US Government Reports and Documents: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 10: | Line 10: | ||
! style="background-color: #efefef;" class="unsortable" | Full Text | ! style="background-color: #efefef;" class="unsortable" | Full Text | ||
|- | |- | ||
| Department of Commerce || 2010 || [[Defense Industrial Base Assessment]] || Government Report || None || [http://www.bis.doc.gov/defenseindustrialbaseprograms/osies/defmarketresearchrpts/final_counterfeit_electronics_report.pdf ''Pdf''] | |Department of Commerce||2010||[[Defense Industrial Base Assessment]]||Government Report||None||[http://www.bis.doc.gov/defenseindustrialbaseprograms/osies/defmarketresearchrpts/final_counterfeit_electronics_report.pdf ''Pdf''] | ||
|- | |- | ||
| Department of Defense || 2007 || [[Mission Impact of Foreign Influence on DoD Software]] || Government Report || Low:Defense Policy/Procurement || [http://www.cyber.st.dhs.gov/docs/Defense%20Science%20Board%20Task%20Force%20-%20Report%20on%20Mission%20Impact%20of%20Foreign%20Influence%20on%20DoD%20Software%20(2007).pdf ''Pdf''] | |Department of Defense||2007||[[Mission Impact of Foreign Influence on DoD Software]]||Government Report||Low:Defense Policy/Procurement||[http://www.cyber.st.dhs.gov/docs/Defense%20Science%20Board%20Task%20Force%20-%20Report%20on%20Mission%20Impact%20of%20Foreign%20Influence%20on%20DoD%20Software%20(2007).pdf ''Pdf''] | ||
|- | |- | ||
| Department of Defense || 2005 || [[Strategy for Homeland Defense and Civil Support]] || Government Report || None || [http://www.defense.gov/news/Jun2005/d20050630homeland.pdf ''Pdf''] | |Department of Defense||2005||[[Strategy for Homeland Defense and Civil Support]]||Government Report||None||[http://www.defense.gov/news/Jun2005/d20050630homeland.pdf ''Pdf''] | ||
|- | |- | ||
| Department of Homeland Security || 2009 || [[A Roadmap for Cybersecurity Research]] || Government Report || Low:Technology || [http://www.cyber.st.dhs.gov/docs/DHS-Cybersecurity-Roadmap.pdf ''Pdf''] | |Department of Homeland Security||2009||[[A Roadmap for Cybersecurity Research]]||Government Report||Low:Technology||[http://www.cyber.st.dhs.gov/docs/DHS-Cybersecurity-Roadmap.pdf ''Pdf''] | ||
|- | |- | ||
| Department of Homeland Security || 2003 || [[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]] || Government Report || None || [http://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf ''Pdf''] | |Department of Homeland Security||2003||[[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]||Government Report||None||[http://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf ''Pdf''] | ||
|- | |- | ||
| Deputy Chief of Staff for Intelligence || 2006 || [[Critical Infrastructure Threats and Terrorism]] || Government Report || Low:Organizational Analysis; Low:Risk Management || [http://www.fas.org/irp/threat/terrorism/sup2.pdf ''Pdf''] | |Deputy Chief of Staff for Intelligence||2006||[[Critical Infrastructure Threats and Terrorism]]||Government Report||Low:Organizational Analysis; Low:Risk Management||[http://www.fas.org/irp/threat/terrorism/sup2.pdf ''Pdf''] | ||
|- | |- | ||
| National Cyber Security Summit Task Force || 2004 || [[Information Security Governance]] || Government Report || Moderate:Executive Administration || [http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf | |National Cyber Security Summit Task Force||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf''] | ||
|- | |- | ||
| National Infrastructure Advisory Council || 2004 || [[Hardening The Internet]] || Government Report || High:Technology || [http://www.cyber.st.dhs.gov/docs/NIAC%20Internet%20Hardening.pdf ''Pdf''] | |National Infrastructure Advisory Council||2004||[[Hardening The Internet]]||Government Report||High:Technology||[http://www.cyber.st.dhs.gov/docs/NIAC%20Internet%20Hardening.pdf ''Pdf''] | ||
|- | |- | ||
| National Institute of Standards and Technology || 2006 || [[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]] || Government Report || Moderate:Technology || [http://www.cyber.st.dhs.gov/docs/NIST%20Guide%20to%20Supervisory%20and%20Data%20Acquisition-SCADA%20and%20Industrial%20Control%20Systems%20Security%20(2007).pdf ''Pdf''] | |National Institute of Standards and Technology||2006||[[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]||Government Report||Moderate:Technology||[http://www.cyber.st.dhs.gov/docs/NIST%20Guide%20to%20Supervisory%20and%20Data%20Acquisition-SCADA%20and%20Industrial%20Control%20Systems%20Security%20(2007).pdf ''Pdf''] | ||
|- | |- | ||
| National Science and Technology Council || ''2006'' || [[Federal Plan for Cyber Security and Information Assurance Research and Development]] || Government Report || None || [http://www.cyber.st.dhs.gov/docs/Federal%20R&D%20Plan%202006.pdf ''Pdf''] | |National Science and Technology Council||''2006''||[[Federal Plan for Cyber Security and Information Assurance Research and Development]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/Federal%20R&D%20Plan%202006.pdf ''Pdf''] | ||
|- | |- | ||
