Threats and Actors: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
m (Reverted edits by WikiSysop (Talk) to last version by Felix)
Line 1: Line 1:
''[[Table of Contents | TOC->]][[Threats and Actors]]''
''[[Table of Contents | TOC->]][[Threats and Actors]]''


{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
Anderson, Ross J. (2008) [[Security Engineering]]
|-
 
! style="background-color: #efefef;" | Author 1
Barkham, Jason (2001) [[Information Warfare and International Law on the Use of Force]]
! style="background-color: #efefef;" | Author 2
 
! style="background-color: #efefef;" | Year
Brown, Davis (2006) [[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]
! style="background-color: #efefef;" | Title
 
! style="background-color: #efefef;" | Source
Clarke, Richard A. and Knake, Robert (2010) [[Cyber War]]
! style="background-color: #efefef;" | Expertise
 
! style="background-color: #efefef;" class="unsortable" | Full Text 
Department of Commerce (2010) [[Defense Industrial Base Assessment]]
|-
 
|Anderson, Ross J.||||2008||[[Security Engineering]]||Book||Low:Technology; Low:Cryptography||N/A
Department of Defense ''(2005)'' [[Strategy for Homeland Defense and Civil Support]]
|-
 
|Barkham, Jason||||2001||[[Information Warfare and International Law on the Use of Force]]||Law Review||Moderate:Law||[http://www1.law.nyu.edu/journals/jilp/issues/34/pdf/34_1_b.pdf ''Pdf''] [http://activeresponse.org/files/34_1_b.pdf ''Alt Pdf'']
Department of Defense (2007) [[Mission Impact of Foreign Influence on DoD Software]]
|-
 
|Brown, Davis||||2006||[[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]||Law Journal||Moderate:Law||[http://www.harvardilj.org/attach.php?id=59 ''Pdf'']
Department of Defense Office of General Counsel (1999) [[An Assessment of International Legal Issues in Information Operations]]  
|-
 
|Clarke, Richard A.||Knake, Robert||2010||[[Cyber War]]||Book||None||N/A
Department of Homeland Security (2003) [[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]
|-
 
|Department of Commerce||||2010||[[Defense Industrial Base Assessment]]||Government Report||None||[http://www.bis.doc.gov/defenseindustrialbaseprograms/osies/defmarketresearchrpts/final_counterfeit_electronics_report.pdf  ''Pdf'']
Deputy Chief of Staff for Intelligence (2006) [[Critical Infrastructure Threats and Terrorism]]
|-
 
|Department of Defense||||1999||[[An Assessment of International Legal Issues in Information Operations]]||Government Report||Moderate:Law||[http://www.au.af.mil/au/awc/awcgate/dod-io-legal/dod-io-legal.pdf '' Pdf'']
Dörmann, Knut (2004) [[Applicability of the Additional Protocols to Computer Network Attacks]]  
|-
 
|Department of Defense||||2005||[[Strategy for Homeland Defense and Civil Support]]||Government Report||None||[http://www.defense.gov/news/Jun2005/d20050630homeland.pdf  ''Pdf'']
Energetics Inc. (2006) [[Roadmap to Secure Control Systems in the Energy Sector]]
|-
 
|Department of Defense||||2007||[[Mission Impact of Foreign Influence on DoD Software]]||Government Report||Low:Defense Policy/Procurement||[http://www.cyber.st.dhs.gov/docs/Defense%20Science%20Board%20Task%20Force%20-%20Report%20on%20Mission%20Impact%20of%20Foreign%20Influence%20on%20DoD%20Software%20(2007).pdf  ''Pdf'']
Epstein, Richard A. and Brown, Thomas P. (2008) [[Cybersecurity in the Payment Card Industry]]
|-
 
|Department of Homeland Security||||2003||[[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]||Government Report||None||[http://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf  ''Pdf'']
Financial Services Sector Coordinating Council for Critical Infrastructure Protection (2008) [[Research Agenda for the Banking and Finance Sector]]
|-
 
