Template:Filtered Table: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 8: Line 8:
| align="center" style="background:#f0f0f0;"|'''Category'''
| align="center" style="background:#f0f0f0;"|'''Category'''
|-
|-
<noinclude>| McAfee and the Security Defense Agenda||2012-02-12||[http://www.mcafee.com/us/resources/reports/rp-sda-cyber-security.pdf "Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World"]||||
| McAfee and the Security Defense Agenda||2012-02-12||[http://www.mcafee.com/us/resources/reports/rp-sda-cyber-security.pdf ""Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World""]||||
|-
|-
| Business Roundtable||2012-10-11||[http://businessroundtable.org/uploads/studies-reports/downloads/2011_10_Mission_Critical_A_Public-Private_Strategy_for_Effective_Cybersecurity.pdf "Mission Critical: A Public-Private Strategy for Effective Cybersecurity "]||||
| Business Roundtable||2012-10-11||[http://businessroundtable.org/uploads/studies-reports/downloads/2011_10_Mission_Critical_A_Public-Private_Strategy_for_Effective_Cybersecurity.pdf ""Mission Critical: A Public-Private Strategy for Effective Cybersecurity ""]||||
|-
|-
| Centre for Secure Information Technologies||2012-09-11||[http://www.csit.qub.ac.uk/media/pdf/Filetoupload,252359,en.pdf "World Cybersecurity Technology Research Summit (Belfast 2011) "]||||
| Centre for Secure Information Technologies||2012-09-11||[http://www.csit.qub.ac.uk/media/pdf/Filetoupload,252359,en.pdf ""World Cybersecurity Technology Research Summit (Belfast 2011) ""]||||
|-
|-
| National Security Cyberspace Institute||2012-07-11||[http://www.nsci-va.org/WhitePapers/2011-07-22-Cyber Analogies Whitepaper-K McKee.pdf "A Review of Frequently Used Cyber Analogies "]||||
| National Security Cyberspace Institute||2012-07-11||[http://www.nsci-va.org/WhitePapers/2011-07-22-Cyber Analogies Whitepaper-K McKee.pdf ""A Review of Frequently Used Cyber Analogies ""]||||
|-
|-
| Center for a New American Security||2012-06-11||[http://www.cnas.org/node/6405 "America’s Cyber Future: Security and Prosperity in the Information Age "]||||
| Center for a New American Security||2012-06-11||[http://www.cnas.org/node/6405 ""America’s Cyber Future: Security and Prosperity in the Information Age ""]||||
|-
|-
| European Network and Information Security Agency (ENISA) ||2011-04-11||[http://www.enisa.europa.eu/act/res/other-areas/inter-x/report/interx-report "Resilience of the Internet Interconnection Ecosystem, at: "]||||
| European Network and Information Security Agency (ENISA) ||2011-04-11||[http://www.enisa.europa.eu/act/res/other-areas/inter-x/report/interx-report ""Resilience of the Internet Interconnection Ecosystem, at: ""]||||
|-
|-
| Business Software Alliance, Center for Democracy & Technology, U.S. Chamber of Commerce, Internet Security Alliance, Tech America ||2011-03-08||[http://www.cdt.org/files/pdfs/20110308_cbyersec_paper.pdf "Improving our Nation’s Cybersecurity through the Public-Private Partnership: a White Paper "]||||
| Business Software Alliance, Center for Democracy & Technology, U.S. Chamber of Commerce, Internet Security Alliance, Tech America ||2011-03-08||[http://www.cdt.org/files/pdfs/20110308_cbyersec_paper.pdf ""Improving our Nation’s Cybersecurity through the Public-Private Partnership: a White Paper ""]||||
|-
|-
| CSIS Commission on Cybersecurity for the 44th Presidency, Center for Strategic and International Studies ||2011-01||[http://csis.org/files/publication/110128_Lewis_CybersecurityTwoYearsLater_Web.pdf "Cybersecurity Two Years Later "]||||
| CSIS Commission on Cybersecurity for the 44th Presidency, Center for Strategic and International Studies ||2011-01||[http://csis.org/files/publication/110128_Lewis_CybersecurityTwoYearsLater_Web.pdf ""Cybersecurity Two Years Later ""]||||
|-
|-
| National Research Council ||2010-09-21||[http://www.nap.edu/catalog.php?record_id=12998 "Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop "]||||
| National Research Council ||2010-09-21||[http://www.nap.edu/catalog.php?record_id=12998 ""Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop ""]||||
|-
|-
| Joint Workshop of the National Security Threats in Cyberspace and the National Strategy Forum ||2009-09-15||[http://nationalstrategy.com/Portals/0/National%20Security%20Threats%20in%20Cyberspace%20FINAL%2009-15-09.pdf  "National Security Threats in Cyberspace "]||||
| Joint Workshop of the National Security Threats in Cyberspace and the National Strategy Forum ||2009-09-15||[http://nationalstrategy.com/Portals/0/National%20Security%20Threats%20in%20Cyberspace%20FINAL%2009-15-09.pdf  ""National Security Threats in Cyberspace ""]||||
|-</noinclude>
| GAO||2012-02-28||[http://www.csit.qub.ac.uk/media/pdf/Filetoupload,252359,en.pdf "Cybersecurity: Challenges to Securing the Modernized Electricity Grid "]||Government Report ||
|-
|-
| GAO||2011-12-09||[http://www.gao.gov/products/GAO-12-92 "Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use "]||Government Report ||
| GAO||2012-02-28||[http://www.csit.qub.ac.uk/media/pdf/Filetoupload,252359,en.pdf ""Cybersecurity: Challenges to Securing the Modernized Electricity Grid ""]||Government Report ||
|-
|-
| GAO||2011-11-29||[http://www.gao.gov/products/GAO-12-8 "Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination, at: "]||Government Report ||
| GAO||2011-12-09||[http://www.gao.gov/products/GAO-12-92 ""Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use ""]||Government Report ||
|-
|-
| GAO||2011-10-17||[http://www.gao.gov/products/GAO-11-634 "Federal Chief Information Officers: Opportunities Exist to Improve Role in Information Technology Management "]||Government Report ||
| GAO||2011-11-29||[http://www.gao.gov/products/GAO-12-8 ""Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination, at: ""]||Government Report ||
|-
|-
| GAO||2011-10-05||[http://www.gao.gov/products/GAO-12-130T "Information Security: Additional Guidance Needed to Address Cloud Computing Concerns "]||Government Report ||
