Threats and Actors: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
(Replaced content with "'' TOC->Threats and Actors'' {{Filtered_Table||3,false}} '' Jump to Table of Contents''")
 
(30 intermediate revisions by 4 users not shown)
Line 1: Line 1:
''[[Table of Contents | TOC->]][[Threats and Actors]]''
''[[Table of Contents | TOC->]][[Threats and Actors]]''


Anderson, Ross J. (2008) [[Security Engineering]]
{{Filtered_Table||3,false}}


Barkham, Jason (2001) [[Information Warfare and International Law on the Use of Force]]
Clarke, Richard A. and Knake, Robert  (2010)  [[Cyber War]]
Department of Defense ''(2005)'' [[Strategy for Homeland Defense and Civil Support]]
Department of Defense (2007) [[Mission Impact of Foreign Influence on DoD Software]]
Department of Homeland Security (2003) [[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]
Deputy Chief of Staff for Intelligence (2006) [[Critical Infrastructure Threats and Terrorism]]
Energetics Inc. (2006) [[Roadmap to Secure Control Systems in the Energy Sector]]
Epstein, Richard A. and Brown, Thomas P. (2008) [[Cybersecurity in the Payment Card Industry]]
Financial Services Sector Coordinating Council for Critical Infrastructure Protection (2008) [[Research Agenda for the Banking and Finance Sector]]
Franklin, Jason, et. al (2007) [[An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants]]
Grady, Mark F. and Parisi, Francesco (2006) [[The Law and Economics of Cybersecurity]]
Johnson, Eric M. (2008) [[Managing Information Risk and the Economics of Security]]
Johnson, Vincent R. (2005) [[Cybersecurity, Identity Theft, and the Limits of Tort Liability]]
Kramer, Franklin D., et. al (2009) [[Cyberpower and National Security]]
McAfee, Inc. (2010) [[McAfee Threats Report]]
Moore, Tyler and Clayton, Richard  (2007) [[Examining the Impact of Website Take-down on Phishing]]
Moore, Tyler and Clayton, Richard  (2008) [[The Consequence of Non-Cooperation in the Fight Against Phishing]]
Moore, Tyler, et. al (2009) [[The Economics of Online Crime]]
National Research Council (2007) [[Toward a Safer and More Secure Cyberspace]]
National Research Council (1999) [[Trust in Cyberspace]]
Nye, Joseph (2010) [[Cyber Power]]
Powell, Benjamin  (2005)  [[Is Cybersecurity a Public Good]]
Rotenberg et. al. (''2010'') [[The Cyber War Threat Has Been Grossly Exaggerated]]
Schneier, Bruce (2003) [[Beyond Fear]]
Schneier, Bruce (2008) [[Schneier on Security]]
Stohl, Michael ''(2006)'' [[Cyber Terrorism]]
Symantec Corporation (2010) [[Symantec Global Internet Security Threat Report]]
Thomas, Rob and Martin, Jerry (2006) [[The Underground Economy]]
Watts, Sean (2010) [[Combatant Status and Computer Network Attack]]


''[[Table of Contents | Jump to Table of Contents]]''
''[[Table of Contents | Jump to Table of Contents]]''

Latest revision as of 15:30, 7 August 2012

TOC->Threats and Actors

Types
U.S. Government Report
U.S. Government Hearing
Non-U.S. Government Report
Independent Report
Industry Report
Book
Journal Article
Article
Categories
Exclude Subcatgeories
Search
Help


Jump to Table of Contents