency|Securing Cyberspace for the 44th Presidency ]]||Independent Report ||4.7 [[Public-Private Cooperation]],<br>5.1 [[Regulation/Liability]],<br>5.4 [[International Cooperation]]||Yes
| Center for Strategic and International Studies ||2008||[[Securing_Cyberspace_for_the_44th_Presidency|Securing Cyberspace for the 44th Presidency ]]||Independent Report ||4.7 [[Public-Private Cooperation]],<br>5.1 [[Regulation/Liability]],<br>5.4 [[International Cooperation]]||Yes
|-
|-
| Moore, Tyler ||2008--||[[The_Consequence_of_Non-Cooperation_in_the_Fight_Against_Phishing|The Consequence of Non-Cooperation in the Fight Against Phishing ]]||Independent Report ||3.3.2.2 [[Financial Institutions and Networks]],<br>4.2 [[Economics of Cybersecurity]],<br>4.6 [[Information Sharing/Disclosure]]||Yes
| Moore, Tyler ||2008||[[The_Consequence_of_Non-Cooperation_in_the_Fight_Against_Phishing|The Consequence of Non-Cooperation in the Fight Against Phishing ]]||Independent Report ||3.3.2.2 [[Financial Institutions and Networks]],<br>4.2 [[Economics of Cybersecurity]],<br>4.6 [[Information Sharing/Disclosure]]||Yes
|-
|-
| National Cyber Defense Initiative ||2009--||[[National_Cyber_Defense_Financial_Services_Workshop_Report|National Cyber Defense Financial Services Workshop Report ]]||Independent Report ||3.3.2.2 [[Financial Institutions and Networks]],<br>4.2.1 [[Risk Management and Investment]],<br>5.3 [[Government Organizations]]||Yes
| National Cyber Defense Initiative ||2009||[[National_Cyber_Defense_Financial_Services_Workshop_Report|National Cyber Defense Financial Services Workshop Report ]]||Independent Report ||3.3.2.2 [[Financial Institutions and Networks]],<br>4.2.1 [[Risk Management and Investment]],<br>5.3 [[Government Organizations]]||Yes
|-
|-
| Bohme, Rainer ||2010--||[[Modeling_Cyber-Insurance|Modeling Cyber-Insurance ]]||Independent Report ||4.2.2 [[Incentives]],<br>4.2.3 [[Insurance]],<br>,5.2 [[Private Efforts/Organizations]]||Yes
| Bohme, Rainer ||2010||[[Modeling_Cyber-Insurance|Modeling Cyber-Insurance ]]||Independent Report ||4.2.2 [[Incentives]],<br>4.2.3 [[Insurance]],<br>,5.2 [[Private Efforts/Organizations]]||Yes
|-
|-
| Clinton, Larry ||Undated ||[[Cyber-Insurance_Metrics_and_Impact_on_Cyber-Security|Cyber-Insurance Metrics and Impact on Cyber-Security ]]||Independent Report ||4.2.3 [[Insurance]],<br>5.2 [[Private Efforts/Organizations]]||Yes
| Clinton, Larry ||Undated ||[[Cyber-Insurance_Metrics_and_Impact_on_Cyber-Security|Cyber-Insurance Metrics and Impact on Cyber-Security ]]||Independent Report ||4.2.3 [[Insurance]],<br>5.2 [[Private Efforts/Organizations]]||Yes
Line 279: Line 279:
| Microsoft||2012-11-10||[http://cdn.globalfoundationservices.com/documents/InformationSecurityMangSysforMSCloudInfrastructure.pdf Information Security Management System for Microsoft Cloud Infrastructure ]||Industry Report||3.3.3.3 [[Cloud Computing]],<br>5.2 [[Private Efforts/Organizations]]||No
| Microsoft||2012-11-10||[http://cdn.globalfoundationservices.com/documents/InformationSecurityMangSysforMSCloudInfrastructure.pdf Information Security Management System for Microsoft Cloud Infrastructure ]||Industry Report||3.3.3.3 [[Cloud Computing]],<br>5.2 [[Private Efforts/Organizations]]||No
|-
|-
| Computer Economics, Inc. ||2007--||[[2007_Malware_Report|2007 Malware Report ]]||Industry Report ||4.2 [[Economics of Cybersecurity]]||Yes
| Computer Economics, Inc. ||2007||[[2007_Malware_Report|2007 Malware Report ]]||Industry Report ||4.2 [[Economics of Cybersecurity]]||Yes
|-
|-
| Verizon ||2010--||[[2010_Data_Breach_Investigations_Report|2010 Data Breach Investigations Report ]]||Industry Report ||3.3.2.2 [[Financial Institutions and networks]],<br>4.11 [[Cybercrime]],<br>5.2 [[Private Efforts/Organizations]]||Yes
| Verizon ||2010||[[2010_Data_Breach_Investigations_Report|2010 Data Breach Investigations Report ]]||Industry Report ||3.3.2.2 [[Financial Institutions and networks]],<br>4.11 [[Cybercrime]],<br>5.2 [[Private Efforts/Organizations]]||Yes
|-
|-
| HP TippingPoint DVLabs ||2010--||[[2010_Top_Cyber_Security_Risks_Report|2010 Top Cyber Security Risks Report ]]||Industry report ||4.11 [[Cybercrime]],<br>5.7 [[Technology]]||Yes
| HP TippingPoint DVLabs ||2010||[[2010_Top_Cyber_Security_Risks_Report|2010 Top Cyber Security Risks Report ]]||Industry report ||4.11 [[Cybercrime]],<br>5.7 [[Technology]]||Yes
|-
|-
| McAfee, Inc. ||2010--||[[McAfee_Threats_Report|McAfee Threats Report ]]||Industry Report ||3.2.3 [[Hacktivists]],<br>3.2.5 [[Criminals and Criminal Organizations]],<br>4.11 [[Cybercrime]]||Yes
| McAfee, Inc. ||2010||[[McAfee_Threats_Report|McAfee Threats Report ]]||Industry Report ||3.2.3 [[Hacktivists]],<br>3.2.5 [[Criminals and Criminal Organizations]],<br>4.11 [[Cybercrime]]||Yes
|-
|-
| Symantec Corporation ||2010--||[[Symantec_Global_Internet_Security_Threat_Report|Symantec Global Internet Security Threat Report ]]||Industry Report ||3.3.2.2 [[Financial Institutions and Networks]],<br>4.2 [[Economics of Cybersecurity]],<br>4.11 [[Cybercrime]]||Yes
