Financial Institutions and Networks: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
 
(11 intermediate revisions by 2 users not shown)
Line 1: Line 1:
''[[Table of Contents | TOC->]][[Threats and Actors | Threats and Actors->]][[Security Targets | Security Targets->]][[Private Critical Infrastructure | Private Critical Infrastructure->]][[Financial Institutions and Networks]]''
''[[Table of Contents | TOC->]][[Threats and Actors | Threats and Actors->]][[Security Targets | Security Targets->]][[Private Critical Infrastructure | Private Critical Infrastructure->]][[Financial Institutions and Networks]]''


Epstein, Richard A. and Brown, Thomas P. (2008) [[Cybersecurity in the Payment Card Industry]]
{{Filtered_Table||3.3.2.2,false}}


Moore, Tyler and Clayton, Richard  (2008) [[The Consequence of Non-Cooperation in the Fight Against Phishing]]
Moore, Tyler and Clayton, Richard (2009) [[The Impact of Incentives on Notice and Take-down]]
Moore, Tyler, et. al (2009) [[The Economics of Online Crime]]
Powell, Benjamin  (2005)  [[Is Cybersecurity a Public Good]]
Symantec Corporation (2010) [[Symantec Global Internet Security Threat Report]]
Thomas, Rob and Martin, Jerry (2006) [[The Underground Economy]]
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
|-
! style="background-color: #efefef;" | Author 1
! style="background-color: #efefef;" | Author 2
! style="background-color: #efefef;" | Year
! style="background-color: #efefef;" | Title
! style="background-color: #efefef;" | Source
! style="background-color: #efefef;" | Expertise
! style="background-color: #efefef;" class="unsortable" | Full Text 
|-
|Anderson, Ross J.||||2008||[[Security Engineering]]||Book||Moderate:Technology; Moderate:Cryptography||N/A
|-
|Department of Homeland Security||||2003||[[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]||Government Report||None||[http://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf  ''Pdf'']
|-
|Deputy Chief of Staff for Intelligence||||2006||[[Critical Infrastructure Threats and Terrorism]]||Government Report||Low:Organizational Analysis; Low:Risk Management||[http://www.fas.org/irp/threat/terrorism/sup2.pdf  ''Pdf'']
|-
|Financial Services Sector Coordinating Council for Critical Infrastructure Protection||||2008||[[Research Agenda for the Banking and Finance Sector]]||Independent Reports||None||[http://www.cyber.st.dhs.gov/docs/RD_Agenda-FINAL.pdf ''Pdf'']
|-
|Johnson, Eric M.||||2008||[[Managing Information Risk and the Economics of Security]]||Book||High:Economics||N/A
|-
|McAfee, Inc.||||2010||[[McAfee Threats Report]]||Industry Report||None||[http://www.mcafee.com/us/local_content/reports/2010q1_threats_report.pdf ''Pdf'']
|-
|National Cyber Defense Initiative||||2009||[[National Cyber Defense Financial Services Workshop Report]]||Independent Report||Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance||[http://www.cyber.st.dhs.gov/docs/NCDI_FI_Workshop_Report.pdf ''Pdf'']
|-
|United States Secret Service||||2004||[[Insider Threat Study]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/its_report_040820.pdf ''Pdf'']
|}
*'''''Subcategories:''''' ''None''


''[[Table of Contents | Jump to Table of Contents]]''
''[[Table of Contents | Jump to Table of Contents]]''

Latest revision as of 16:37, 7 August 2012

TOC-> Threats and Actors-> Security Targets-> Private Critical Infrastructure->Financial Institutions and Networks

Types
U.S. Government Report
U.S. Government Hearing
Non-U.S. Government Report
Independent Report
Industry Report
Book
Journal Article
Article
Categories
Exclude Subcatgeories
Search
Help


Jump to Table of Contents