Technology: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 29: | Line 29: | ||
|National Cyber Security Summit Task Force||||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf''] [http://www.criminal-justice-careers.com/resources/InfoSecGov4_04.pdf ''AltPdf''] | |National Cyber Security Summit Task Force||||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf''] [http://www.criminal-justice-careers.com/resources/InfoSecGov4_04.pdf ''AltPdf''] | ||
|- | |- | ||
|Networking and Information Technology Research and Development||||2009||[[National Cyber Leap Year Summit 2009, Co-Chairs' Report]]||Government Report|| | |Networking and Information Technology Research and Development||||2009||[[National Cyber Leap Year Summit 2009, Co-Chairs' Report]]||Government Report||Low:Technology||[http://www.cyber.st.dhs.gov/docs/National_Cyber_Leap_Year_Summit_2009_Co-Chairs_Report.pdf ''Pdf''] | ||
|- | |- | ||
|President's Commission on Critical Infrastructure Protection||||1997||[[Critical Foundations]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/PCCIP%20Report%201997.pdf ''Pdf''] | |President's Commission on Critical Infrastructure Protection||||1997||[[Critical Foundations]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/PCCIP%20Report%201997.pdf ''Pdf''] |
Revision as of 09:58, 9 September 2010
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross | Moore, Tyler | 2006 | The Economics of Information Security | Journal Article | Low:Economics | Pdf AltPdf |
Gandal, Neil | 2008 | An Introduction to Key Themes in the Economics of Cyber Security | Book Chapter | Low:Economics | ||
Moore, Tyler | Clayton, Richard | 2007 | Examining the Impact of Website Take-down on Phishing | Conf. Paper | Low:Technology | Pdf AltPdf |
Moore, Tyler | Clayton, Richard | 2008 | The Consequence of Non-Cooperation in the Fight Against Phishing | Conf. Paper | Low:Technology; Low:Economics | Pdf AltPdf |
National Cyber Defense Initiative | 2009 | National Cyber Defense Financial Services Workshop Report | Independent Report | Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance | Pdf AltPdf | |
National Cyber Security Summit Task Force | 2004 | Information Security Governance | Government Report | Moderate:Executive Administration | ||
National Infrastructure Advisory Council | 2004 | Hardening The Internet | Government Report | High:Technology | Pdf AltPdf | |
National Institute of Standards and Technology | 2006 | SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security | Government Report | Moderate:Technology | ||
National Cyber Security Summit Task Force | 2004 | Information Security Governance | Government Report | Moderate:Executive Administration | Pdf AltPdf | |
Networking and Information Technology Research and Development | 2009 | National Cyber Leap Year Summit 2009, Co-Chairs' Report | Government Report | Low:Technology | ||
President's Commission on Critical Infrastructure Protection | 1997 | Critical Foundations | Government Report | None | ||
President's Information Technology Advisory Council | 2005 | Cyber Security: A Crisis of Prioritization | Government Report | None | ||
Verizon | 2010 | 2010 Data Breach Investigations Report | Industry Report | Low:Technology |
- Subcategories: None