| Symantec Corporation ||2010||[[Symantec_Global_Internet_Security_Threat_Report|Symantec Global Internet Security Threat Report ]]||Industry Report ||3.3.2.2 [[Financial Institutions and Networks]],<br>4.2 [[Economics of Cybersecurity]],<br>4.11 [[Cybercrime]]||Yes
|-
|-
| Trend Micro Incorporated ||2010--||[[Trend_Micro_Annual_Report|Trend Micro Annual Report ]]||Industry Report ||4.11 [[Cybercrime]]||Yes
| Trend Micro Incorporated ||2010||[[Trend_Micro_Annual_Report|Trend Micro Annual Report ]]||Industry Report ||4.11 [[Cybercrime]]||Yes
|-
|-
| Journal of Strategic Studies ||2011-10-05||[http://www.tandfonline.com/doi/abs/10.1080/01402390.2011.6089393 Cyber War Will Not Take Place ]||Journal Article||||No
| Journal of Strategic Studies ||2011-10-05||[http://www.tandfonline.com/doi/abs/10.1080/01402390.2011.6089393 Cyber War Will Not Take Place ]||Journal Article||||No
|-
|-
| Schmitt Michael N  ||2002--||[[Wired_Warfare| Wired warfare: Computer network attack and jus in bello]]||Journal Article||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes
| Schmitt Michael N  ||2002||[[Wired_Warfare| Wired warfare: Computer network attack and jus in bello]]||Journal Article||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes
|-
|-
| Schmitt Michael N  ||2004--||[[Direct_Participation_in_Hostilities|Direct Participation in Hostilities and 21st Century Armed Conflict]]||Journal Article||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes
| Schmitt Michael N  ||2004||[[Direct_Participation_in_Hostilities|Direct Participation in Hostilities and 21st Century Armed Conflict]]||Journal Article||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes
|-
|-
| Thom, Maxie    ||2006--||[[Information_Warfare_Arms_Control| Information Warfare Arms Control: Risks and Costs]]||Journal Article||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5. [[Approaches]]||Yes
| Thom, Maxie    ||2006||[[Information_Warfare_Arms_Control| Information Warfare Arms Control: Risks and Costs]]||Journal Article||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5. [[Approaches]]||Yes
|-
|-
| Graham David E  ||2010--||[[Cyber_Threats_and_the_Law_of_War| Cyber Threats and the Law of War]]||Journal Article||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes
| Graham David E  ||2010||[[Cyber_Threats_and_the_Law_of_War| Cyber Threats and the Law of War]]||Journal Article||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes
|-
|-
| Dunlap Charles J, Jr  ||2011--||[[Perspectives_for_Cyber_Strategists_on_Law_for_Cyberwar|Perspectives for Cyber Strategists on Law for Cyberwar]]||Journal Article||4.12 [[Cyberwar]],<br>5.3 [[Government Organizations]],<br>5.5 [[International Law (including Laws of War)]]||Yes
| Dunlap Charles J, Jr  ||2011||[[Perspectives_for_Cyber_Strategists_on_Law_for_Cyberwar|Perspectives for Cyber Strategists on Law for Cyberwar]]||Journal Article||4.12 [[Cyberwar]],<br>5.3 [[Government Organizations]],<br>5.5 [[International Law (including Laws of War)]]||Yes
|-
|-
| Schmitt, Michael N. ||1999--||[[Computer_Network_Attack_and_the_Use_of_Force_in_International_Law|Computer Network Attack and the Use of Force in International Law ]]||Journal Article ||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes
| Schmitt, Michael N. ||1999||[[Computer_Network_Attack_and_the_Use_of_Force_in_International_Law|Computer Network Attack and the Use of Force in International Law ]]||Journal Article ||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes
|-
|-
| Barkham, Jason ||2001--||[[Information_Warfare_and_International_Law_on_the_Use_of_Force|Information Warfare and International Law on the Use of Force ]]||Journal Article ||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes
| Barkham, Jason ||2001||[[Information_Warfare_and_International_Law_on_the_Use_of_Force|Information Warfare and International Law on the Use of Force ]]||Journal Article ||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes
|-
|-
| Swire, Peter P. ||2004--||[[A_Model_for_When_Disclosure_Helps_Security|A Model for When Disclosure Helps Security ]]||Journal Article ||4.2.2 [[Incentives]],<br>4.6 [[Information Sharing/Disclosure]],<br>5.1 [[Regulation/Liability]]||Yes
| Swire, Peter P. ||2004||[[A_Model_for_When_Disclosure_Helps_Security|A Model for When Disclosure Helps Security ]]||Journal Article ||4.2.2 [[Incentives]],<br>4.6 [[Information Sharing/Disclosure]],<br>5.1 [[Regulation/Liability]]||Yes
|-
|-
| Aviram, Amitai ||2004--||[[Overcoming_Impediments_to_Information_Sharing|Overcoming Impediments to Information Sharing ]]||Journal Article ||4.2.1 [[Risk Management and Investment]],<br>4.6 [[Information Sharing/Disclosure]],<br>4.7 [[Public-Private Cooperation]]||Yes
| Aviram, Amitai ||2004||[[Overcoming_Impediments_to_Information_Sharing|Overcoming Impediments to Information Sharing ]]||Journal Article ||4.2.1 [[Risk Management and Investment]],<br>4.6 [[Information Sharing/Disclosure]],<br>4.7 [[Public-Private Cooperation]]||Yes
