Government Reports and Documents: Difference between revisions
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
Center for Strategic and International Studies ''(2008)'' [[Securing Cyberspace for the 44th Presidency]] | |||
Committee on Improving Cybersecurity Research in the United States, National Research Council ''(2007)'' [[Toward a Safer and More Secure Cyberspace]] | |||
Committee on Information Systems Trustworthiness, National Research Council ''(1999)'' [[Trust in Cyberspace]] | |||
Computing Research Association ''(2003)'' [[Four Grand Challenges in Trustworthy Computing]] | |||
Department of Defense ''(2007)'' [[Mission Impact of Foreign Influence on DoD Software]] | |||
Department of Energy ''(2006)'' [[Roadmap to Secure Control Systems in the Energy Sector]] | |||
Department of Homeland Security Science and Technology Directorate ''(2009)'' [[A Roadmap for Cybersecurity Research]] | |||
Financial Services Sector Coordinating Council for Critical Infrastructure Protection ''(2008)'' [[Research Agenda for the Banking and Finance Sector]] | |||
INFOSEC Research Council ''(2005)'' [[Hard Problem List]] | INFOSEC Research Council ''(2005)'' [[Hard Problem List]] | ||
Institute for Information Infrastructure Protection ''(2003)'' [[Cyber Security Research and Development Agenda]] | Institute for Information Infrastructure Protection ''(2003)'' [[Cyber Security Research and Development Agenda]] | ||
National Cyber Defense Initiative ''(2009)'' [[National Cyber Defense Financial Services Workshop Report]] | National Cyber Defense Initiative ''(2009)'' [[National Cyber Defense Financial Services Workshop Report]] | ||
National Cyber Security Summit Task Force ''(2004)'' [[Information Security Governance]] | National Cyber Security Summit Task Force ''(2004)'' [[Information Security Governance]] | ||
National Infrastructure Advisory Council ''(2004)'' [[Hardening The Internet]] | National Infrastructure Advisory Council ''(2004)'' [[Hardening The Internet]] | ||
National Institute of Standards and Technology ''(2006)'' [[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]] | National Institute of Standards and Technology ''(2006)'' [[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]] | ||
National Science and Technology Council ''(2006)'' [[Federal Plan for Cyber Security and Information Assurance Research and Development]] | National Science and Technology Council ''(2006)'' [[Federal Plan for Cyber Security and Information Assurance Research and Development]] | ||
Networking and Information Technology Research and Development ''(2009)'' [[National Cyber Leap Year Summit 2009, Co-Chairs' Report]] | Networking and Information Technology Research and Development ''(2009)'' [[National Cyber Leap Year Summit 2009, Co-Chairs' Report]] | ||
President's Commission on Critical Infrastructure Protection ''(1997)'' [[Critical Foundations]] | President's Commission on Critical Infrastructure Protection ''(1997)'' [[Critical Foundations]] | ||
President's Information Technology Advisory Council ''(2005)'' [[Cyber Security: A Crisis of Prioritization]] | President's Information Technology Advisory Council ''(2005)'' [[Cyber Security: A Crisis of Prioritization]] | ||
United States Secret Service ''(2004)'' [[Insider Threat Study]] | United States Secret Service ''(2004)'' [[Insider Threat Study]] | ||
White House ''(2003)'' [[The National Strategy to Secure Cyberspace]] | White House ''(2003)'' [[The National Strategy to Secure Cyberspace]] | ||
White House ''(2009)'' [[Cyberspace Policy Review]] | White House ''(2009)'' [[Cyberspace Policy Review]] | ||
White House ''(2010)'' [[The Comprehensive National Cybersecurity Initiative]] | White House ''(2010)'' [[The Comprehensive National Cybersecurity Initiative]] |
Revision as of 16:31, 9 June 2010
Center for Strategic and International Studies (2008) Securing Cyberspace for the 44th Presidency
Committee on Improving Cybersecurity Research in the United States, National Research Council (2007) Toward a Safer and More Secure Cyberspace
Committee on Information Systems Trustworthiness, National Research Council (1999) Trust in Cyberspace
Computing Research Association (2003) Four Grand Challenges in Trustworthy Computing
Department of Defense (2007) Mission Impact of Foreign Influence on DoD Software
Department of Energy (2006) Roadmap to Secure Control Systems in the Energy Sector
Department of Homeland Security Science and Technology Directorate (2009) A Roadmap for Cybersecurity Research
Financial Services Sector Coordinating Council for Critical Infrastructure Protection (2008) Research Agenda for the Banking and Finance Sector
INFOSEC Research Council (2005) Hard Problem List Institute for Information Infrastructure Protection (2003) Cyber Security Research and Development Agenda
National Cyber Defense Initiative (2009) National Cyber Defense Financial Services Workshop Report
National Cyber Security Summit Task Force (2004) Information Security Governance
National Infrastructure Advisory Council (2004) Hardening The Internet
National Institute of Standards and Technology (2006) SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security
National Science and Technology Council (2006) Federal Plan for Cyber Security and Information Assurance Research and Development
Networking and Information Technology Research and Development (2009) National Cyber Leap Year Summit 2009, Co-Chairs' Report
President's Commission on Critical Infrastructure Protection (1997) Critical Foundations
President's Information Technology Advisory Council (2005) Cyber Security: A Crisis of Prioritization
United States Secret Service (2004) Insider Threat Study
White House (2003) The National Strategy to Secure Cyberspace
White House (2009) Cyberspace Policy Review
White House (2010) The Comprehensive National Cybersecurity Initiative