| GAO||2011-10-17||[http://www.gao.gov/products/GAO-11-634 ""Federal Chief Information Officers: Opportunities Exist to Improve Role in Information Technology Management ""]||Government Report ||
|-
|-
| GAO||2011-10-03||[http://www.gao.gov/products/GAO-12-137 "Information Security: Weaknesses Continue Amid New Federal Efforts to Implement Requirements "]||Government Report ||
| GAO||2011-10-05||[http://www.gao.gov/products/GAO-12-130T ""Information Security: Additional Guidance Needed to Address Cloud Computing Concerns ""]||Government Report ||
|-
|-
| GAO||2011-10-17||[http://www.gao.gov/products/GAO-11-634 "Federal Chief Information Officers: Opportunities Exist to Improve Role in Information Technology Management "]||Government Report ||
| GAO||2011-10-03||[http://www.gao.gov/products/GAO-12-137 ""Information Security: Weaknesses Continue Amid New Federal Efforts to Implement Requirements ""]||Government Report ||
|-
|-
| GAO||2011-07-29||[http://www.gao.gov/products/GAO-11-695R "Defense Department Cyber Efforts: Definitions, Focal Point, and Methodology Needed for DoD to Develop Full-Spectrum Cyberspace Budget Estimates "]||Government Report ||
| GAO||2011-10-17||[http://www.gao.gov/products/GAO-11-634 ""Federal Chief Information Officers: Opportunities Exist to Improve Role in Information Technology Management ""]||Government Report ||
|-
|-
| GAO||2011-07-26||[http://www.gao.gov/products/GAO-11-463T "Continued Attention Needed to Protect Our Nation’s Critical Infrastructure "]||Government Report ||
| GAO||2011-07-29||[http://www.gao.gov/products/GAO-11-695R ""Defense Department Cyber Efforts: Definitions, Focal Point, and Methodology Needed for DoD to Develop Full-Spectrum Cyberspace Budget Estimates ""]||Government Report ||
|-
|-
| GAO||2011-07-25||[http://www.gao.gov/products/GAO-11-75 "Defense Department Cyber Efforts: DoD Faces Challenges in Its Cyber Activities "]||Government Report ||
| GAO||2011-07-26||[http://www.gao.gov/products/GAO-11-463T ""Continued Attention Needed to Protect Our Nation’s Critical Infrastructure ""]||Government Report ||
|-
|-
| GAO||2010-08-16||[http://www.gao.gov/products/GAO-10-628 "Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed "]||Government Report ||
| GAO||2011-07-25||[http://www.gao.gov/products/GAO-11-75 ""Defense Department Cyber Efforts: DoD Faces Challenges in Its Cyber Activities ""]||Government Report ||
|-
|-
| GAO||2011-07-08||[http://www.gao.gov/products/GAO-11-149 "Information Security: State Has Taken Steps to Implement a Continuous Monitoring Application, but Key Challenges Remain "]||Government Report ||
| GAO||2010-08-16||[http://www.gao.gov/products/GAO-10-628 ""Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed ""]||Government Report ||
|-
|-
| GAO||2011-03-16||[http://www.gao.gov/products/GAO-11-463T "Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure and Federal Information Systems "]||Government Report ||
| GAO||2011-07-08||[http://www.gao.gov/products/GAO-11-149 ""Information Security: State Has Taken Steps to Implement a Continuous Monitoring Application, but Key Challenges Remain ""]||Government Report ||
|-
|-
| GAO||2011-01-12||[http://www.gao.gov/products/GAO-11-117 "Electricity Grid Modernization: Progress Being Made on Cybersecurity Guidelines, but Key Challenges Remain to be Addressed "]||Government Report ||
| GAO||2011-03-16||[http://www.gao.gov/products/GAO-11-463T ""Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure and Federal Information Systems ""]||Government Report ||
|-
|-
| GAO||2010-11-30||[http://www.gao.gov/products/GAO-11-43 "Information Security: Federal Agencies Have Taken Steps to Secure Wireless Networks, but Further Actions Can Mitigate Risk "]||Government Report ||
| GAO||2011-01-12||[http://www.gao.gov/products/GAO-11-117 ""Electricity Grid Modernization: Progress Being Made on Cybersecurity Guidelines, but Key Challenges Remain to be Addressed ""]||Government Report ||
|-
|-
| GAO||2010-10-06||[http://www.gao.gov/products/GAO-11-24 "Cyberspace Policy: Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed "]||Government Report ||
| GAO||2010-11-30||[http://www.gao.gov/products/GAO-11-43 ""Information Security: Federal Agencies Have Taken Steps to Secure Wireless Networks, but Further Actions Can Mitigate Risk ""]||Government Report ||
|-
|-
| GAO||2010-09-23||[http://www.gao.gov/products/GAO-10-772 "DHS Efforts to Assess and Promote Resiliency Are Evolving but Program Management Could Be Strengthened "]||Government Report ||
| GAO||2010-10-06||[http://www.gao.gov/products/GAO-11-24 ""Cyberspace Policy: Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed ""]||Government Report ||
|-
|-
| GAO||2010-09-15||[http://www.gao.gov/products/GAO-10-916 "Information Security: Progress Made on Harmonizing Policies and Guidance for National Security and Non-National Security Systems "]||Government Report ||
| GAO||2010-09-23||[http://www.gao.gov/products/GAO-10-772 ""DHS Efforts to Assess and Promote Resiliency Are Evolving but Program Management Could Be Strengthened ""]||Government Report ||
|-
|-
| GAO||2010-08-02||[http://www.gao.gov/products/GAO-10-606 "United States Faces Challenges in Addressing Global Cybersecurity and Governance "]||Government Report ||
| GAO||2010-09-15||[http://www.gao.gov/products/GAO-10-916 ""Information Security: Progress Made on Harmonizing Policies and Guidance for National Security and Non-National Security Systems ""]||Government Report ||
|-
|-
| GAO||2010-07-01||[http://www.gao.gov/products/GAO-10-513 "Federal Guidance Needed to Address Control Issues With Implementing Cloud Computing "]||Government Report ||
| GAO||2010-08-02||[http://www.gao.gov/products/GAO-10-606 ""United States Faces Challenges in Addressing Global Cybersecurity and Governance ""]||Government Report ||
|-
|-
| GAO||2010-06-16||[http://www.gao.gov/products/GAO-10-834t "Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats "]||Government Report ||
| GAO||2010-07-01||[http://www.gao.gov/products/GAO-10-513 ""Federal Guidance Needed to Address Control Issues With Implementing Cloud Computing ""]||Government Report ||