|-
|-
| Johnson, Vincent R. ||2005--||[[Cybersecurity,_Identity_Theft,_and_the_Limits_of_Tort_Liability|Cybersecurity, Identity Theft, and the Limits of Tort Liability ]]||Journal Article ||4.9 [[Identity Management]],<br>4.10 [[Privacy]],<br>5.1 [[Regulation/Liability]]||Yes
| Johnson, Vincent R. ||2005||[[Cybersecurity,_Identity_Theft,_and_the_Limits_of_Tort_Liability|Cybersecurity, Identity Theft, and the Limits of Tort Liability ]]||Journal Article ||4.9 [[Identity Management]],<br>4.10 [[Privacy]],<br>5.1 [[Regulation/Liability]]||Yes
|-
|-
| Powell, Benjamin ||2005--||[[Is_Cybersecurity_a_Public_Good|Is Cybersecurity a Public Good ]]||Journal Article ||4.2 [[Economics of Cybersecurity]],<br>4.2.5 [[Market Failure]],<br>5.1 [[Regulation/Liability]]||Yes
| Powell, Benjamin ||2005||[[Is_Cybersecurity_a_Public_Good|Is Cybersecurity a Public Good ]]||Journal Article ||4.2 [[Economics of Cybersecurity]],<br>4.2.5 [[Market Failure]],<br>5.1 [[Regulation/Liability]]||Yes
|-
|-
| Granick, Jennifer Stisa ||2005--||[[The_Price_of_Restricting_Vulnerability_Publications|The Price of Restricting Vulnerability Publications ]]||Journal Article ||4.2 [[Economics of Cybersecurity]],<br>4.6 [[Information Sharing/Disclosure]],<br>5.1 [[Regulation/Liability]]||Yes
| Granick, Jennifer Stisa ||2005||[[The_Price_of_Restricting_Vulnerability_Publications|The Price of Restricting Vulnerability Publications ]]||Journal Article ||4.2 [[Economics of Cybersecurity]],<br>4.6 [[Information Sharing/Disclosure]],<br>5.1 [[Regulation/Liability]]||Yes
|-
|-
| Brown, Davis ||2006--||[[A_Proposal_for_an_International_Convention_To_Regulate_the_Use_of_Information_Systems_in_Armed_Conflict|A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict ]]||Journal Article ||3.3.2.1 [[Military networks (.gov)]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes
| Brown, Davis ||2006||[[A_Proposal_for_an_International_Convention_To_Regulate_the_Use_of_Information_Systems_in_Armed_Conflict|A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict ]]||Journal Article ||3.3.2.1 [[Military networks (.gov)]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes
|-
|-
| Swire, Peter P. ||2006--||[[A_Theory_of_Disclosure_for_Security_and_Competitive_Reasons|A Theory of Disclosure for Security and Competitive Reasons ]]||Journal Article ||4.2 [[Economics of Cybersecurity]],<br>4.6 [[Information Sharing/Disclosure]],<br>5.1 [[Regulation/Liability]]||Yes
| Swire, Peter P. ||2006||[[A_Theory_of_Disclosure_for_Security_and_Competitive_Reasons|A Theory of Disclosure for Security and Competitive Reasons ]]||Journal Article ||4.2 [[Economics of Cybersecurity]],<br>4.6 [[Information Sharing/Disclosure]],<br>5.1 [[Regulation/Liability]]||Yes
|-
|-
| Kobayashi, Bruce H. ||2006--||[[An_Economic_Analysis_of_the_Private_and_Social_Costs_of_the_Provision_of_Cybersecurity_and_Other_Public_Security_Goods|An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods ]]||Journal Article ||4.2 [[Economics of Cybersecurity]],<br>4.2.2 [[Incentives]],<br>5.6 [[Deterrence]]||Yes
| Kobayashi, Bruce H. ||2006||[[An_Economic_Analysis_of_the_Private_and_Social_Costs_of_the_Provision_of_Cybersecurity_and_Other_Public_Security_Goods|An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods ]]||Journal Article ||4.2 [[Economics of Cybersecurity]],<br>4.2.2 [[Incentives]],<br>5.6 [[Deterrence]]||Yes
|-
|-
| Stohl, Michael ||2006--||[[Cyber_Terrorism|Cyber Terrorism ]]||Journal Article ||3.2.3 [[Hacktivists]],<br>3.2.4 [[Terrorists]],<br>4.5 [[Psychology and Politics]]||Yes
| Stohl, Michael ||2006||[[Cyber_Terrorism|Cyber Terrorism ]]||Journal Article ||3.2.3 [[Hacktivists]],<br>3.2.4 [[Terrorists]],<br>4.5 [[Psychology and Politics]]||Yes
|-
|-
| Arora et al. ||2006--||[[Does_Information_Security_Attack_Frequency_Increase_With_Vulnerability_Disclosure|Does Information Security Attack Frequency Increase With Vulnerability Disclosure ]]||Journal Article ||4.2.1 [[Risk Management and Investment]],<br>4.6 [[Information Sharing/Disclosure]]||Yes
| Arora et al. ||2006||[[Does_Information_Security_Attack_Frequency_Increase_With_Vulnerability_Disclosure|Does Information Security Attack Frequency Increase With Vulnerability Disclosure ]]||Journal Article ||4.2.1 [[Risk Management and Investment]],<br>4.6 [[Information Sharing/Disclosure]]||Yes
|-
|-
| Lernard, Thomas M. ||2006--||[[Much_Ado_About_Notification|Much Ado About Notification ]]||Journal Article ||4.6 [[Information Sharing/Disclosure]],<br>5.1 [[Regulaiton/Liability]]||Yes
| Lernard, Thomas M. ||2006||[[Much_Ado_About_Notification|Much Ado About Notification ]]||Journal Article ||4.6 [[Information Sharing/Disclosure]],<br>5.1 [[Regulaiton/Liability]]||Yes
|-
|-
| Anderson, Ross ||2006--||[[The_Economics_of_Information_Security|The Economics of Information Security ]]||Journal Article ||4.2 [[Economics of Cybersecurity]],<br>5.1 [[Regulation/Liability]],<br>5.7 [[Technology]]||Yes
