Private Efforts/Organizations: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
 
(11 intermediate revisions by 2 users not shown)
Line 1: Line 1:
''[[Table of Contents | TOC->]][[Approaches | Approaches->]][[Private Efforts/Organizations]]''
''[[Table of Contents | TOC->]][[Approaches | Approaches->]][[Private Efforts/Organizations]]''


Bohme, Rainer and Kataria, Gaurav (2006) [[Models and Measures for Correlation in Cyber-Insurance]]
{{Filtered_Table||5.2,false}}


Bohme, Rainer and Schwartz, Galina (2010) [[Modeling Cyber-Insurance]]
Clinton, Larry (Undated) [[Cyber-Insurance Metrics and Impact on Cyber-Security]]
Moore, Tyler and Clayton, Richard (2009) [[The Impact of Incentives on Notice and Take-down]]
National Cyber Defense Initiative (2009) [[National Cyber Defense Financial Services Workshop Report]]
White House (2009) [[Cyberspace Policy Review]]
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
|-
! style="background-color: #efefef;" | Author 1
! style="background-color: #efefef;" | Author 2
! style="background-color: #efefef;" | Year
! style="background-color: #efefef;" | Title
! style="background-color: #efefef;" | Source
! style="background-color: #efefef;" | Expertise
! style="background-color: #efefef;" class="unsortable" | Full Text 
|-
|National Cyber Security Summit Task Force||||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf'']
|-
|National Infrastructure Advisory Council||||2004||[[Hardening The Internet]]||Government Report||High:Technology||[http://www.cyber.st.dhs.gov/docs/NIAC%20Internet%20Hardening.pdf  ''Pdf'']
|-
|National Institute of Standards and Technology||||2006||[[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]||Government Report||Moderate:Technology||[http://www.cyber.st.dhs.gov/docs/NIST%20Guide%20to%20Supervisory%20and%20Data%20Acquisition-SCADA%20and%20Industrial%20Control%20Systems%20Security%20(2007).pdf ''Pdf'']
|}
*'''''Subcategories:''''' ''None''


''[[Table of Contents | Jump to Table of Contents]]''
''[[Table of Contents | Jump to Table of Contents]]''

Latest revision as of 16:50, 7 August 2012

TOC-> Approaches->Private Efforts/Organizations

Types
U.S. Government Report
U.S. Government Hearing
Non-U.S. Government Report
Independent Report
Industry Report
Book
Journal Article
Article
Categories
Exclude Subcatgeories
Search
Help


Jump to Table of Contents