|-
|-
| GAO||2010-03-24||[http://www.gao.gov/products/GAO-10-536t "Information Security: Concerted Response Needed to Resolve Persistent Weaknesses, at: "]||Government Report ||
| GAO||2010-06-16||[http://www.gao.gov/products/GAO-10-834t ""Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats ""]||Government Report ||
|-
|-
| GAO||2010-03-16||[http://www.gao.gov/products/GAO-11-463T "Cybersecurity: Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats "]||Government Report ||
| GAO||2010-03-24||[http://www.gao.gov/products/GAO-10-536t ""Information Security: Concerted Response Needed to Resolve Persistent Weaknesses, at: ""]||Government Report ||
|-
|-
| GAO||2010-04-12||[http://www.gao.gov/products/GAO-10-237 "Concerted Effort Needed to Consolidate and Secure Internet Connections at Federal Agencies "]||Government Report ||
| GAO||2010-03-16||[http://www.gao.gov/products/GAO-11-463T ""Cybersecurity: Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats ""]||Government Report ||
|-
|-
| GAO||2010-03-05||[http://www.gao.gov/products/GAO-10-338 "Cybersecurity: Progress Made But Challenges Remain in Defining and Coordinating the Comprehensive National Initiative "]||Government Report ||
| GAO||2010-04-12||[http://www.gao.gov/products/GAO-10-237 ""Concerted Effort Needed to Consolidate and Secure Internet Connections at Federal Agencies ""]||Government Report ||
|-
|-
| GAO||2009-11-17||[http://www.gao.gov/products/GAO-10-230t "Continued Efforts Are Needed to Protect Information Systems from Evolving Threats "]||Government Report ||
| GAO||2010-03-05||[http://www.gao.gov/products/GAO-10-338 ""Cybersecurity: Progress Made But Challenges Remain in Defining and Coordinating the Comprehensive National Initiative ""]||Government Report ||
|-
|-
| GAO||2003-08-27||[http://www.gao.gov/products/GAO-03-760 "Efforts to Improve Information sharing Need to Be Strengthened "]||Government Report ||
| GAO||2009-11-17||[http://www.gao.gov/products/GAO-10-230t ""Continued Efforts Are Needed to Protect Information Systems from Evolving Threats ""]||Government Report ||
|-
|-
| White House/OMB||2011-12-06||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/fed_cybersecurity_rd_strategic_plan_2011.pdf "Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program "]||Government Report ||
| GAO||2003-08-27||[http://www.gao.gov/products/GAO-03-760 ""Efforts to Improve Information sharing Need to Be Strengthened ""]||Government Report ||
|-
|-
| White House/OMB||2011-10-07||[http://www.whitehouse.gov/the-press-office/2011/10/07/executive-order-structural-reforms-improve-security-classified-networks- "Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information "]||Government Report ||
| White House/OMB||2011-12-06||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/fed_cybersecurity_rd_strategic_plan_2011.pdf ""Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program ""]||Government Report ||
|-
|-
| White House/OMB||2011-09-14||[http://www.whitehouse.gov/sites/default/files/omb/memoranda/2011/m11-33.pdf "FY 2012 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Managementa "]||Government Report ||
| White House/OMB||2011-10-07||[http://www.whitehouse.gov/the-press-office/2011/10/07/executive-order-structural-reforms-improve-security-classified-networks- ""Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information ""]||Government Report ||
|-
|-
| White House/OMB||2011-05-16||[http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf "International Strategy for Cyberspace "]||Government Report ||
| White House/OMB||2011-09-14||[http://www.whitehouse.gov/sites/default/files/omb/memoranda/2011/m11-33.pdf ""FY 2012 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Managementa ""]||Government Report ||
|-
|-
| White House/OMB||2011-05-12||[http://www.whitehouse.gov/the-press-office/2011/05/12/fact-sheet-cybersecurity-legislative-proposal "Cybersecurity Legislative Proposal (Fact Sheet) "]||Government Report ||
| White House/OMB||2011-05-16||[http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf ""International Strategy for Cyberspace ""]||Government Report ||
|-
| White House/OMB||2011-05-12||[http://www.whitehouse.gov/the-press-office/2011/05/12/fact-sheet-cybersecurity-legislative-proposal ""Cybersecurity Legislative Proposal (Fact Sheet) ""]||Government Report ||
|-
| White House/OMB||2011-02-13||[http://www.cio.gov/documents/Federal-Cloud-Computing-Strategy.pdf ""Federal Cloud Computing Strategy ""]||Government Report ||
|-
| White House/OMB||2010-12-09||[http://www.cio.gov/documents/25-Point-Implementation-Plan-to-Reform-Federal%20IT.pdf ""25 Point Implementation Plan to Reform Federal Information Technology Management ""]||Government Report ||
|-
| White House/OMB||2010-07-06||[http://www.whitehouse.gov/sites/default/files/omb/assets/memoranda_2010/m10-28.pdf ""Clarifying Cybersecurity Responsibilities ""]||Government Report ||
|-
| White House/OMB||2010-06-25||[http://www.dhs.gov/xlibrary/assets/ns_tic.pdf ""The National Strategy for Trusted Identities in Cyberspace: Creating Options for Enhanced Online Security and Privacy ""]||Government Report ||
|-
| White House/OMB||2010-03-02||[http://www.whitehouse.gov/cybersecurity/comprehensive-national-cybersecurity-initiative ""Comprehensive National Cybersecurity Initiative (CNCI) ""]||Government Report ||
|-
| White House/OMB||2009-05-29||[http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf ""Cyberspace Policy Review: Assuring a Trusted and Resilient Communications Infrastructure ""]||Government Report ||
|-
| DOD ||2012-02-16||[http://www.fas.org/sgp/othergov/dod/5200_01v1.pdf ""DOD Information Security Program: Overview, Classification, and Declassification ""]||Government Report ||
|-
| General Accountability Office (GAO) ||2011-07-29||[http://www.gao.gov/products/GAO-11-695R ""Defense Department Cyber Efforts: Definitions, Focal Point, and Methodology Needed for DOD to Develop Full-Spectrum Cyberspace Budget Estimates ""]||Government Report ||
