Government Reports and Documents: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 23: Line 23:
Department of Energy ''(2006)'' [[Roadmap to Secure Control Systems in the Energy Sector]]
Department of Energy ''(2006)'' [[Roadmap to Secure Control Systems in the Energy Sector]]


IRC ''(2005)'' [[Hard Problem List]]
INFOSEC Research Council ''(2005)'' [[Hard Problem List]]


PITAC ''(2005)'' [[Cyber Security: A Crisis of Prioritization]]
PITAC ''(2005)'' [[Cyber Security: A Crisis of Prioritization]]

Revision as of 14:48, 9 June 2010

Department of Homeland Security Science and Technology Directorate (2009) A Roadmap for Cybersecurity Research

White House (2010) The Comprehensive National Cybersecurity Initiative

National Cyber Defense Initiative (2009) National Cyber Defense Financial Services Workshop Report

Networking and Information Technology Research and Development (2009) National Cyber Leap Year Summit 2009, Co-Chairs' Report

White House (2009) Cyberspace Policy Review

Center for Strategic and International Studies (2008) Securing Cyberspace for the 44th Presidency

Financial Services Sector Coordinating Council for Critical Infrastructure Protection (2008) Research Agenda for the Banking and Finance Sector

Department of Defense (2007) Mission Impact of Foreign Influence on DoD Software

Committee on Improving Cybersecurity Research in the United States, National Research Council (2007) Toward a Safer and More Secure Cyberspace

National Institute of Standards and Technology (2006) SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security

National Science and Technology Council (2006) Federal Plan for Cyber Security and Information Assurance Research and Development

Department of Energy (2006) Roadmap to Secure Control Systems in the Energy Sector

INFOSEC Research Council (2005) Hard Problem List

PITAC (2005) Cyber Security: A Crisis of Prioritization

USSS (2004) Insider Threat Study

NIAC (2004) Hardening The Internet

Empty (2004) Information Security Governance

CRA (2003) Four Grand Challenges in Trustworthy Computing

White House (2003) The National Strategy to Secure Cyberspace

I3P (2003) Cyber Security Research and Development Agenda

NRC (1999) Trust in Cyberspace

PCCIP (1997) Critical Foundations