US Government Reports and Documents: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
 
(17 intermediate revisions by 2 users not shown)
Line 1: Line 1:
''[[Table of Contents | TOC->]][[Resource by Type | Resource by Type->]][[Government Reports and Documents | Government Reports and Documents->]][[US Government Reports and Documents]]''
''[[Table of Contents | TOC->]][[Resource by Type | Resource by Type->]][[Government Reports and Documents | Government Reports and Documents->]][[US Government Reports and Documents]]''


Department of Commerce (''2010'') [[Defense Industrial Base Assessment]]
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
 
|-
Department of Defense (2007) [[Mission Impact of Foreign Influence on DoD Software]]
! style="background-color: #efefef;" | Author/Agency
 
! style="background-color: #efefef;" | Year
Department of Defense (2005) [[Strategy for Homeland Defense and Civil Support]]
! style="background-color: #efefef;" | Title
 
! style="background-color: #efefef;" | Source
Department of Homeland Security (2009) [[A Roadmap for Cybersecurity Research]]
! style="background-color: #efefef;" | Expertise
 
! style="background-color: #efefef;" class="unsortable" | Full Text 
Department of Homeland Security (2003) [[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]
|-
 
|Department of Commerce||2010||[[Defense Industrial Base Assessment]]||Government Report||None||[http://www.bis.doc.gov/defenseindustrialbaseprograms/osies/defmarketresearchrpts/final_counterfeit_electronics_report.pdf  ''Pdf'']
Deputy Chief of Staff for Intelligence (2006) [[Critical Infrastructure Threats and Terrorism]]
|-
 
|Department of Defense||1999||[[An Assessment of International Legal Issues in Information Operations]]||Government Report||Moderate:Law||[http://www.au.af.mil/au/awc/awcgate/dod-io-legal/dod-io-legal.pdf '' Pdf'']
National Cyber Defense Initiative (2009) [[National Cyber Defense Financial Services Workshop Report]]
|-
 
|Department of Defense||2007||[[Mission Impact of Foreign Influence on DoD Software]]||Government Report||Low:Defense Policy/Procurement||[http://www.cyber.st.dhs.gov/docs/Defense%20Science%20Board%20Task%20Force%20-%20Report%20on%20Mission%20Impact%20of%20Foreign%20Influence%20on%20DoD%20Software%20(2007).pdf  ''Pdf'']
National Cyber Security Summit Task Force (2004) [[Information Security Governance]]
|-
 
|Department of Defense||2005||[[Strategy for Homeland Defense and Civil Support]]||Government Report||None||[http://www.defense.gov/news/Jun2005/d20050630homeland.pdf  ''Pdf'']
National Infrastructure Advisory Council ''(2004)'' [[Hardening The Internet]]
|-
 
|Department of Homeland Security||2009||[[A Roadmap for Cybersecurity Research]]||Government Report||Low:Technology||[http://www.cyber.st.dhs.gov/docs/DHS-Cybersecurity-Roadmap.pdf  ''Pdf'']
National Institute of Standards and Technology ''(2006)'' [[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]
|-
 
|Department of Homeland Security||2003||[[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]||Government Report||None||[http://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf  ''Pdf'']
National Science and Technology Council ''(2006)'' [[Federal Plan for Cyber Security and Information Assurance Research and Development]]
|-
 
|Deputy Chief of Staff for Intelligence||2006||[[Critical Infrastructure Threats and Terrorism]]||Government Report||Low:Organizational Analysis; Low:Risk Management||[http://www.fas.org/irp/threat/terrorism/sup2.pdf  ''Pdf'']
Networking and Information Technology Research and Development ''(2009)'' [[National Cyber Leap Year Summit 2009, Co-Chairs' Report]]
|-
 
|National Cyber Security Summit Task Force||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf'']
President's Commission on Critical Infrastructure Protection ''(1997)'' [[Critical Foundations]]
|-
 
|National Infrastructure Advisory Council||2004||[[Hardening The Internet]]||Government Report||High:Technology||[http://www.cyber.st.dhs.gov/docs/NIAC%20Internet%20Hardening.pdf  ''Pdf'']
President's Information Technology Advisory Council ''(2005)'' [[Cyber Security: A Crisis of Prioritization]]
|-
 