|-
| Secretary of the Air Force ||2011-07-27||[http://www.e-publishing.af.mil/shared/media/epubs/AFI51-402.pdf ""Legal Reviews of Weapons and Cyber Capabilities ""]||Government Report ||
|-
| DOD ||2011-07-14||[http://www.defense.gov/news/d20110714cyber.pdf ""Department of Defense Strategy for Operating in Cyberspace ""]||Government Report ||
|-
| DOD ||2011-04||[http://www.nsci-va.org/CyberReferenceLib/2011-04-Cyber%20Ops%20Personnel.pdf ""Cyber Operations Personnel Report (DOD) ""]||Government Report ||
|-
| National Research Council, Committee for Advancing Software-Intensive Systems Producibility ||2010-10-20||[http://www.nap.edu/catalog.php?record_id=12979 ""Critical Code: Software Producibility for Defense ""]||Government Report ||
|-
| U.S. Deputy Secretary of Defense, William J. Lynn (Foreign Affairs) ||2010-009||[http://www.foreignaffairs.com/articles/66552/william-j-lynn-iii/defending-a-new-domain ""Defending a New Domain ""]||Government Report ||
|-
| Quadrennial Defense Review ||2010-07-30||[http://www.usip.org/quadrennial-defense-review-independent-panel-/view-the-report ""The QDR in Perspective: Meeting AmericaÅfs National Security Needs In the 21st Century (QDR Final Report) ""]||Government Report ||
|-
| U.S. Air Force ||2010-07-15||[http://www.e-publishing.af.mil/shared/media/epubs/afdd3-12.pdf ""Cyberspace Operations: Air Force Doctrine Document 3-12 ""]||Government Report ||
|-
| U.S. Navy ||2010-06-17||[http://www.doncio.navy.mil/PolicyView.aspx?ID=1804 ""DON (Department of the Navy) Cybersecurity/Information Assurance Workforce Management, Oversight and Compliance ""]||Government Report ||
|-
| NIST ||2012-02-17||[http://www.nist.gov/nstic/2012-nstic-governance-recs.pdf ""Recommendations for Establishing an Identity Ecosystem Governance Structure for the National Strategy for Trusted Identities in Cyberspace ""]||Government Report ||
|-
| Department of Commerce ||2011-06-14||[http://www.nist.gov/nstic/2012-nstic-governance-recs.pdf ""Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace ""]||Government Report ||
|-
| White House ||2011-04-15||[http://www.whitehouse.gov/the-press-office/2011/04/15/administration-releases-strategy-protect-online-consumers-and-support-in ""Administration Releases Strategy to Protect Online Consumers and Support Innovation and Fact Sheet on National Strategy for Trusted Identities in Cyberspace ""]||Government Report ||
|-
| White House ||2011-04-15||[http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf ""National Strategy for Trusted Identities in Cyberspace ""]||Government Report ||
|-
| Business Software Alliance ||2012-02-02||[http://portal.bsa.org/cloudscorecard2012/ ""Global Cloud Computing Scorecard a Blueprint for Economic Opportunity ""]||||
|-
| General Services Administration (GSA) ||2012-02-07||[http://www.gsa.gov/graphics/staffoffices/FedRAMP_CONOPS.pdf ""Concept of Operations: FedRAMP ""]||Government Report ||
|-
| Federal CIO Council ||2012-01-04||[http://www.gsa.gov/portal/category/102371 ""Federal Risk and Authorization Management Program (FedRAMP) ""]||Government Report ||
|-
| White House/Office of Management and Budget (OMB) ||2011-12-08||[http://www.cio.gov/fedrampmemo.pdf ""Security Authorization of Information Systems in Cloud Computing Environments (FedRAMP) ""]||Government Report ||
|-
| NIST ||2011-12-01||[http://www.nist.gov/itl/cloud/upload/SP_500_293_volumeI-2.pdf ""U.S. Government Cloud Computing Technology Roadmap, Volume I, Release 1.0 (Draft). High-Priority Requirements to Further USG Agency Cloud Computing Adoption ""]||Government Report ||
|-
| NIST ||2011-12-01||[http://www.nist.gov/itl/cloud/upload/SP_500_293_volumeII.pdf ""U.S. Government Cloud Computing Technology Roadmap, Release 1.0 (Draft), Volume II Useful Information for Cloud Adopters ""]||Government Report ||
|-
| GAO ||2011-10-05||[http://www.gao.gov/products/GAO-12-130T ""Information Security: Additional Guidance Needed to Address Cloud Computing Concerns ""]||Government Report ||
|-
| NIST ||2011-09-01||[http://www.nist.gov/customcf/get_pdf.cfm?pub_id=909505 ""Cloud Computing Reference Architecture ""]||Government Report ||
|-
| Software and Information Industry Association (SAII) ||2011-07-26||[http://www.siia.net/index.php?option=com_docman&task=doc_download&gid=3040&Itemid=318 ""Guide to Cloud Computing for Policy Makers ""]||Government Report ||
|-
| White House ||2011-02-13||[http://www.cio.gov/documents/Federal-Cloud-Computing-Strategy.pdf ""Federal Cloud Computing Strategy ""]||Government Report ||
|-
| Department of Energy, Office of Electricity Delivery & Energy Reliability ||1899-12-30||[http://energy.gov/oe/technology-development/energy-delivery-systems-cybersecurity ""Cybersecurity for Energy Delivery Systems Program ""]||Government Report ||
|-
| Organization for Economic Co-operation and Development (OECD) ||2012-01-10||[http://www.oecd-ilibrary.org/docserver/download/fulltext/5k9h2q8v9bln.pdf?expires=1330527950&id=id&accname=guest&checksum=F4470043AC638BE19D5131C3D5CE5EA4 ""ICT Applications for the Smart Grid: Opportunities and Policy Implications ""]||Government Report ||
|-
| Department of Energy (DOE) Inspector General ||2012-01-01||[http://energy.gov/ig/downloads/departments-management-smart-grid-investment-grant-program-oas-ra-12-04 ""The Department’s Management of the Smart Grid Investment Grant Program ""]||Government Report ||
|-
| General Accountability Office (GAO) ||2011-12-09||[http://www.gao.gov/products/GAO-12-92 ""Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use ""]||Government Report ||
|-
| Massachusetts Institute of Technology (MIT) ||2011-12-05||[http://web.mit.edu/mitei/research/studies/the-electric-grid-2011.shtml ""The Future of the Electric Grid ""]||Independent Report||
|-
| Federal Communications Commission (FCC) ||2011-06-03||[ftp://ftp.fcc.gov/pub/Daily_Releases/Daily_Business/2011/ db0610/DOC-307454A1.txt  ""FCC's Plan for Ensuring the Security of Telecommunications Networks""]||||