| Anderson, Ross ||2006||[[The_Economics_of_Information_Security|The Economics of Information Security ]]||Journal Article ||4.2 [[Economics of Cybersecurity]],<br>5.1 [[Regulation/Liability]],<br>5.7 [[Technology]]||Yes
|-
|-
| Thomas, Rob ||2006--||[[The_Underground_Economy|The Underground Economy ]]||Journal Article ||3.2.5 [[Criminals and Criminl Organizations]],<br>3.3.2.2 [[Financial Institutions and Networks]],<br>4.11 [[Cybercrime]]||Yes
| Thomas, Rob ||2006||[[The_Underground_Economy|The Underground Economy ]]||Journal Article ||3.2.5 [[Criminals and Criminl Organizations]],<br>3.3.2.2 [[Financial Institutions and Networks]],<br>4.11 [[Cybercrime]]||Yes
|-
|-
| Telang, Rahul ||2007--||[[Impact_of_Software_Vulnerability_Announcements_on_the_Market_Value_of_Software_Vendors|Impact of Software Vulnerability Announcements on the Market Value of Software Vendors ]]||Journal Article ||4.1 [[Metrics]],<br>4.2 [[Economics of Cybersecurity]],<br>4.6 [[Information Sharing/Disclosure]]||Yes
| Telang, Rahul ||2007||[[Impact_of_Software_Vulnerability_Announcements_on_the_Market_Value_of_Software_Vendors|Impact of Software Vulnerability Announcements on the Market Value of Software Vendors ]]||Journal Article ||4.1 [[Metrics]],<br>4.2 [[Economics of Cybersecurity]],<br>4.6 [[Information Sharing/Disclosure]]||Yes
|-
|-
| Schwartz, Paul ||2007--||[[Notification_of_Data_Security_Breaches|Notification of Data Security Breaches ]]||Journal Article ||4.2.2 [[Incentives]],<br>4.6 [[Information Sharing/Disclosure]],<br>5.1 [[Regulation/Liability]]||Yes
| Schwartz, Paul ||2007||[[Notification_of_Data_Security_Breaches|Notification of Data Security Breaches ]]||Journal Article ||4.2.2 [[Incentives]],<br>4.6 [[Information Sharing/Disclosure]],<br>5.1 [[Regulation/Liability]]||Yes
|-
|-
| Hollis, Duncan B. ||2007--||[[Why_States_Need_an_International_Law_for_Information_Operations|Why States Need an International Law for Information Operations ]]||Journal Article ||4.12 [[Cyberwar]],<br>4.13.1 [[Government to Government Espionage]],<br>5.5 [[International Law (including Laws of War)]]||Yes
| Hollis, Duncan B. ||2007||[[Why_States_Need_an_International_Law_for_Information_Operations|Why States Need an International Law for Information Operations ]]||Journal Article ||4.12 [[Cyberwar]],<br>4.13.1 [[Government to Government Espionage]],<br>5.5 [[International Law (including Laws of War)]]||Yes
|-
|-
| Epstein, Richard A. ||2008--||[[Cybersecurity_in_the_Payment_Card_Industry|Cybersecurity in the Payment Card Industry ]]||Journal Article ||3.2.5 [[Criminals and Criminal Organizations]],<br>4.11 [[Cybercrime]],<br>5.1 [[Regulation/Liability]]||Yes
| Epstein, Richard A. ||2008||[[Cybersecurity_in_the_Payment_Card_Industry|Cybersecurity in the Payment Card Industry ]]||Journal Article ||3.2.5 [[Criminals and Criminal Organizations]],<br>4.11 [[Cybercrime]],<br>5.1 [[Regulation/Liability]]||Yes
|-
|-
| Todd, Graham H. ||2009--||[[Armed_Attack_in_Cyberspace|Armed Attack in Cyberspace ]]||Journal Article ||3.2.1 [[States]],<br>4.8 [[Attribution]],<br>5.5 [[Internaitonal Law (including Laws of War)]]||Yes
| Todd, Graham H. ||2009||[[Armed_Attack_in_Cyberspace|Armed Attack in Cyberspace ]]||Journal Article ||3.2.1 [[States]],<br>4.8 [[Attribution]],<br>5.5 [[Internaitonal Law (including Laws of War)]]||Yes
|-
|-
| Korns, Stephen W. ||2009--||[[Cyber_Operations|Cyber Operations ]]||Journal Article ||4.8 [[Attribution]],<br>4.12 [[Cyberwar]],<br>5.6 [[Deterrence]]||Yes
| Korns, Stephen W. ||2009||[[Cyber_Operations|Cyber Operations ]]||Journal Article ||4.8 [[Attribution]],<br>4.12 [[Cyberwar]],<br>5.6 [[Deterrence]]||Yes
|-
|-
| Beard, Jack M. ||2009--||[[Law_and_War_in_the_Virtual_Era|Law and War in the Virtual Era ]]||Journal Article ||4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes
| Beard, Jack M. ||2009||[[Law_and_War_in_the_Virtual_Era|Law and War in the Virtual Era ]]||Journal Article ||4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes
|-
|-
| Sklerov, Matthew J. ||2009--||[[Solving_the_Dilemma_of_State_Responses_to_Cyberattacks|Solving the Dilemma of State Responses to Cyberattacks ]]||Journal Article ||3.2.1 [[States]],<br>4.8 [[Attribution]],<br>5.5 [[Internaitonal Law (including Laws of War)]]||Yes
| Sklerov, Matthew J. ||2009||[[Solving_the_Dilemma_of_State_Responses_to_Cyberattacks|Solving the Dilemma of State Responses to Cyberattacks ]]||Journal Article ||3.2.1 [[States]],<br>4.8 [[Attribution]],<br>5.5 [[Internaitonal Law (including Laws of War)]]||Yes
|-
|-
| Moore, Tyler, et. al ||2009--||[[The_Economics_of_Online_Crime|The Economics of Online Crime ]]||Journal Article ||3.2.5 [[Criminals and Criminal Organizations]],<br>3.3.2.2 [[Financial Institutions and Networks]],<br>4.2 [[Economics of Cybersecurity]]||Yes
| Moore, Tyler, et. al ||2009||[[The_Economics_of_Online_Crime|The Economics of Online Crime ]]||Journal Article ||3.2.5 [[Criminals and Criminal Organizations]],<br>3.3.2.2 [[Financial Institutions and Networks]],<br>4.2 [[Economics of Cybersecurity]]||Yes
|-
|-
