Private Efforts/Organizations: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 26: | Line 26: | ||
|- | |- | ||
|National Institute of Standards and Technology||||2006||[[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]||Government Report||Moderate:Technology||[http://www.cyber.st.dhs.gov/docs/NIST%20Guide%20to%20Supervisory%20and%20Data%20Acquisition-SCADA%20and%20Industrial%20Control%20Systems%20Security%20(2007).pdf ''Pdf''] | |National Institute of Standards and Technology||||2006||[[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]||Government Report||Moderate:Technology||[http://www.cyber.st.dhs.gov/docs/NIST%20Guide%20to%20Supervisory%20and%20Data%20Acquisition-SCADA%20and%20Industrial%20Control%20Systems%20Security%20(2007).pdf ''Pdf''] | ||
|- | |||
|President's Commission on Critical Infrastructure Protection||||1997||[[Critical Foundations]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/PCCIP%20Report%201997.pdf ''Pdf''] | |||
|- | |- | ||
|Verizon||||2010||[[2010 Data Breach Investigations Report]]||Industry Report||Low:Technology||[http://www.verizonbusiness.com/resources/reports/rp_2010-data-breach-report_en_xg.pdf ''Pdf''] | |Verizon||||2010||[[2010 Data Breach Investigations Report]]||Industry Report||Low:Technology||[http://www.verizonbusiness.com/resources/reports/rp_2010-data-breach-report_en_xg.pdf ''Pdf''] |
Revision as of 16:09, 8 September 2010
TOC-> Approaches->Private Efforts/Organizations
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Bohme, Rainer | Kataria, Gaurav | 2006 | Models and Measures for Correlation in Cyber-Insurance | Conf. Paper | High:Economics | |
Bohme, Rainer | Schwartz, Galina | 2010 | Modeling Cyber-Insurance | Conf. Paper | High:Economics | |
Clinton, Larry | Undated | Cyber-Insurance Metrics and Impact on Cyber-Security | Online Paper | Low:Technology; Low:Law | ||
Moore, Tyler | Clayton, Richard | 2009 | The Impact of Incentives on Notice and Take-down | Book Chapter | Moderate:Technology; Low:Law | |
National Cyber Defense Initiative | 2009 | National Cyber Defense Financial Services Workshop Report | Independent Report | Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance | ||
National Cyber Security Summit Task Force | 2004 | Information Security Governance | Government Report | Moderate:Executive Administration | ||
National Infrastructure Advisory Council | 2004 | Hardening The Internet | Government Report | High:Technology | ||
National Institute of Standards and Technology | 2006 | SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security | Government Report | Moderate:Technology | ||
President's Commission on Critical Infrastructure Protection | 1997 | Critical Foundations | Government Report | None | ||
Verizon | 2010 | 2010 Data Breach Investigations Report | Industry Report | Low:Technology | ||
White House | 2009 | Cyberspace Policy Review | Government Report | None |
- Subcategories: None