|National Institute of Standards and Technology||2006||[[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]||Government Report||Moderate:Technology||[http://www.cyber.st.dhs.gov/docs/NIST%20Guide%20to%20Supervisory%20and%20Data%20Acquisition-SCADA%20and%20Industrial%20Control%20Systems%20Security%20(2007).pdf ''Pdf'']
United States Secret Service ''(2004)'' [[Insider Threat Study]]
|-
 
|National Science and Technology Council||2006||[[Federal Plan for Cyber Security and Information Assurance Research and Development]]||Government Report||Low:Technology||[http://www.cyber.st.dhs.gov/docs/Federal%20R&D%20Plan%202006.pdf ''Pdf'']
White House ''(2003)'' [[The National Strategy to Secure Cyberspace]]
|-
 
|Networking and Information Technology Research and Development||2009||[[National Cyber Leap Year Summit 2009, Co-Chairs' Report]]||Government Report||Low:Technology||[http://www.cyber.st.dhs.gov/docs/National_Cyber_Leap_Year_Summit_2009_Co-Chairs_Report.pdf ''Pdf'']
White House ''(2009)'' [[Cyberspace Policy Review]]
|-
 
|President's Commission on Critical Infrastructure Protection||1997||[[Critical Foundations]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/PCCIP%20Report%201997.pdf ''Pdf'']
White House ''(2010)'' [[The Comprehensive National Cybersecurity Initiative]]
|-
|President's Information Technology Advisory Council||2005||[[Cyber Security: A Crisis of Prioritization]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/PITAC%20Report%202005.pdf ''Pdf'']
|-
|United States Secret Service||2004||[[Insider Threat Study]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/its_report_040820.pdf ''Pdf'']
|-
|White House||2003||[[The National Strategy to Secure Cyberspace]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/National%20Strategy%20to%20Secure%20Cyberspace%202003.pdf ''Pdf'']
|-
|White House||2009||[[Cyberspace Policy Review]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/Cyberspace_Policy_Review_final.pdf ''Pdf'']
|-
|White House||2010||[[The Comprehensive National Cybersecurity Initiative]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/CNCI-Cybersecurity.pdf ''Pdf'']
|}


*'''''Subcategories:''''' ''None''
*'''''Subcategories:''''' ''None''


''[[Table of Contents | Jump to Table of Contents]]''
''[[Table of Contents | Jump to Table of Contents]]''

Latest revision as of 11:30, 9 September 2010

TOC-> Resource by Type-> Government Reports and Documents->US Government Reports and Documents

Author/Agency Year Title Source Expertise Full Text
Department of Commerce 2010 Defense Industrial Base Assessment Government Report None Pdf
Department of Defense 1999 An Assessment of International Legal Issues in Information Operations Government Report Moderate:Law Pdf
Department of Defense 2007 Mission Impact of Foreign Influence on DoD Software Government Report Low:Defense Policy/Procurement Pdf
Department of Defense 2005 Strategy for Homeland Defense and Civil Support Government Report None Pdf
Department of Homeland Security 2009 A Roadmap for Cybersecurity Research Government Report Low:Technology Pdf
Department of Homeland Security 2003 The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets Government Report None Pdf
Deputy Chief of Staff for Intelligence 2006 Critical Infrastructure Threats and Terrorism Government Report Low:Organizational Analysis; Low:Risk Management Pdf
National Cyber Security Summit Task Force 2004 Information Security Governance Government Report Moderate:Executive Administration Pdf
National Infrastructure Advisory Council 2004 Hardening The Internet Government Report High:Technology Pdf
National Institute of Standards and Technology 2006 SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security Government Report Moderate:Technology Pdf
National Science and Technology Council 2006 Federal Plan for Cyber Security and Information Assurance Research and Development Government Report Low:Technology Pdf
Networking and Information Technology Research and Development 2009 National Cyber Leap Year Summit 2009, Co-Chairs' Report Government Report Low:Technology Pdf
President's Commission on Critical Infrastructure Protection 1997 Critical Foundations Government Report None Pdf
President's Information Technology Advisory Council 2005 Cyber Security: A Crisis of Prioritization Government Report None Pdf
United States Secret Service 2004 Insider Threat Study Government Report None Pdf
White House 2003 The National Strategy to Secure Cyberspace Government Report None Pdf
White House 2009 Cyberspace Policy Review Government Report None Pdf
White House 2010 The Comprehensive National Cybersecurity Initiative Government Report None Pdf
  • Subcategories: None

Jump to Table of Contents