|Department of Homeland Security||||2009||[[A Roadmap for Cybersecurity Research]]||Government Report||Low:Technology||[http://www.cyber.st.dhs.gov/docs/DHS-Cybersecurity-Roadmap.pdf ''Pdf'']
Franklin, Jason, et. al (2007) [[An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants]]
|-
 
|Deputy Chief of Staff for Intelligence||||2006||[[Critical Infrastructure Threats and Terrorism]]||Government Report||Low:Organizational Analysis; Low:Risk Management||[http://www.fas.org/irp/threat/terrorism/sup2.pdf  ''Pdf'']
Grady, Mark F. and Parisi, Francesco (2006) [[The Law and Economics of Cybersecurity]]
|-
 
|Dörmann, Knut||||2004||[[Applicability of the Additional Protocols to Computer Network Attacks]]||Independent Reports||Low:Law||[http://www.icrc.org/Web/eng/siteeng0.nsf/htmlall/68LG92/$File/ApplicabilityofIHLtoCNA.pdf ''Pdf'']
Hollis, Duncan B. (2007) [[Why States Need an International Law for Information Operations]]  
|-
 
|Dunlap, Charles J. Jr.||||2009||[[Towards a Cyberspace Legal Regime in the Twenty-First Century]]||Speech||None||N/A
Johnson, Eric M. (2008) [[Managing Information Risk and the Economics of Security]]
|-
 
|Energetics Inc.||||2006||[[Roadmap to Secure Control Systems in the Energy Sector]]||Independent Reports||None||[http://www.cyber.st.dhs.gov/docs/DOE%20Roadmap%202006.pdf ''Pdf'']
Johnson, Vincent R. (2005) [[Cybersecurity, Identity Theft, and the Limits of Tort Liability]]
|-
 
|Epstein, Richard A.||Brown, Thomas P.||2008||[[Cybersecurity in the Payment Card Industry]]||Law Review Article||Low:Law; Low:Economics||[http://lawreview.uchicago.edu/issues/archive/v75/75_1/EpsteinArticle.pdf ''Pdf'']
Kramer, Franklin D., et. al (2009) [[Cyberpower and National Security]]
|-
 
|Financial Services Sector Coordinating Council for Critical Infrastructure Protection||||2008||[[Research Agenda for the Banking and Finance Sector]]||Independent Reports||None||[http://www.cyber.st.dhs.gov/docs/RD_Agenda-FINAL.pdf ''Pdf'']
McAfee, Inc. (2010) [[McAfee Threats Report]]
|-
 
|Franklin, Jason, et. al||||2007||[[An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants]]||Conf. Paper||Low:Statistics; Low:Economics||[http://sparrow.ece.cmu.edu/group/pub/franklin_paxson_perrig_savage_miscreants.pdf ''Pdf''] [http://www.cs.cmu.edu/~jfrankli/acmccs07/ccs07_franklin_eCrime.pdf  ''Alt Pdf'']
Moore, Tyler and Clayton, Richard (2007) [[Examining the Impact of Website Take-down on Phishing]]
|-
 
|Grady, Mark F.||Parisi, Francesco||2006||[[The Law and Economics of Cybersecurity]]||Book||Low:Economics; Low:Law||N/A
Moore, Tyler and Clayton, Richard (2008) [[The Consequence of Non-Cooperation in the Fight Against Phishing]]
|-
 
|Hollis, Duncan B.||||2007||[[Why States Need an International Law for Information Operations]]||Law Review||Moderate:Law||[http://legacy.lclark.edu/org/lclr/objects/LCB_11_4_Art7_Hollis.pdf  ''Pdf'']  
Moore, Tyler and Clayton, Richard (2009) [[The Impact of Incentives on Notice and Take-down]]
|-
 
