US Government Reports and Documents: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
 
(19 intermediate revisions by 2 users not shown)
Line 1: Line 1:
''[[Table of Contents | TOC->]][[Resource by Type | Resource by Type->]][[Government Reports and Documents | Government Reports and Documents->]][[US Government Reports and Documents]]''
''[[Table of Contents | TOC->]][[Resource by Type | Resource by Type->]][[Government Reports and Documents | Government Reports and Documents->]][[US Government Reports and Documents]]''


Department of Defense (2007) [[Mission Impact of Foreign Influence on DoD Software]]
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
 
|-
Department of Defense (2005) [[Strategy for Homeland Defense and Civil Support]]
! style="background-color: #efefef;" | Author/Agency
 
! style="background-color: #efefef;" | Year
Department of Homeland Security (2009) [[A Roadmap for Cybersecurity Research]]
! style="background-color: #efefef;" | Title
 
! style="background-color: #efefef;" | Source
Department of Homeland Security (2003) [[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]
! style="background-color: #efefef;" | Expertise
 
! style="background-color: #efefef;" class="unsortable" | Full Text 
Deputy Chief of Staff for Intelligence (2006) [[Critical Infrastructure Threats and Terrorism]]
|-
 
|Department of Commerce||2010||[[Defense Industrial Base Assessment]]||Government Report||None||[http://www.bis.doc.gov/defenseindustrialbaseprograms/osies/defmarketresearchrpts/final_counterfeit_electronics_report.pdf  ''Pdf'']
National Cyber Defense Initiative (2009) [[National Cyber Defense Financial Services Workshop Report]]
|-
 
|Department of Defense||1999||[[An Assessment of International Legal Issues in Information Operations]]||Government Report||Moderate:Law||[http://www.au.af.mil/au/awc/awcgate/dod-io-legal/dod-io-legal.pdf '' Pdf'']
National Cyber Security Summit Task Force (2004) [[Information Security Governance]]
|-
 
|Department of Defense||2007||[[Mission Impact of Foreign Influence on DoD Software]]||Government Report||Low:Defense Policy/Procurement||[http://www.cyber.st.dhs.gov/docs/Defense%20Science%20Board%20Task%20Force%20-%20Report%20on%20Mission%20Impact%20of%20Foreign%20Influence%20on%20DoD%20Software%20(2007).pdf  ''Pdf'']
National Infrastructure Advisory Council ''(2004)'' [[Hardening The Internet]]
|-
 
|Department of Defense||2005||[[Strategy for Homeland Defense and Civil Support]]||Government Report||None||[http://www.defense.gov/news/Jun2005/d20050630homeland.pdf  ''Pdf'']
National Institute of Standards and Technology ''(2006)'' [[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]
|-
 
|Department of Homeland Security||2009||[[A Roadmap for Cybersecurity Research]]||Government Report||Low:Technology||[http://www.cyber.st.dhs.gov/docs/DHS-Cybersecurity-Roadmap.pdf  ''Pdf'']
National Science and Technology Council ''(2006)'' [[Federal Plan for Cyber Security and Information Assurance Research and Development]]
|-
 
|Department of Homeland Security||2003||[[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]||Government Report||None||[http://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf  ''Pdf'']
Networking and Information Technology Research and Development ''(2009)'' [[National Cyber Leap Year Summit 2009, Co-Chairs' Report]]
|-
 
|Deputy Chief of Staff for Intelligence||2006||[[Critical Infrastructure Threats and Terrorism]]||Government Report||Low:Organizational Analysis; Low:Risk Management||[http://www.fas.org/irp/threat/terrorism/sup2.pdf  ''Pdf'']
President's Commission on Critical Infrastructure Protection ''(1997)'' [[Critical Foundations]]
|-
 
|National Cyber Security Summit Task Force||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf'']
President's Information Technology Advisory Council ''(2005)'' [[Cyber Security: A Crisis of Prioritization]]
|-
 
|National Infrastructure Advisory Council||2004||[[Hardening The Internet]]||Government Report||High:Technology||[http://www.cyber.st.dhs.gov/docs/NIAC%20Internet%20Hardening.pdf  ''Pdf'']
United States Secret Service ''(2004)'' [[Insider Threat Study]]
|-
 