|-
| U.S. Army War College ||2011-05-09||[http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?pubid=10670 ""Cyber Infrastructure Protection ""]||||
|-
| McAfee and Center for Strategic and International Studies (CSIS) ||2011-04-21||[http://www.mcafee.com/us/resources/reports/rp-critical-infrastructure-protection.pdf ""In the Dark: Crucial Industries Confront Cyberattacks ""]||||
|-
| General Accountability Office (GAO) ||2011-03-16||[http://www.gao.gov/products/GAO-11-463T ""Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure and Federal Information Systems ""]||||
|-
| North American Electric Reliability Corp. (NERC) ||2011-01-26||[http://www.wired.com/images_blogs/threatlevel/2011/02/DoE-IG-Report-on-Grid-Security.pdf ""Federal Energy Regulatory Commission's Monitoring of Power Grid Cyber Security ""]||||
|-
| General Accountability Office (GAO) ||2011-01-12||[http://www.gao.gov/products/GAO-11-117 ""Electricity Grid Modernization: Progress Being Made on Cybersecurity Guidelines, but Key Challenges Remain to be Addressed ""]||||
|-
| White House (Office of Science & Technology Policy) ||2010-12-06||[http://www.whitehouse.gov/blog/2010/12/06/partnership-cybersecurity-innovation ""Partnership for Cybersecurity Innovation ""]||||
|-
| International Instrument Users Association (WIB) ||2010-11-10||[http://www.isssource.com/wib/ ""WIB Security Standard Released ""]||||
|-
| Microsoft||2012-11-10||[http://cdn.globalfoundationservices.com/documents/InformationSecurityMangSysforMSCloudInfrastructure.pdf ""Information Security Management System for Microsoft Cloud Infrastructure ""]||||
|-
| National Institute of Standards and Technology (NIST) ||2010-09-02||[http://www.nist.gov/public_affairs/releases/nist-finalizes-initial-set-of-smart-grid-cyber-security-guidelines.cfm ""NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines ""]||||
|-
| General Accountability Office (GAO) ||2010-07-15||[http://www.gao.gov/products/GAO-10-628 ""Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed ""]||||
|-
| Pew Research Center’s Internet & American Life Project ||2010-06-11||[http://pewinternet.org/Reports/2010/The-future-of-cloud-computing.aspx ""The future of cloud computing ""]||||
|-
| IEEE/EastWest Institute ||2010-05-26||[http://www.ieee-rogucci.org/files/The%20ROGUCCI%20Report.pdf ""The Reliability of Global Undersea Communications Cable Infrastructure (The ROGUCCI Report) ""]||||
|-
| Department of Energy, Idaho National Laboratory ||2010-05-01||[http://www.fas.org/sgp/eprint/nstb.pdf ""NSTB Assessments Summary Report: Common Industrial Control System Cyber Security Weaknesses ""]||||
|-
| Federal Communications Commission (FCC) ||2010-04-21||[http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-305618A1.doc ""Explore the reliability and resiliency of commercial broadband communications networks ""]||||
|-
| Cloud Security Alliance ||2012-12-09||[http://www.cloudsecurityalliance.org/csaguide.pdf ""Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 ""]||Independent Report||
|-
| U.S. Department of Energy, Infrastructure Security and Energy Restoration ||2007-01-01||[http://www.oe.netl.doe.gov/docs/prepare/21stepsbooklet.pdf ""21 Steps to Improve Cyber Security of SCADA Networks ""]||||
|-
| National Association of Secretaries of State ||2012-01-12||[http://www.nass.org/index.php?option=com_docman&task=doc_download&gid=1257 ""Developing State Solutions to Business Identity Theft: Assistance, Prevention and Detection Efforts by Secretary of State Offices ""]||||
|-
| RAND||2011-12-21||[http://www.rand.org/content/dam/rand/pubs/occasional_papers/2011/RAND_OP342.pdf ""A Cyberworm that Knows No Boundaries ""]||||
|-
| DOD ||2011-11-15||[http://www.defense.gov/home/features/2011/0411_cyberstrategy/docs/NDAA%20Section%20934%20Report_For%20webpage.pdf ""Department of Defense Cyberspace Policy Report : A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934 ""]||||
|-
| Symantec||2011-10-24||[http://www.symantec.com/connect/w32_duqu_precursor_next_stuxnet ""W32.Duqu: The Precursor to the Next Stuxnet ""]||||
|-
| Journal of Strategic Studies ||2011-10-05||[http://www.tandfonline.com/doi/abs/10.1080/01402390.2011.6089393 ""Cyber War Will Not Take Place ""]||||
|-
| McAfee ||2011-08-02||[http://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf ""Revealed: Operation Shady RAT: an Investigation Of Targeted Intrusions Into 70+ Global Companies, Governments, and Non-Profit Organizations During the Last 5 Years ""]||Industry Report||
|-
| Threat Level Blog (Wired) ||2010-12-27||[http://www.wired.com/threatlevel/2010/12/a-four-day-dive-into-stuxnets-heart/ ""A Four-Day Dive Into Stuxnet’s Heart ""]||Independent Report||
|-
| Institute for Science and International Security ||2010-12-22||[http://isis-online.org/isis-reports/detail/did-stuxnet-take-out-1000-centrifuges-at-the-natanz-enrichment-plant/ ""Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant? Preliminary Assessment ""]||||
|-
| Organisation for Economic Co-operation and Development (OECD) ||2010-11-12||[http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.165.2211&rep=rep1&type=pdf ""The Role of Internet Service Providers in Botnet Mitigation: an Empirical Analysis Bases on Spam Data ""]||||
|-
| European Network and Information Security Agency ||2010-10-07||[http://www.enisa.europa.eu/media/press-releases/stuxnet-analysis ""Stuxnet Analysis ""]||||
|-
| National Research Council ||2010-10-05||[http://www.nap.edu/catalog.php?record_id=12997#description ""Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy ""]||||
|-
| Council on Foreign Relations ||2010-07-15||[http://i.cfr.org/content/publications/attachments/Knake%20-Testimony%20071510.pdf ""Untangling Attribution: Moving to Accountability in Cyberspace [Testimony] ""]||||
|-
| McAfee ||2012-02-01||[http://www.mcafee.com/us/resources/reports/rp-sda-cyber-security.pdf?cid=WBB048 ""Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World ""]||industry Report||
|-