|Johnson, Eric M.||||2008||[[Managing Information Risk and the Economics of Security]]||Book||High:Economics||N/A
Moore, Tyler, et. al (2009) [[The Economics of Online Crime]]
|-
 
|Johnson, Vincent R.||||2005||[[Cybersecurity, Identity Theft, and the Limits of Tort Liability]]||Law Review||Moderate:Law||[http://www.stmarytx.edu/law/pdf/Johnsoncyber.pdf ''Pdf''] [http://law.bepress.com/cgi/viewcontent.cgi?article=3530&context=expresso ''AltPdf'']
National Cyber Defense Initiative (2009) [[National Cyber Defense Financial Services Workshop Report]]
|-
 
|Korns, Stephen W.|| ||2009||[[Cyber Operations]]||Journal Article||Low:International Warfare||[http://www.carlisle.army.mil/DIME/documents/Cyber%20Operations%20-%20The%20New%20Balance%20-%20Korns.pdf ''Pdf'']
National Cyber Security Summit Task Force (2004) [[Information Security Governance]]
|-
 
|Kramer, Franklin D., et. al||||2009||[[Cyberpower and National Security]]||Book||None||N/A
National Research Council (2007) [[Toward a Safer and More Secure Cyberspace]]
|-
 
|McAfee, Inc.||||2010||[[McAfee Threats Report]]||Industry Report||None||[http://www.mcafee.com/us/local_content/reports/2010q1_threats_report.pdf ''Pdf'']
National Research Council (1999) [[Trust in Cyberspace]]
|-
 
|Moore, Tyler, et. al||||2009||[[The Economics of Online Crime]]||Journal Article||Low:Technology||[http://people.seas.harvard.edu/~tmoore/jep09.pdf  ''Pdf'']
Nye, Joseph (2010) [[Cyber Power]]
|-
 
|Moore, Tyler||Clayton, Richard||2007||[[Examining the Impact of Website Take-down on Phishing]]||Conf. Paper||Low:Technology||[http://www.ecrimeresearch.org/2007/proceedings/p1_moore.pdf ''Pdf''] [http://www.cl.cam.ac.uk/~rnc1/ecrime07.pdf  ''Alt Pdf'']
Powell, Benjamin (2005[[Is Cybersecurity a Public Good]]
|-
 
|Moore, Tyler||Clayton, Richard||2008||[[The Consequence of Non-Cooperation in the Fight Against Phishing]]||Conf. Paper||Low:Technology; Low:Economics||[http://people.seas.harvard.edu/~tmoore/ecrime08.pdf ''Pdf''] [http://www.cl.cam.ac.uk/~rnc1/ecrime08pre.pdf  ''Alt Pdf'']
Rotenberg et. al. (''2010'') [[The Cyber War Threat Has Been Grossly Exaggerated]]
|-
 
|Moore, Tyler||Clayton, Richard||2009||[[The Impact of Incentives on Notice and Take-down]]||Book Chapter||Moderate:Technology; Low:Law||[http://weis2008.econinfosec.org/papers/MooreImpact.pdf  ''Pdf'']
Schneier, Bruce (2003) [[Beyond Fear]]
|-
 
|National Cyber Defense Initiative||||2009||[[National Cyber Defense Financial Services Workshop Report]]||Independent Report||Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance||[http://www.cyber.st.dhs.gov/docs/NCDI_FI_Workshop_Report.pdf ''Pdf'']
Schneier, Bruce (2008) [[Schneier on Security]]
|-
 
|National Cyber Security Summit Task Force||||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf'']
Stohl, Michael ''(2006)'' [[Cyber Terrorism]]
|-
 
|National Institute of Standards and Technology||||2006||[[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]||Government Report||Moderate:Technology||[http://www.cyber.st.dhs.gov/docs/NIST%20Guide%20to%20Supervisory%20and%20Data%20Acquisition-SCADA%20and%20Industrial%20Control%20Systems%20Security%20(2007).pdf ''Pdf'']
Symantec Corporation (2010) [[Symantec Global Internet Security Threat Report]]
|-
 