| Watts, Sean ||2010--||[[Combatant_Status_and_Computer_Network_Attack|Combatant Status and Computer Network Attack ]]||Journal Article ||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes
| Watts, Sean ||2010||[[Combatant_Status_and_Computer_Network_Attack|Combatant Status and Computer Network Attack ]]||Journal Article ||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes
|-
|-
| Varian, Hal ||2000--||[[Managing_Online_Security_Risks|Managing Online Security Risks ]]||Article ||4.2 [[Economics of Cybersecurity]],<br>4.2.1 [[Risk Management and Investment]]||Yes
| Varian, Hal ||2000||[[Managing_Online_Security_Risks|Managing Online Security Risks ]]||Article ||4.2 [[Economics of Cybersecurity]],<br>4.2.1 [[Risk Management and Investment]]||Yes
|-
|-
| European Network and Information Security Agency ||2010-10-07||[http://www.enisa.europa.eu/media/press-releases/stuxnet-analysis Stuxnet Analysis ]||Non-U.S. Government Report||3. [[Threats and Actors]],<br>5.7 [[Technology]]||No
| European Network and Information Security Agency ||2010-10-07||[http://www.enisa.europa.eu/media/press-releases/stuxnet-analysis Stuxnet Analysis ]||Non-U.S. Government Report||3. [[Threats and Actors]],<br>5.7 [[Technology]]||No
Line 363: Line 363:
| GAO||2012-02-28||[http://www.csit.qub.ac.uk/media/pdf/Filetoupload,252359,en.pdf Cybersecurity: Challenges to Securing the Modernized Electricity Grid ]||Non-U.S. Government Report ||||No
| GAO||2012-02-28||[http://www.csit.qub.ac.uk/media/pdf/Filetoupload,252359,en.pdf Cybersecurity: Challenges to Securing the Modernized Electricity Grid ]||Non-U.S. Government Report ||||No
|-
|-
| van Eeten, Michel J. G. ||2008--||[[Economics_of_Malware|Economics of Malware ]]||Non-U.S. Government Report ||4.2 [[Economics of Cybersecurity]]||Yes
| van Eeten, Michel J. G. ||2008||[[Economics_of_Malware|Economics of Malware ]]||Non-U.S. Government Report ||4.2 [[Economics of Cybersecurity]]||Yes
|-
|-
| Dunlap, Charles J. Jr. ||2009--||[[Towards_a_Cyberspace_Legal_Regime_in_the_Twenty-First_Century|Towards a Cyberspace Legal Regime in the Twenty-First Century ]]||Article||4.5 [[Psychology and Politics]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes
| Dunlap, Charles J. Jr. ||2009||[[Towards_a_Cyberspace_Legal_Regime_in_the_Twenty-First_Century|Towards a Cyberspace Legal Regime in the Twenty-First Century ]]||Article||4.5 [[Psychology and Politics]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes
|-
|-
| Anderson, Ross, et. al ||2008--||[[Security_Economics_and_the_Internal_Market|Security Economics and the Internal Market ]]||Article||4.2 [[Economics of Cybersecurity]],<br>4.11 [[Cybercrime]],<br>5.6 [[Deterrence]]||Yes
| Anderson, Ross, et. al ||2008||[[Security_Economics_and_the_Internal_Market|Security Economics and the Internal Market ]]||Article||4.2 [[Economics of Cybersecurity]],<br>4.11 [[Cybercrime]],<br>5.6 [[Deterrence]]||Yes
|-
|-
| U.S. House Permenant Select Committee on Intelligence||2011-02-10||[https://intelligence.house.gov/hearing/full-committee-world-wide-threats-hearing World Wide Threats]||U.S. Government Hearing||3.1 [[The Threat and Skeptics]],<br>5.1 [[Regulation/Liability]],<br>5.3 [[Government Organizations]]||No
| U.S. House Permenant Select Committee on Intelligence||2011-02-10||[https://intelligence.house.gov/hearing/full-committee-world-wide-threats-hearing World Wide Threats]||U.S. Government Hearing||3.1 [[The Threat and Skeptics]],<br>5.1 [[Regulation/Liability]],<br>5.3 [[Government Organizations]]||No
Line 413: Line 413:
| U.S. House Committee on Energy and Commerce (Subcommittee on Commerce, Manufacturing, and Trade)||2011-06-02||[http://energycommerce.house.gov/hearings/hearingdetail.aspx?NewsID=8653 Sony and Epsilon: Lessons for Data Security Legislation]||U.S. Government Hearing||4.9 [[Identity Management]],<br>5.1 [[Regulation/Liability]],<br>5.2 [[Private Efforts/Organizations]]||No
| U.S. House Committee on Energy and Commerce (Subcommittee on Commerce, Manufacturing, and Trade)||2011-06-02||[http://energycommerce.house.gov/hearings/hearingdetail.aspx?NewsID=8653 Sony and Epsilon: Lessons for Data Security Legislation]||U.S. Government Hearing||4.9 [[Identity Management]],<br>5.1 [[Regulation/Liability]],<br>5.2 [[Private Efforts/Organizations]]||No
|-
|-
| U.S. House Committee on Energy and Commerce (Subcommittee on Commerce,Trade and Manufacturing)||2011-06-15||[http://energycommerce.house.gov/hearings/hearingdetail.aspx?NewsID=8693 Discussion Draft of H.R. _, a bill to require greater protection for sensitive consumer data and timely notification in case of breach]||U.S. Government Hearing||4.6 [[Information Sharing/Disclosure]],<br>4.10 [[Privacy]],<br>5.1 [[Regulation/Liability]]||No
| U.S. House Committee on Energy and Commerce (Subcommittee on Commerce,Trade and Manufacturing)||2011-06-15||[http://energycommerce.house.gov/hearings/hearingdetail.aspx?NewsID=8693 Discussion Draft of H.R. ___, a bill to require greater protection for sensitive consumer data and timely notification in case of breach]||U.S. Government Hearing||4.6 [[Information Sharing/Disclosure]],<br>4.10 [[Privacy]],<br>5.1 [[Regulation/Liability]]||No