| Booz Allen Hamilton and the Economist Intelligence Unit ||2012-01-15||[http://www.cyberhub.com/CyberPowerIndex ""Cyber Power Index ""]||Industry Report||
|-
| Office of the National Counterintelligence Executive ||2011-11-03||[http://www.ncix.gov/publications/reports/fecie_all/Foreign_Economic_Collection_2011.pdf ""Foreign Spies Stealing US Economic Secrets in Cyberspace ""]||Government Report||
|-
| Cabinet Office (United Kingdom) ||2012-11-11||[http://www.cabinetoffice.gov.uk/sites/default/files/resources/uk-cyber-security-strategy-final.pdf ""The UK Cyber Security Strategy: Protecting and promoting the UK in a digital world ""]||Non-US Government Report||
|-
| Cyber Security Forum Initiative ||2011-05-09||[http://www.unveillance.com/wp-content/uploads/2011/05/Project_Cyber_Dawn_Public.pdf ""Cyber Dawn: Libya ""]||||
|-
| U.S. Army War College, Strategy Research Project ||2011-03-24||[http://www.dtic.mil/dtic/tr/fulltext/u2/a552990.pdf ""China’s Cyber Power and America’s National Security ""]||Government Report||
|-
| James Clapper, Director of National Intelligence ||2011-02-10||[http://www.dni.gov/testimonies/20110210_testimony_clapper.pdf ""Worldwide Threat Assessment of the U.S. Intelligence Community (Testimony) ""]||Government Report||
|-
| EastWest Institute ||2011-02-03||[http://vialardi.org/nastrazzuro/pdf/US-Russia.pdf ""Working Towards Rules for Governing Cyber Conflict: Rendering the Geneva and Hague Conventions in Cyberspace ""]||||
|-
| IEEE/EastWest Institute ||2010-05-26||[http://www.ieee-rogucci.org/files/The%20ROGUCCI%20Report.pdf ""The Reliability of Global Undersea Communications Cable Infrastructure (The Rogucci Report) ""]||||
|-
| International Telecommunications Union ||2012-02-10||[http://www.itu.int/ITU-D/cyb/cybersecurity/docs/itu-toolkit-cybercrime-legislation.pdf ""ITU Toolkit for Cybercrime Legislation ""]||||
|-
| General Accountability Office (GAO) ||2011-11-29||[http://www.gao.gov/products/GAO-12-8 ""Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination ""]||Government Report||
|-
| National Initiative for Cybersecurity Education (NICE) ||2011-11-21||[http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909505 ""NICE Cybersecurity Workforce Framework ""]||||
|-
| National Cyber Security Alliance and Microsoft ||2011-05-13||[http://www.staysafeonline.org/sites/default/files/resource_documents/2011%20National%20K-12%20Study%20Final_0.pdf ""2011 State of Cyberethics, Cybersafety and Cybersecurity Curriculum in the U.S. Survey ""]||||
|-
| Department of Defense ||2012-04-11||[http://www.nsci-va.org/CyberReferenceLib/2011-04-Cyber%20Ops%20Personnel.pdf ""Cyber Operations Personnel Report (DoD) ""]||Government Report||
|-
| University of Southern California (USC) Information Sciences Institute, University of California Berkeley (UCB), McAfee Research ||2011-01-13||[http://www.isi.edu/deter/news/news.php?story=20 ""Design of the DETER Security Testbed ""]||Independent Report||
|-
| Project on National Security Reform (PNSR) ||2012-11-10||[http://www.pnsr.org/data/images/pnsr_the_power_of_people_report.pdf ""The Power of People: Building an Integrated National Security Professional System for the 21st Century ""]||||
|-
| National Science Foundation (NSF) ||2012-01-17||[http://www.nsf.gov/awardsearch/showAward.do?AwardNumber=1127185 ""Information Security Risk Taking ""]||||
|-
| NSF ||2011-08-11||[http://www.livescience.com/15423-forefront-cyber-security-research-nsf-bts.html ""At the Forefront of Cyber Security Research ""]||||
|-
| White House ||2010-12-16||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-nitrd-report-2010.pdf ""Designing A Digital Future: Federally Funded Research And Development In Networking And Information Technology ""]||Government Report||
|-
| White House Office of Science and Technology Policy ||2010-12-06||[http://www.whitehouse.gov/blog/2010/12/06/partnership-cybersecurity-innovation ""Partnership for Cybersecurity Innovation ""]||Government Report||
|-
| Mitre Corp (JASON Program Office) ||2012-11-10||[http://www.fas.org/irp/agency/dod/jason/cyber.pdf ""Science of Cyber-Security ""]||||
|-
| National Security Initiative ||2010-10-18||[http://www.americansecuritychallenge.com/ ""American Security Challenge ""]||||
 
|}
|}
<includeonly>[[Template:Filtered Table|Filtered Table Template]]</includeonly>
<includeonly>[[Template:Filtered Table|Filtered Table Template]]</includeonly>

Revision as of 17:10, 8 June 2012

Filtering for type: All Types

Author/Agency Date Title Type Category
McAfee and the Security Defense Agenda 2012-02-12 ""Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World""
Business Roundtable 2012-10-11 ""Mission Critical: A Public-Private Strategy for Effective Cybersecurity ""
Centre for Secure Information Technologies 2012-09-11 ""World Cybersecurity Technology Research Summit (Belfast 2011) ""
National Security Cyberspace Institute 2012-07-11 Analogies Whitepaper-K McKee.pdf ""A Review of Frequently Used Cyber Analogies ""
Center for a New American Security 2012-06-11 ""America’s Cyber Future: Security and Prosperity in the Information Age ""
European Network and Information Security Agency (ENISA) 2011-04-11 ""Resilience of the Internet Interconnection Ecosystem, at: ""
Business Software Alliance, Center for Democracy & Technology, U.S. Chamber of Commerce, Internet Security Alliance, Tech America 2011-03-08 ""Improving our Nation’s Cybersecurity through the Public-Private Partnership: a White Paper ""
CSIS Commission on Cybersecurity for the 44th Presidency, Center for Strategic and International Studies 2011-01 ""Cybersecurity Two Years Later ""
National Research Council 2010-09-21 ""Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop ""
Joint Workshop of the National Security Threats in Cyberspace and the National Strategy Forum 2009-09-15 ""National Security Threats in Cyberspace ""
GAO 2012-02-28 ""Cybersecurity: Challenges to Securing the Modernized Electricity Grid "" Government Report