|National Research Council||||1999||[[Trust in Cyberspace]]||Independent Reports||Moderate:Technology||[http://www.cyber.st.dhs.gov/docs/Trust%20in%20Cyberspace%20Report%201999.pdf ''Pdf'']
Thomas, Rob and Martin, Jerry (2006) [[The Underground Economy]]
|-
 
|National Research Council||||2007||[[Toward a Safer and More Secure Cyberspace]]||Independent Reports||Low:Research Processes; Low:Technology||[http://www.cyber.st.dhs.gov/docs/Toward_a_Safer_and_More_Secure_Cyberspace-Full_report.pdf ''Pdf'']
Watts, Sean (2010) [[Combatant Status and Computer Network Attack]]
|-
|Nye, Joseph||||2010||[[Cyber Power]]||Book Excerpt||Low:Technology; Low:Policy||[http://belfercenter.ksg.harvard.edu/files/cyber-power.pdf ''Pdf'']
|-
|Powell, Benjamin||||2005||[[Is Cybersecurity a Public Good]]||Law Review||Low/Moderate:Economics||[http://www.independent.org/pdf/working_papers/57_cyber.pdf  ''Pdf''] [http://www.ciaonet.org/wps/pob03/pob03.pdf ''AltPdf'']
|-
|Rotenberg et. al.||||2010||[[The Cyber War Threat Has Been Grossly Exaggerated]]||Debate||None||[http://intelligencesquaredus.org/index.php/past-debates/cyber-war-threat-has-been-grossly-exaggerated/ ''Audio/Transcript'']
|-
|Schmitt, Michael N., et. al||||2004||[[Computers and War]]||Conf. Paper||Moderate:Law||[http://www.ihlresearch.org/ihl/pdfs/schmittetal.pdf ''Pdf'']
|-
|Schmitt, Michael N.||||1999||[[Computer Network Attack and the Use of Force in International Law]]||Law Journal||High:Law||[http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA471993&Location=U2&doc=GetTRDoc.pdf ''Pdf'']
|-
|Schmitt, Michael N.||||2002||[[Wired Warfare]]||Journal Article||Moderate:Law||[http://www.icrc.org/Web/eng/siteeng0.nsf/htmlall/5C5D5C/$File/365_400_Schmitt.pdf ''Pdf'']
|-
|Schneier, Bruce||||2003||[[Beyond Fear]]||Book||None||[http://www.scribd.com/doc/12185921/beyond-fear-thinking-sensibly-about-security-in-an-uncertain-world-bruce-schneier-copernicus-books-2003 ''Scribd'']
|-
|Schneier, Bruce||||2008||[[Schneier on Security]]||Book||None||[http://www.schneier.com/book-sos.html ''Purchase'']
|-
|Sklerov, Matthew J.|| ||2009||[[Solving the Dilemma of State Responses to Cyberattacks]]||Law Review||Moderate:Law; Low:Technology||[http://www.loc.gov/rr/frd/Military_Law/Military_Law_Review/pdf-files/201-fall-2009.pdf ''Pdf'']
|-
|Stohl, Michael||||2006||[[Cyber Terrorism]]||Journal Article||None||[http://www.ingentaconnect.com/content/klu/cris/2006/00000046/F0020004/00009061 ''Purchase'']
|-
|Symantec Corporation||||2010||[[Symantec Global Internet Security Threat Report]]||Industry Report||Low/Moderate:Technology||[http://www4.symantec.com/Vrt/wl?tu_id=SUKX1271711282503126202 ''Pdf'']
|-
|Thomas, Rob||Martin, Jerry||2006||[[The Underground Economy]]||Journal Article||Low:Technology||[http://www.usenix.org/publications/login/2006-12/openpdfs/cymru.pdf ''Pdf'']
|-
|Todd, Graham H.|| ||2009||[[Armed Attack in Cyberspace]]||Law Review||Moderate:Law||[http://www.afjag.af.mil/shared/media/document/AFD-091026-024.pdf ''Pdf'']
|-
|United States Secret Service||||2004||[[Insider Threat Study]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/its_report_040820.pdf ''Pdf'']
|-
|Verizon||||2010||[[2010 Data Breach Investigations Report]]||Industry Report||Low:Technology||[http://www.verizonbusiness.com/resources/reports/rp_2010-data-breach-report_en_xg.pdf ''Pdf'']
|-
|Watts, Sean|| ||2010||[[Combatant Status and Computer Network Attack]]||Law Review||Moderate:Law||[http://www.vjil.org/wp-content/uploads/2010/01/VJIL-50.2-Watts.pdf ''Pdf'']
|}


