Government Reports and Documents: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 1: Line 1:
Center for Strategic and International Studies ''(2008)'' [[Securing Cyberspace for the 44th Presidency]]


Committee on Improving Cybersecurity Research in the United States, National Research Council ''(2007)'' [[Toward a Safer and More Secure Cyberspace]]


Committee on Information Systems Trustworthiness, National Research Council ''(1999)'' [[Trust in Cyberspace]]


Computing Research Association ''(2003)'' [[Four Grand Challenges in Trustworthy Computing]]


Department of Defense ''(2007)'' [[Mission Impact of Foreign Influence on DoD Software]]


Department of Energy ''(2006)'' [[Roadmap to Secure Control Systems in the Energy Sector]]


Department of Homeland Security Science and Technology Directorate ''(2009)'' [[A Roadmap for Cybersecurity Research]]


Financial Services Sector Coordinating Council for Critical Infrastructure Protection ''(2008)'' [[Research Agenda for the Banking and Finance Sector]]


Center for Strategic and International Studies ''(2008)'' [[Securing Cyberspace for the 44th Presidency]]
Committee on Improving Cybersecurity Research in the United States, National Research Council ''(2007)'' [[Toward a Safer and More Secure Cyberspace]]
Committee on Information Systems Trustworthiness, National Research Council ''(1999)'' [[Trust in Cyberspace]]
Computing Research Association ''(2003)'' [[Four Grand Challenges in Trustworthy Computing]]
Department of Defense ''(2007)'' [[Mission Impact of Foreign Influence on DoD Software]]
Department of Energy ''(2006)'' [[Roadmap to Secure Control Systems in the Energy Sector]]
Department of Homeland Security Science and Technology Directorate ''(2009)'' [[A Roadmap for Cybersecurity Research]]
Financial Services Sector Coordinating Council for Critical Infrastructure Protection ''(2008)'' [[Research Agenda for the Banking and Finance Sector]]
INFOSEC Research Council ''(2005)'' [[Hard Problem List]]
INFOSEC Research Council ''(2005)'' [[Hard Problem List]]
Institute for Information Infrastructure Protection ''(2003)'' [[Cyber Security Research and Development Agenda]]
Institute for Information Infrastructure Protection ''(2003)'' [[Cyber Security Research and Development Agenda]]
National Cyber Defense Initiative ''(2009)'' [[National Cyber Defense Financial Services Workshop Report]]
National Cyber Defense Initiative ''(2009)'' [[National Cyber Defense Financial Services Workshop Report]]
National Cyber Security Summit Task Force ''(2004)'' [[Information Security Governance]]
National Cyber Security Summit Task Force ''(2004)'' [[Information Security Governance]]
National Infrastructure Advisory Council ''(2004)'' [[Hardening The Internet]]
National Infrastructure Advisory Council ''(2004)'' [[Hardening The Internet]]
National Institute of Standards and Technology ''(2006)'' [[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]
National Institute of Standards and Technology ''(2006)'' [[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]
National Science and Technology Council ''(2006)'' [[Federal Plan for Cyber Security and Information Assurance Research and Development]]
National Science and Technology Council ''(2006)'' [[Federal Plan for Cyber Security and Information Assurance Research and Development]]
Networking and Information Technology Research and Development ''(2009)'' [[National Cyber Leap Year Summit 2009, Co-Chairs' Report]]
Networking and Information Technology Research and Development ''(2009)'' [[National Cyber Leap Year Summit 2009, Co-Chairs' Report]]
President's Commission on Critical Infrastructure Protection ''(1997)'' [[Critical Foundations]]
President's Commission on Critical Infrastructure Protection ''(1997)'' [[Critical Foundations]]
President's Information Technology Advisory Council ''(2005)'' [[Cyber Security: A Crisis of Prioritization]]
President's Information Technology Advisory Council ''(2005)'' [[Cyber Security: A Crisis of Prioritization]]
United States Secret Service ''(2004)'' [[Insider Threat Study]]
United States Secret Service ''(2004)'' [[Insider Threat Study]]
White House ''(2003)'' [[The National Strategy to Secure Cyberspace]]
White House ''(2003)'' [[The National Strategy to Secure Cyberspace]]
White House ''(2009)'' [[Cyberspace Policy Review]]
White House ''(2009)'' [[Cyberspace Policy Review]]
White House ''(2010)'' [[The Comprehensive National Cybersecurity Initiative]]
White House ''(2010)'' [[The Comprehensive National Cybersecurity Initiative]]

Revision as of 16:31, 9 June 2010

Center for Strategic and International Studies (2008) Securing Cyberspace for the 44th Presidency

Committee on Improving Cybersecurity Research in the United States, National Research Council (2007) Toward a Safer and More Secure Cyberspace

Committee on Information Systems Trustworthiness, National Research Council (1999) Trust in Cyberspace

Computing Research Association (2003) Four Grand Challenges in Trustworthy Computing

Department of Defense (2007) Mission Impact of Foreign Influence on DoD Software

Department of Energy (2006) Roadmap to Secure Control Systems in the Energy Sector

Department of Homeland Security Science and Technology Directorate (2009) A Roadmap for Cybersecurity Research

Financial Services Sector Coordinating Council for Critical Infrastructure Protection (2008) Research Agenda for the Banking and Finance Sector

INFOSEC Research Council (2005) Hard Problem List Institute for Information Infrastructure Protection (2003) Cyber Security Research and Development Agenda

National Cyber Defense Initiative (2009) National Cyber Defense Financial Services Workshop Report

National Cyber Security Summit Task Force (2004) Information Security Governance

National Infrastructure Advisory Council (2004) Hardening The Internet

National Institute of Standards and Technology (2006) SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security

National Science and Technology Council (2006) Federal Plan for Cyber Security and Information Assurance Research and Development

Networking and Information Technology Research and Development (2009) National Cyber Leap Year Summit 2009, Co-Chairs' Report

President's Commission on Critical Infrastructure Protection (1997) Critical Foundations

President's Information Technology Advisory Council (2005) Cyber Security: A Crisis of Prioritization

United States Secret Service (2004) Insider Threat Study

White House (2003) The National Strategy to Secure Cyberspace

White House (2009) Cyberspace Policy Review

White House (2010) The Comprehensive National Cybersecurity Initiative