GAO 2011-12-09 ""Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use "" Government Report
GAO 2011-11-29 ""Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination, at: "" Government Report
GAO 2011-10-17 ""Federal Chief Information Officers: Opportunities Exist to Improve Role in Information Technology Management "" Government Report
GAO 2011-10-05 ""Information Security: Additional Guidance Needed to Address Cloud Computing Concerns "" Government Report
GAO 2011-10-03 ""Information Security: Weaknesses Continue Amid New Federal Efforts to Implement Requirements "" Government Report
GAO 2011-10-17 ""Federal Chief Information Officers: Opportunities Exist to Improve Role in Information Technology Management "" Government Report
GAO 2011-07-29 ""Defense Department Cyber Efforts: Definitions, Focal Point, and Methodology Needed for DoD to Develop Full-Spectrum Cyberspace Budget Estimates "" Government Report
GAO 2011-07-26 ""Continued Attention Needed to Protect Our Nation’s Critical Infrastructure "" Government Report
GAO 2011-07-25 ""Defense Department Cyber Efforts: DoD Faces Challenges in Its Cyber Activities "" Government Report
GAO 2010-08-16 ""Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed "" Government Report
GAO 2011-07-08 ""Information Security: State Has Taken Steps to Implement a Continuous Monitoring Application, but Key Challenges Remain "" Government Report
GAO 2011-03-16 ""Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure and Federal Information Systems "" Government Report
GAO 2011-01-12 ""Electricity Grid Modernization: Progress Being Made on Cybersecurity Guidelines, but Key Challenges Remain to be Addressed "" Government Report
GAO 2010-11-30 ""Information Security: Federal Agencies Have Taken Steps to Secure Wireless Networks, but Further Actions Can Mitigate Risk "" Government Report
GAO 2010-10-06 ""Cyberspace Policy: Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed "" Government Report
GAO 2010-09-23 ""DHS Efforts to Assess and Promote Resiliency Are Evolving but Program Management Could Be Strengthened "" Government Report
GAO 2010-09-15 ""Information Security: Progress Made on Harmonizing Policies and Guidance for National Security and Non-National Security Systems "" Government Report
GAO 2010-08-02 ""United States Faces Challenges in Addressing Global Cybersecurity and Governance "" Government Report
GAO 2010-07-01 ""Federal Guidance Needed to Address Control Issues With Implementing Cloud Computing "" Government Report
GAO 2010-06-16 ""Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats "" Government Report
GAO 2010-03-24 ""Information Security: Concerted Response Needed to Resolve Persistent Weaknesses, at: "" Government Report
GAO 2010-03-16 ""Cybersecurity: Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats "" Government Report
GAO 2010-04-12 ""Concerted Effort Needed to Consolidate and Secure Internet Connections at Federal Agencies "" Government Report
GAO 2010-03-05 ""Cybersecurity: Progress Made But Challenges Remain in Defining and Coordinating the Comprehensive National Initiative "" Government Report
GAO 2009-11-17 ""Continued Efforts Are Needed to Protect Information Systems from Evolving Threats "" Government Report
GAO 2003-08-27 ""Efforts to Improve Information sharing Need to Be Strengthened "" Government Report
White House/OMB 2011-12-06 ""Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program "" Government Report
White House/OMB 2011-10-07 ""Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information "" Government Report
White House/OMB 2011-09-14 ""FY 2012 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Managementa "" Government Report
White House/OMB 2011-05-16 ""International Strategy for Cyberspace "" Government Report
White House/OMB 2011-05-12 ""Cybersecurity Legislative Proposal (Fact Sheet) "" Government Report
White House/OMB 2011-02-13 ""Federal Cloud Computing Strategy "" Government Report
White House/OMB 2010-12-09 ""25 Point Implementation Plan to Reform Federal Information Technology Management "" Government Report
White House/OMB 2010-07-06 ""Clarifying Cybersecurity Responsibilities "" Government Report
White House/OMB 2010-06-25 ""The National Strategy for Trusted Identities in Cyberspace: Creating Options for Enhanced Online Security and Privacy "" Government Report
White House/OMB 2010-03-02 ""Comprehensive National Cybersecurity Initiative (CNCI) "" Government Report
White House/OMB 2009-05-29 ""Cyberspace Policy Review: Assuring a Trusted and Resilient Communications Infrastructure "" Government Report
DOD 2012-02-16 ""DOD Information Security Program: Overview, Classification, and Declassification "" Government Report
General Accountability Office (GAO) 2011-07-29 ""Defense Department Cyber Efforts: Definitions, Focal Point, and Methodology Needed for DOD to Develop Full-Spectrum Cyberspace Budget Estimates "" Government Report
Secretary of the Air Force 2011-07-27 ""Legal Reviews of Weapons and Cyber Capabilities "" Government Report
DOD 2011-07-14 ""Department of Defense Strategy for Operating in Cyberspace "" Government Report
DOD 2011-04 ""Cyber Operations Personnel Report (DOD) "" Government Report
National Research Council, Committee for Advancing Software-Intensive Systems Producibility 2010-10-20 ""Critical Code: Software Producibility for Defense "" Government Report
U.S. Deputy Secretary of Defense, William J. Lynn (Foreign Affairs) 2010-009 ""Defending a New Domain "" Government Report
Quadrennial Defense Review 2010-07-30 ""The QDR in Perspective: Meeting AmericaÅfs National Security Needs In the 21st Century (QDR Final Report) "" Government Report
U.S. Air Force 2010-07-15 ""Cyberspace Operations: Air Force Doctrine Document 3-12 "" Government Report
U.S. Navy 2010-06-17 ""DON (Department of the Navy) Cybersecurity/Information Assurance Workforce Management, Oversight and Compliance "" Government Report
NIST 2012-02-17 ""Recommendations for Establishing an Identity Ecosystem Governance Structure for the National Strategy for Trusted Identities in Cyberspace "" Government Report