'''''Subcategories:'''''
'''''Subcategories:'''''

Revision as of 15:15, 20 August 2010

TOC->Threats and Actors

Anderson, Ross J. (2008) Security Engineering

Barkham, Jason (2001) Information Warfare and International Law on the Use of Force

Brown, Davis (2006) A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict

Clarke, Richard A. and Knake, Robert (2010) Cyber War

Department of Commerce (2010) Defense Industrial Base Assessment

Department of Defense (2005) Strategy for Homeland Defense and Civil Support

Department of Defense (2007) Mission Impact of Foreign Influence on DoD Software

Department of Defense Office of General Counsel (1999) An Assessment of International Legal Issues in Information Operations

Department of Homeland Security (2003) The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets

Deputy Chief of Staff for Intelligence (2006) Critical Infrastructure Threats and Terrorism

Dörmann, Knut (2004) Applicability of the Additional Protocols to Computer Network Attacks

Energetics Inc. (2006) Roadmap to Secure Control Systems in the Energy Sector

Epstein, Richard A. and Brown, Thomas P. (2008) Cybersecurity in the Payment Card Industry

Financial Services Sector Coordinating Council for Critical Infrastructure Protection (2008) Research Agenda for the Banking and Finance Sector

Franklin, Jason, et. al (2007) An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants

Grady, Mark F. and Parisi, Francesco (2006) The Law and Economics of Cybersecurity

Hollis, Duncan B. (2007) Why States Need an International Law for Information Operations

Johnson, Eric M. (2008) Managing Information Risk and the Economics of Security

Johnson, Vincent R. (2005) Cybersecurity, Identity Theft, and the Limits of Tort Liability

Kramer, Franklin D., et. al (2009) Cyberpower and National Security

McAfee, Inc. (2010) McAfee Threats Report

Moore, Tyler and Clayton, Richard (2007) Examining the Impact of Website Take-down on Phishing

Moore, Tyler and Clayton, Richard (2008) The Consequence of Non-Cooperation in the Fight Against Phishing

Moore, Tyler and Clayton, Richard (2009) The Impact of Incentives on Notice and Take-down

Moore, Tyler, et. al (2009) The Economics of Online Crime

National Cyber Defense Initiative (2009) National Cyber Defense Financial Services Workshop Report

National Cyber Security Summit Task Force (2004) Information Security Governance

National Research Council (2007) Toward a Safer and More Secure Cyberspace

National Research Council (1999) Trust in Cyberspace

Nye, Joseph (2010) Cyber Power

Powell, Benjamin (2005) Is Cybersecurity a Public Good

Rotenberg et. al. (2010) The Cyber War Threat Has Been Grossly Exaggerated

Schneier, Bruce (2003) Beyond Fear

Schneier, Bruce (2008) Schneier on Security

Stohl, Michael (2006) Cyber Terrorism

Symantec Corporation (2010) Symantec Global Internet Security Threat Report

Thomas, Rob and Martin, Jerry (2006) The Underground Economy

Watts, Sean (2010) Combatant Status and Computer Network Attack

Subcategories:

Jump to Table of Contents