|-
|-
| U.S. Senate Committee on Banking, Housing and Urban Affairs||2011-06-21||[http://banking.senate.gov/public/index.cfm?FuseAction=Hearings.Hearing&Hearing_ID=87487cb2-4710-4c09-a1b0-a9e12cda88f1 Cybersecurity and Data Protection in the Financial Sector]||U.S. Government Hearing||3.3.2.2 [[Financial Institutions and Networks]],<br>4.10 [[Privacy]],<br>5.1 [[Regulation/Liability]]||No
| U.S. Senate Committee on Banking, Housing and Urban Affairs||2011-06-21||[http://banking.senate.gov/public/index.cfm?FuseAction=Hearings.Hearing&Hearing_ID=87487cb2-4710-4c09-a1b0-a9e12cda88f1 Cybersecurity and Data Protection in the Financial Sector]||U.S. Government Hearing||3.3.2.2 [[Financial Institutions and Networks]],<br>4.10 [[Privacy]],<br>5.1 [[Regulation/Liability]]||No
Line 527: Line 527:
| U.S. Army War College ||2011-05-09||[http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?pubid=10670 Cyber Infrastructure Protection ]||U.S. Government Report||||No
| U.S. Army War College ||2011-05-09||[http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?pubid=10670 Cyber Infrastructure Protection ]||U.S. Government Report||||No
|-
|-
| Federal Communications Commission (FCC) ||2011-06-03||[-- FCC's Plan for Ensuring the Security of Telecommunications Networks ftp://ftp.fcc.gov/pub/Daily_Releases/Daily_Business/2011/ db0610/DOC-307454A1.txt ]||U.S. Government Report||||No
| Federal Communications Commission (FCC) ||2011-06-03||[ftp://ftp.fcc.gov/pub/Daily_Releases/Daily_Business/2011/ db0610/DOC-307454A1.txt FCC's Plan for Ensuring the Security of Telecommunications Networks ]||U.S. Government Report||||No
|-
|-
| National Science Foundation||2011-08-11||[http://www.livescience.com/15423-forefront-cyber-security-research-nsf-bts.html At the Forefront of Cyber Security Research ]||U.S. Government Report||5.7 [[Technology]]||No
| National Science Foundation||2011-08-11||[http://www.livescience.com/15423-forefront-cyber-security-research-nsf-bts.html At the Forefront of Cyber Security Research ]||U.S. Government Report||5.7 [[Technology]]||No
Line 553: Line 553:
| Department of Homeland Security||2007-06||[http://www.oig.dhs.gov/assets/Mgmt/OIG_07-48_Jun07.pdf Challenges Remain in Securing the Nation’s Cyber Infrastructure]||U.S. Government Report||4.6 [[Information Sharing]],<br>4.7 [[Public-Private Cooperation]],<br>5.3 [[Government Organizations]]||No
| Department of Homeland Security||2007-06||[http://www.oig.dhs.gov/assets/Mgmt/OIG_07-48_Jun07.pdf Challenges Remain in Securing the Nation’s Cyber Infrastructure]||U.S. Government Report||4.6 [[Information Sharing]],<br>4.7 [[Public-Private Cooperation]],<br>5.3 [[Government Organizations]]||No
|-
|-
| White House||2009--||[http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure]||U.S. Government Report||1. [[Overview]],<br>4.7 [[Public-Private Cooperation]]||No
| White House||2009||[http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure]||U.S. Government Report||1. [[Overview]],<br>4.7 [[Public-Private Cooperation]]||No
|-
|-
| Department of Homeland Security||2009-11||[http://www.cyber.st.dhs.gov/docs/DHS-Cybersecurity-Roadmap.pdf A Roadmap for Cybersecurity Research]||U.S. Government Report||1. [[Overview]],<br>4.2.1 [[Risk management and Investment]]||No
| Department of Homeland Security||2009-11||[http://www.cyber.st.dhs.gov/docs/DHS-Cybersecurity-Roadmap.pdf A Roadmap for Cybersecurity Research]||U.S. Government Report||1. [[Overview]],<br>4.2.1 [[Risk management and Investment]]||No
Line 697: Line 697:
| NIST ||2012-02-17||[http://www.nist.gov/nstic/2012-nstic-governance-recs.pdf Recommendations for Establishing an Identity Ecosystem Governance Structure for the National Strategy for Trusted Identities in Cyberspace ]||U.S. Government Report ||4.7 [[Public-Private Cooperation]],<br>4.9 [[Identity Management]],<br>5.3 [[Government Organizations]]||No
| NIST ||2012-02-17||[http://www.nist.gov/nstic/2012-nstic-governance-recs.pdf Recommendations for Establishing an Identity Ecosystem Governance Structure for the National Strategy for Trusted Identities in Cyberspace ]||U.S. Government Report ||4.7 [[Public-Private Cooperation]],<br>4.9 [[Identity Management]],<br>5.3 [[Government Organizations]]||No
|-
|-
| President's Commission on Critical Infrastructure Protection ||1997--||[[Critical_Foundations|Critical Foundations ]]||U.S. Government Report ||3.3.2 [[Private Critical Infrastructure]],<br>3.3.3 [[Communications]],<br>5.3 [[Government Organizations]]||Yes
| President's Commission on Critical Infrastructure Protection ||1997||[[Critical_Foundations|Critical Foundations ]]||U.S. Government Report ||3.3.2 [[Private Critical Infrastructure]],<br>3.3.3 [[Communications]],<br>5.3 [[Government Organizations]]||Yes
|-
|-