| Networking and Information Technology Research and Development || ''2009'' || [[National Cyber Leap Year Summit 2009, Co-Chairs' Report]] || Government Report || None || [http://www.cyber.st.dhs.gov/docs/National_Cyber_Leap_Year_Summit_2009_Co-Chairs_Report.pdf ''Pdf''] | |Networking and Information Technology Research and Development||''2009''||[[National Cyber Leap Year Summit 2009, Co-Chairs' Report]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/National_Cyber_Leap_Year_Summit_2009_Co-Chairs_Report.pdf ''Pdf''] | ||
|- | |- | ||
| President's Commission on Critical Infrastructure Protection || ''1997'' || [[Critical Foundations]] || Government Report || None || [http://www.cyber.st.dhs.gov/docs/PCCIP%20Report%201997.pdf ''Pdf''] | |President's Commission on Critical Infrastructure Protection||''1997''||[[Critical Foundations]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/PCCIP%20Report%201997.pdf ''Pdf''] | ||
|- | |- | ||
| President's Information Technology Advisory Council || ''2005'' || [[Cyber Security: A Crisis of Prioritization]] || Government Report || None || [http://www.cyber.st.dhs.gov/docs/PITAC%20Report%202005.pdf ''Pdf''] | |President's Information Technology Advisory Council||''2005''||[[Cyber Security: A Crisis of Prioritization]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/PITAC%20Report%202005.pdf ''Pdf''] | ||
|- | |- | ||
| United States Secret Service || 2004 || [[Insider Threat Study]] || Government Report || None || [http://www.cyber.st.dhs.gov/docs/its_report_040820.pdf ''Pdf''] | |United States Secret Service||2004||[[Insider Threat Study]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/its_report_040820.pdf ''Pdf''] | ||
|- | |- | ||
| White House || ''2003'' || [[The National Strategy to Secure Cyberspace]] || Government Report || None || [http://www.cyber.st.dhs.gov/docs/National%20Strategy%20to%20Secure%20Cyberspace%202003.pdf ''Pdf''] | |White House||''2003''||[[The National Strategy to Secure Cyberspace]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/National%20Strategy%20to%20Secure%20Cyberspace%202003.pdf ''Pdf''] | ||
|- | |- | ||
| White House || 2009 || [[Cyberspace Policy Review]] || Government Report || None || [http://www.cyber.st.dhs.gov/docs/Cyberspace_Policy_Review_final.pdf ''Pdf''] | |White House||2009||[[Cyberspace Policy Review]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/Cyberspace_Policy_Review_final.pdf ''Pdf''] | ||
|- | |- | ||
| White House || ''2010'' || [[The Comprehensive National Cybersecurity Initiative]] || Government Report || None || [http://www.cyber.st.dhs.gov/docs/CNCI-Cybersecurity.pdf ''Pdf''] | |White House||''2010''||[[The Comprehensive National Cybersecurity Initiative]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/CNCI-Cybersecurity.pdf ''Pdf''] | ||
|} | |} | ||
Revision as of 13:36, 10 August 2010
TOC-> Resource by Type-> Government Reports and Documents->US Government Reports and Documents
Author/Agency | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|
Department of Commerce | 2010 | Defense Industrial Base Assessment | Government Report | None | |
Department of Defense | 2007 | Mission Impact of Foreign Influence on DoD Software | Government Report | Low:Defense Policy/Procurement | |
Department of Defense | 2005 | Strategy for Homeland Defense and Civil Support | Government Report | None | |
Department of Homeland Security | 2009 | A Roadmap for Cybersecurity Research | Government Report | Low:Technology | |
Department of Homeland Security | 2003 | The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets | Government Report | None | |
Deputy Chief of Staff for Intelligence | 2006 | Critical Infrastructure Threats and Terrorism | Government Report | Low:Organizational Analysis; Low:Risk Management | |
National Cyber Security Summit Task Force | 2004 | Information Security Governance | Government Report | Moderate:Executive Administration | |
National Infrastructure Advisory Council | 2004 | Hardening The Internet | Government Report | High:Technology | |
National Institute of Standards and Technology | 2006 | SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security | Government Report | Moderate:Technology | |
National Science and Technology Council | 2006 | Federal Plan for Cyber Security and Information Assurance Research and Development | Government Report | None | |
Networking and Information Technology Research and Development | 2009 | National Cyber Leap Year Summit 2009, Co-Chairs' Report | Government Report | None | |
President's Commission on Critical Infrastructure Protection | 1997 | Critical Foundations | Government Report | None | |
President's Information Technology Advisory Council | 2005 | Cyber Security: A Crisis of Prioritization | Government Report | None | |
United States Secret Service | 2004 | Insider Threat Study | Government Report | None | |
White House | 2003 | The National Strategy to Secure Cyberspace | Government Report | None | |
White House | 2009 | Cyberspace Policy Review | Government Report | None | |
White House | 2010 | The Comprehensive National Cybersecurity Initiative | Government Report | None |
- Subcategories: None