Security Targets: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
 
(7 intermediate revisions by 2 users not shown)
Line 1: Line 1:
''[[Table of Contents | TOC->]][[Threats and Actors | Threats and Actors->]][[Security Targets]]''
''[[Table of Contents | TOC->]][[Threats and Actors | Threats and Actors->]][[Security Targets]]''


Anderson, Ross J. (2008) [[Security Engineering]]
{{Filtered_Table||3.3,false}}


Brown, Davis  (2006) [[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]
Department of Commerce (2010) [[Defense Industrial Base Assessment]]
Department of Defense ''(2005)'' [[Strategy for Homeland Defense and Civil Support]]
Department of Defense (2007) [[Mission Impact of Foreign Influence on DoD Software]]
Department of Homeland Security (2003) [[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]
Energetics Inc. (2006) [[Roadmap to Secure Control Systems in the Energy Sector]]
Epstein, Richard A. and Brown, Thomas P. (2008) [[Cybersecurity in the Payment Card Industry]]
Financial Services Sector Coordinating Council for Critical Infrastructure Protection (2008) [[Research Agenda for the Banking and Finance Sector]]
Johnson, Eric M. (2008) [[Managing Information Risk and the Economics of Security]]
Kramer, Franklin D., et. al (2009) [[Cyberpower and National Security]]
McAfee, Inc. (2010) [[McAfee Threats Report]]
Moore, Tyler and Clayton, Richard  (2008) [[The Consequence of Non-Cooperation in the Fight Against Phishing]]
Moore, Tyler and Clayton, Richard (2009) [[The Impact of Incentives on Notice and Take-down]]
Moore, Tyler, et. al (2009) [[The Economics of Online Crime]]
National Cyber Security Summit Task Force (2004) [[Information Security Governance]]
National Institute of Standards and Technology (2006) [[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]
National Research Council (2007) [[Toward a Safer and More Secure Cyberspace]]
National Research Council (1999) [[Trust in Cyberspace]]
Powell, Benjamin  (2005)  [[Is Cybersecurity a Public Good]]
Schneier, Bruce (2003) [[Beyond Fear]]
Symantec Corporation (2010) [[Symantec Global Internet Security Threat Report]]
Thomas, Rob and Martin, Jerry (2006) [[The Underground Economy]]
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
|-
! style="background-color: #efefef;" | Author 1
! style="background-color: #efefef;" | Author 2
! style="background-color: #efefef;" | Year
! style="background-color: #efefef;" | Title
! style="background-color: #efefef;" | Source
! style="background-color: #efefef;" | Expertise
! style="background-color: #efefef;" class="unsortable" | Full Text 
|-
|Clarke, Richard A.||Knake, Robert||2010||[[Cyber War]]||Book||None||N/A
|-
|Deputy Chief of Staff for Intelligence||||2006||[[Critical Infrastructure Threats and Terrorism]]||Government Report||Low:Organizational Analysis; Low:Risk Management||[http://www.fas.org/irp/threat/terrorism/sup2.pdf  ''Pdf'']
|-
|Moore, Tyler||Clayton, Richard||2007||[[Examining the Impact of Website Take-down on Phishing]]||Conference Paper||Low:Technology||[http://www.ecrimeresearch.org/2007/proceedings/p1_moore.pdf ''Pdf''] [http://www.cl.cam.ac.uk/~rnc1/ecrime07.pdf  ''Alt Pdf'']
|}
'''''Subcategories:'''''
*''[[Security Targets | Security Targets->]][[Public Critical Infrastructure | Public Critical Infrastructure->]][[Military Networks (.mil)]]''
*''[[Security Targets | Security Targets->]][[Public Critical Infrastructure | Public Critical Infrastructure->]][[Military Networks (.mil)]]''
*''[[Security Targets | Security Targets->]][[Private Critical Infrastructure | Private Critical Infrastructure->]][[Electricity, Oil and Natural Gas]]''
*''[[Security Targets | Security Targets->]][[Private Critical Infrastructure | Private Critical Infrastructure->]][[Financial Institutions and Networks]]''
*''[[Security Targets | Security Targets->]][[Private Critical Infrastructure | Private Critical Infrastructure->]][[Transportation]]''
*''[[Security Targets | Security Targets->]][[Private Critical Infrastructure | Private Critical Infrastructure->]][[Water, Sewer, etc.]]''
*''[[Security Targets | Security Targets->]][[Communications | Communications->]][[Telephone]]''
*''[[Security Targets | Security Targets->]][[Communications | Communications->]][[Public Data Networks]]''
*''[[Security Targets | Security Targets->]][[Communications | Communications->]][[Cloud Computing]]''


''[[Table of Contents | Jump to Table of Contents]]''
''[[Table of Contents | Jump to Table of Contents]]''

Latest revision as of 16:34, 7 August 2012

TOC-> Threats and Actors->Security Targets

Types
U.S. Government Report
U.S. Government Hearing
Non-U.S. Government Report
Independent Report
Industry Report
Book
Journal Article
Article
Categories
Exclude Subcatgeories
Search
Help


Jump to Table of Contents