| Department of Defense ||1999--||[[An_Assessment_of_International_Legal_Issues_in_Information_Operations|An Assessment of International Legal Issues in Information Operations ]]||U.S. Government Report ||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes
| Department of Defense ||1999||[[An_Assessment_of_International_Legal_Issues_in_Information_Operations|An Assessment of International Legal Issues in Information Operations ]]||U.S. Government Report ||3.2.1 [[States]],<br>4.12 [[Cyberwar]],<br>5.5 [[International Law (including Laws of War)]]||Yes
|-
|-
| Department of Homeland Security ||2003--||[[The_National_Strategy_for_the_Physical_Protection_of_Critical_Infrastructures_and_Key_Assets|The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets ]]||U.S. Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>3.3.2 [[Private Critical Infrastructure]],<br>5.3 [[Government Organizations]]||Yes
| Department of Homeland Security ||2003||[[The_National_Strategy_for_the_Physical_Protection_of_Critical_Infrastructures_and_Key_Assets|The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets ]]||U.S. Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>3.3.2 [[Private Critical Infrastructure]],<br>5.3 [[Government Organizations]]||Yes
|-
|-
| White House ||2003--||[[The_National_Strategy_to_Secure_Cyberspace|The National Strategy to Secure Cyberspace ]]||U.S. Government Report ||4.7 [[Public-Private Cooperation]],<br>5.3 [[Government Organizations]],<br>5.4 [[International Cooperations]]||Yes
| White House ||2003||[[The_National_Strategy_to_Secure_Cyberspace|The National Strategy to Secure Cyberspace ]]||U.S. Government Report ||4.7 [[Public-Private Cooperation]],<br>5.3 [[Government Organizations]],<br>5.4 [[International Cooperations]]||Yes
|-
|-
| National Infrastructure Advisory Council ||2004--||[[Hardening_The_Internet|Hardening The Internet ]]||U.S. Government Report ||3.3 [[Security Targets]],<br>4.7 [[Public-Private Cooperation]],<br>5.3 [[Government Organizations]]||Yes
| National Infrastructure Advisory Council ||2004||[[Hardening_The_Internet|Hardening The Internet ]]||U.S. Government Report ||3.3 [[Security Targets]],<br>4.7 [[Public-Private Cooperation]],<br>5.3 [[Government Organizations]]||Yes
|-
|-
| National Cyber Security Summit Task Force ||2004--||[[Information_Security_Governance|Information Security Governance ]]||U.S. Government Report ||4.7 [[Public-Private Cooperation]],<br>5.2 [[Private Efforts/Organizations]],<br>5.3 [[government Organizations]]||Yes
| National Cyber Security Summit Task Force ||2004||[[Information_Security_Governance|Information Security Governance ]]||U.S. Government Report ||4.7 [[Public-Private Cooperation]],<br>5.2 [[Private Efforts/Organizations]],<br>5.3 [[government Organizations]]||Yes
|-
|-
| United States Secret Service ||2004--||[[Insider_Threat_Study|Insider Threat Study ]]||U.S. Government Report ||3.3.2.2 [[Financial Institutions and Networks]],<br>4.2.2 [[Incentives]],<br>4.4 [[Usability/Human Factor]]||Yes
| United States Secret Service ||2004||[[Insider_Threat_Study|Insider Threat Study ]]||U.S. Government Report ||3.3.2.2 [[Financial Institutions and Networks]],<br>4.2.2 [[Incentives]],<br>4.4 [[Usability/Human Factor]]||Yes
|-
|-
| Department of Defense ||2005-||[[Strategy_for_Homeland_Defense_and_Civil_Support|Strategy for Homeland Defense and Civil Support ]]||U.S. Government Report ||3.2.4 [[Terrorists]],<br>3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]]||Yes
| Department of Defense ||2005-||[[Strategy_for_Homeland_Defense_and_Civil_Support|Strategy for Homeland Defense and Civil Support ]]||U.S. Government Report ||3.2.4 [[Terrorists]],<br>3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]]||Yes
|-
|-
| President's Information Technology Advisory Council ||2005--||[[Cyber_Security:_A_Crisis_of_Prioritization|Cyber Security: A Crisis of Prioritization ]]||U.S. Government Report ||4.2.2 [[Incentives]],<br>4.7 [[Public-Private Cooperation]],<br>5.3 [[Government Organizations]]||Yes
| President's Information Technology Advisory Council ||2005||[[Cyber_Security:_A_Crisis_of_Prioritization|Cyber Security: A Crisis of Prioritization ]]||U.S. Government Report ||4.2.2 [[Incentives]],<br>4.7 [[Public-Private Cooperation]],<br>5.3 [[Government Organizations]]||Yes
|-
|-
| Deputy Chief of Staff for Intelligence ||2006--||[[Critical_Infrastructure_Threats_and_Terrorism|Critical Infrastructure Threats and Terrorism ]]||U.S. Government Report ||3.3 [[Security Targets]],<br>4.11 [[Cybercrime]],<br>4.12 [[Cyberwar]]||Yes
| Deputy Chief of Staff for Intelligence ||2006||[[Critical_Infrastructure_Threats_and_Terrorism|Critical Infrastructure Threats and Terrorism ]]||U.S. Government Report ||3.3 [[Security Targets]],<br>4.11 [[Cybercrime]],<br>4.12 [[Cyberwar]]||Yes
|-
|-
| National Science and Technology Council ||2006--||[[Federal_Plan_for_Cyber_Security_and_Information_Assurance_Research_and_Development|Federal Plan for Cyber Security and Information Assurance Research and Development ]]||U.S. Government Report ||4.1 [[Metrics]],<br>4.7 [[Attribution]],<br>4.8 [[Public-Private Cooperation]]||Yes