|National Institute of Standards and Technology||2006||[[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]||Government Report||Moderate:Technology||[http://www.cyber.st.dhs.gov/docs/NIST%20Guide%20to%20Supervisory%20and%20Data%20Acquisition-SCADA%20and%20Industrial%20Control%20Systems%20Security%20(2007).pdf ''Pdf'']
White House ''(2003)'' [[The National Strategy to Secure Cyberspace]]
|-
 
|National Science and Technology Council||2006||[[Federal Plan for Cyber Security and Information Assurance Research and Development]]||Government Report||Low:Technology||[http://www.cyber.st.dhs.gov/docs/Federal%20R&D%20Plan%202006.pdf ''Pdf'']
White House ''(2009)'' [[Cyberspace Policy Review]]
|-
 
|Networking and Information Technology Research and Development||2009||[[National Cyber Leap Year Summit 2009, Co-Chairs' Report]]||Government Report||Low:Technology||[http://www.cyber.st.dhs.gov/docs/National_Cyber_Leap_Year_Summit_2009_Co-Chairs_Report.pdf ''Pdf'']
White House ''(2010)'' [[The Comprehensive National Cybersecurity Initiative]]
|-
|President's Commission on Critical Infrastructure Protection||1997||[[Critical Foundations]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/PCCIP%20Report%201997.pdf ''Pdf'']
|-
|President's Information Technology Advisory Council||2005||[[Cyber Security: A Crisis of Prioritization]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/PITAC%20Report%202005.pdf ''Pdf'']
|-
|United States Secret Service||2004||[[Insider Threat Study]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/its_report_040820.pdf ''Pdf'']
|-
|White House||2003||[[The National Strategy to Secure Cyberspace]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/National%20Strategy%20to%20Secure%20Cyberspace%202003.pdf ''Pdf'']
|-
|White House||2009||[[Cyberspace Policy Review]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/Cyberspace_Policy_Review_final.pdf ''Pdf'']
|-
|White House||2010||[[The Comprehensive National Cybersecurity Initiative]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/CNCI-Cybersecurity.pdf ''Pdf'']
|}


*'''''Subcategories:''''' ''None''
*'''''Subcategories:''''' ''None''


''[[Table of Contents | Jump to Table of Contents]]''
''[[Table of Contents | Jump to Table of Contents]]''

Latest revision as of 11:30, 9 September 2010

TOC-> Resource by Type-> Government Reports and Documents->US Government Reports and Documents

Author/Agency Year Title Source Expertise Full Text
Department of Commerce 2010 Defense Industrial Base Assessment Government Report None Pdf
Department of Defense 1999 An Assessment of International Legal Issues in Information Operations Government Report Moderate:Law Pdf
Department of Defense 2007 Mission Impact of Foreign Influence on DoD Software Government Report Low:Defense Policy/Procurement Pdf
Department of Defense 2005 Strategy for Homeland Defense and Civil Support Government Report None Pdf
Department of Homeland Security 2009 A Roadmap for Cybersecurity Research Government Report Low:Technology Pdf
Department of Homeland Security 2003 The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets Government Report None Pdf
Deputy Chief of Staff for Intelligence 2006 Critical Infrastructure Threats and Terrorism Government Report Low:Organizational Analysis; Low:Risk Management Pdf
National Cyber Security Summit Task Force 2004 Information Security Governance Government Report Moderate:Executive Administration Pdf
National Infrastructure Advisory Council 2004 Hardening The Internet Government Report High:Technology Pdf
National Institute of Standards and Technology 2006 SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security Government Report Moderate:Technology Pdf
National Science and Technology Council 2006 Federal Plan for Cyber Security and Information Assurance Research and Development Government Report Low:Technology Pdf
Networking and Information Technology Research and Development 2009 National Cyber Leap Year Summit 2009, Co-Chairs' Report Government Report Low:Technology Pdf
President's Commission on Critical Infrastructure Protection 1997 Critical Foundations Government Report None Pdf
President's Information Technology Advisory Council 2005 Cyber Security: A Crisis of Prioritization Government Report None Pdf
United States Secret Service 2004 Insider Threat Study Government Report None Pdf
White House 2003 The National Strategy to Secure Cyberspace Government Report None Pdf
White House 2009 Cyberspace Policy Review Government Report None Pdf
White House 2010 The Comprehensive National Cybersecurity Initiative Government Report None Pdf
  • Subcategories: None

Jump to Table of Contents