Technology: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 1: Line 1:
''[[Table of Contents | TOC->]][[Approaches | Approaches->]][[Technology]]''
| National Infrastructure Advisory Council || 2004 || [[Hardening The Internet]] || Government Report || High:Technology || [http://www.cyber.st.dhs.gov/docs/NIAC%20Internet%20Hardening.pdf ''Pdf'']
 
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
|-
! style="background-color: #efefef;" | Author 1
! style="background-color: #efefef;" | Author 2
! style="background-color: #efefef;" | Year
! style="background-color: #efefef;" | Title
! style="background-color: #efefef;" | Source
! style="background-color: #efefef;" | Expertise
! style="background-color: #efefef;" class="unsortable" | Full Text 
|-
| Anderson, Ross || Moore, Tyler ||2006||[[The Economics of Information Security]]||Science||Low:Economics||[http://people.seas.harvard.edu/~tmoore/science-econ.pdf  ''Pdf'']
|-
| Gandal, Neil ||  ||2008||[[An Introduction to Key Themes in the Economics of Cyber Security]]||Book Chapter||Low:Economics||[http://www.tau.ac.il/~gandal/security%20encyclopedia%20entry.pdf ''Pdf'']
|-
| Moore, Tyler || Clayton, Richard ||2007||[[Examining the Impact of Website Take-down on Phishing]]||Conf. Paper||Low:Technology||[http://www.ecrimeresearch.org/2007/proceedings/p1_moore.pdf ''Pdf'']
|-
| Moore, Tyler || Clayton, Richard ||2008||[[The Consequence of Non-Cooperation in the Fight Against Phishing]]||Conf. Paper||Low:Technology; Low:Economics||[http://people.seas.harvard.edu/~tmoore/ecrime08.pdf ''Pdf'']
|-
National Cyber Defense Initiative || ||2009|| [[National Cyber Defense Financial Services Workshop Report]] || Independent Report|| Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance ||[http://www.cyber.st.dhs.gov/docs/NCDI_FI_Workshop_Report.pdf ''Pdf'']
|-
|-
| National Institute of Standards and Technology || ||2006||[[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]||Government Report||Moderate:Technology||[http://www.cyber.st.dhs.gov/docs/NIST%20Guide%20to%20Supervisory%20and%20Data%20Acquisition-SCADA%20and%20Industrial%20Control%20Systems%20Security%20(2007).pdf ''Pdf'']
| National Institute of Standards and Technology || ||2006||[[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]||Government Report||Moderate:Technology||[http://www.cyber.st.dhs.gov/docs/NIST%20Guide%20to%20Supervisory%20and%20Data%20Acquisition-SCADA%20and%20Industrial%20Control%20Systems%20Security%20(2007).pdf ''Pdf'']
|-
|-
| National Cyber Security Summit Task Force || ||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf  ''Pdf'']
| National Cyber Security Summit Task Force || ||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf  ''Pdf'']
|-
| National Infrastructure Advisory Council || ||2004||[[Hardening The Internet]]|| || ||
|}
|}



Revision as of 11:24, 10 August 2010

| National Infrastructure Advisory Council || 2004 || Hardening The Internet || Government Report || High:Technology || Pdf |- | National Institute of Standards and Technology || ||2006||SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security||Government Report||Moderate:Technology||Pdf |- | National Cyber Security Summit Task Force || ||2004||Information Security Governance||Government Report||Moderate:Executive Administration||Pdf |}

  • Subcategories: None

Jump to Table of Contents