| National Science and Technology Council ||2006||[[Federal_Plan_for_Cyber_Security_and_Information_Assurance_Research_and_Development|Federal Plan for Cyber Security and Information Assurance Research and Development ]]||U.S. Government Report ||4.1 [[Metrics]],<br>4.7 [[Attribution]],<br>4.8 [[Public-Private Cooperation]]||Yes
|-
|-
| National Institute of Standards and Technology ||2006--||[[SP_800-82:_Guide_to_Supervisory_Control_and_Data_Acquisition_(SCADA)_and_Industrial_Control_Systems_Security|SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security ]]||U.S. Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>.2.1 [[Risk Management and Investment]],<br>5.2 [[Private Efforts/Organizations]]||Yes
| National Institute of Standards and Technology ||2006||[[SP_800-82:_Guide_to_Supervisory_Control_and_Data_Acquisition_(SCADA)_and_Industrial_Control_Systems_Security|SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security ]]||U.S. Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>.2.1 [[Risk Management and Investment]],<br>5.2 [[Private Efforts/Organizations]]||Yes
|-
|-
| Department of Defense ||2007--||[[Mission_Impact_of_Foreign_Influence_on_DoD_Software|Mission Impact of Foreign Influence on DoD Software ]]||U.S. Government Report ||3.2.4 [[Terrorists]],<br>3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]]||Yes
| Department of Defense ||2007||[[Mission_Impact_of_Foreign_Influence_on_DoD_Software|Mission Impact of Foreign Influence on DoD Software ]]||U.S. Government Report ||3.2.4 [[Terrorists]],<br>3.3.1 [[Public Critical Infrastructure]],<br>5.3 [[Government Organizations]]||Yes
|-
|-
| Department of Homeland Security ||2009--||[[A_Roadmap_for_Cybersecurity_Research|A Roadmap for Cybersecurity Research ]]||U.S. Government Report ||3.3 [[Security Targets]],<br>5.3 [[Government Organizations]]||Yes
| Department of Homeland Security ||2009||[[A_Roadmap_for_Cybersecurity_Research|A Roadmap for Cybersecurity Research ]]||U.S. Government Report ||3.3 [[Security Targets]],<br>5.3 [[Government Organizations]]||Yes
|-
|-
| White House ||2009--||[[Cyberspace_Policy_Review|Cyberspace Policy Review ]]||U.S. Government Report ||4.7 [[Public-Private Cooperation]],<br>5.2 [[Private Efforts/Organizations]],<br>5.3 [[Government Organizations]]||Yes
| White House ||2009||[[Cyberspace_Policy_Review|Cyberspace Policy Review ]]||U.S. Government Report ||4.7 [[Public-Private Cooperation]],<br>5.2 [[Private Efforts/Organizations]],<br>5.3 [[Government Organizations]]||Yes
|-
|-
| Networking and Information Technology Research and Development ||2009--||[[National_Cyber_Leap_Year_Summit_2009,_Co-Chairs%27_Report|National Cyber Leap Year Summit 2009, Co-Chairs' Report ]]||U.S. Government Report ||4.6 [[Information Sharing/Disclosure]],<br>4.9 [[Identity Management]],<br>5.7 [[Technology]]||Yes
| Networking and Information Technology Research and Development ||2009||[[National_Cyber_Leap_Year_Summit_2009,_Co-Chairs%27_Report|National Cyber Leap Year Summit 2009, Co-Chairs' Report ]]||U.S. Government Report ||4.6 [[Information Sharing/Disclosure]],<br>4.9 [[Identity Management]],<br>5.7 [[Technology]]||Yes
|-
|-
| Department of Commerce ||2010--||[[Defense_Industrial_Base_Assessment|Defense Industrial Base Assessment ]]||U.S. Government Report ||3.2.5 [[Criminals and Criminal Organizations]],<br>3.3.1 [[Public Critical Infrastructure]],<br>4.7 [[Public-Private Cooperation]]||Yes
| Department of Commerce ||2010||[[Defense_Industrial_Base_Assessment|Defense Industrial Base Assessment ]]||U.S. Government Report ||3.2.5 [[Criminals and Criminal Organizations]],<br>3.3.1 [[Public Critical Infrastructure]],<br>4.7 [[Public-Private Cooperation]]||Yes
|-
|-
| White House ||2010--||[[The_Comprehensive_National_Cybersecurity_Initiative|The Comprehensive National Cybersecurity Initiative ]]||U.S. Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>3.3.2 [[Private Critical Infrastructure]],<br>5.3 [[Government Organizations]]||Yes
| White House ||2010||[[The_Comprehensive_National_Cybersecurity_Initiative|The Comprehensive National Cybersecurity Initiative ]]||U.S. Government Report ||3.3.1 [[Public Critical Infrastructure]],<br>3.3.2 [[Private Critical Infrastructure]],<br>5.3 [[Government Organizations]]||Yes
|-
|-
| U.S. Deputy Secretary of Defense, William J. Lynn (Foreign Affairs) ||2010-009||[http://www.foreignaffairs.com/articles/66552/william-j-lynn-iii/defending-a-new-domain Defending a New Domain ]||U.S. Government Report ||||No
| U.S. Deputy Secretary of Defense, William J. Lynn (Foreign Affairs) ||2010-009||[http://www.foreignaffairs.com/articles/66552/william-j-lynn-iii/defending-a-new-domain Defending a New Domain ]||U.S. Government Report ||||No

Revision as of 17:45, 2 August 2012

Types
U.S. Government Report
U.S. Government Hearing
Non-U.S. Government Report
Independent Report
Industry Report
Book
Journal Article
Article
Categories
Exclude Subcatgeories
Search
Help