Department of Commerce 2011-06-14 ""Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace "" Government Report
White House 2011-04-15 ""Administration Releases Strategy to Protect Online Consumers and Support Innovation and Fact Sheet on National Strategy for Trusted Identities in Cyberspace "" Government Report
White House 2011-04-15 ""National Strategy for Trusted Identities in Cyberspace "" Government Report
Business Software Alliance 2012-02-02 ""Global Cloud Computing Scorecard a Blueprint for Economic Opportunity ""
General Services Administration (GSA) 2012-02-07 ""Concept of Operations: FedRAMP "" Government Report
Federal CIO Council 2012-01-04 ""Federal Risk and Authorization Management Program (FedRAMP) "" Government Report
White House/Office of Management and Budget (OMB) 2011-12-08 ""Security Authorization of Information Systems in Cloud Computing Environments (FedRAMP) "" Government Report
NIST 2011-12-01 ""U.S. Government Cloud Computing Technology Roadmap, Volume I, Release 1.0 (Draft). High-Priority Requirements to Further USG Agency Cloud Computing Adoption "" Government Report
NIST 2011-12-01 ""U.S. Government Cloud Computing Technology Roadmap, Release 1.0 (Draft), Volume II Useful Information for Cloud Adopters "" Government Report
GAO 2011-10-05 ""Information Security: Additional Guidance Needed to Address Cloud Computing Concerns "" Government Report
NIST 2011-09-01 ""Cloud Computing Reference Architecture "" Government Report
Software and Information Industry Association (SAII) 2011-07-26 ""Guide to Cloud Computing for Policy Makers "" Government Report
White House 2011-02-13 ""Federal Cloud Computing Strategy "" Government Report
Department of Energy, Office of Electricity Delivery & Energy Reliability 1899-12-30 ""Cybersecurity for Energy Delivery Systems Program "" Government Report
Organization for Economic Co-operation and Development (OECD) 2012-01-10 ""ICT Applications for the Smart Grid: Opportunities and Policy Implications "" Government Report
Department of Energy (DOE) Inspector General 2012-01-01 ""The Department’s Management of the Smart Grid Investment Grant Program "" Government Report
General Accountability Office (GAO) 2011-12-09 ""Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use "" Government Report
Massachusetts Institute of Technology (MIT) 2011-12-05 ""The Future of the Electric Grid "" Independent Report
Federal Communications Commission (FCC) 2011-06-03 db0610/DOC-307454A1.txt ""FCC's Plan for Ensuring the Security of Telecommunications Networks""
U.S. Army War College 2011-05-09 ""Cyber Infrastructure Protection ""
McAfee and Center for Strategic and International Studies (CSIS) 2011-04-21 ""In the Dark: Crucial Industries Confront Cyberattacks ""
General Accountability Office (GAO) 2011-03-16 ""Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure and Federal Information Systems ""
North American Electric Reliability Corp. (NERC) 2011-01-26 ""Federal Energy Regulatory Commission's Monitoring of Power Grid Cyber Security ""
General Accountability Office (GAO) 2011-01-12 ""Electricity Grid Modernization: Progress Being Made on Cybersecurity Guidelines, but Key Challenges Remain to be Addressed ""
White House (Office of Science & Technology Policy) 2010-12-06 ""Partnership for Cybersecurity Innovation ""
International Instrument Users Association (WIB) 2010-11-10 ""WIB Security Standard Released ""
Microsoft 2012-11-10 ""Information Security Management System for Microsoft Cloud Infrastructure ""
National Institute of Standards and Technology (NIST) 2010-09-02 ""NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines ""
General Accountability Office (GAO) 2010-07-15 ""Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed ""
Pew Research Center’s Internet & American Life Project 2010-06-11 ""The future of cloud computing ""
IEEE/EastWest Institute 2010-05-26 ""The Reliability of Global Undersea Communications Cable Infrastructure (The ROGUCCI Report) ""
Department of Energy, Idaho National Laboratory 2010-05-01 ""NSTB Assessments Summary Report: Common Industrial Control System Cyber Security Weaknesses ""
Federal Communications Commission (FCC) 2010-04-21 ""Explore the reliability and resiliency of commercial broadband communications networks ""
Cloud Security Alliance 2012-12-09 ""Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 "" Independent Report
U.S. Department of Energy, Infrastructure Security and Energy Restoration 2007-01-01 ""21 Steps to Improve Cyber Security of SCADA Networks ""
National Association of Secretaries of State 2012-01-12 ""Developing State Solutions to Business Identity Theft: Assistance, Prevention and Detection Efforts by Secretary of State Offices ""
RAND 2011-12-21 ""A Cyberworm that Knows No Boundaries ""
DOD 2011-11-15 ""Department of Defense Cyberspace Policy Report : A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934 ""
Symantec 2011-10-24 ""W32.Duqu: The Precursor to the Next Stuxnet ""
Journal of Strategic Studies 2011-10-05 ""Cyber War Will Not Take Place ""
McAfee 2011-08-02 ""Revealed: Operation Shady RAT: an Investigation Of Targeted Intrusions Into 70+ Global Companies, Governments, and Non-Profit Organizations During the Last 5 Years "" Industry Report
Threat Level Blog (Wired) 2010-12-27 ""A Four-Day Dive Into Stuxnet’s Heart "" Independent Report
Institute for Science and International Security 2010-12-22 ""Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant? Preliminary Assessment ""
Organisation for Economic Co-operation and Development (OECD) 2010-11-12 ""The Role of Internet Service Providers in Botnet Mitigation: an Empirical Analysis Bases on Spam Data ""
European Network and Information Security Agency 2010-10-07 ""Stuxnet Analysis ""
National Research Council 2010-10-05 ""Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy ""
Council on Foreign Relations 2010-07-15 ""Untangling Attribution: Moving to Accountability in Cyberspace [Testimony ""]
McAfee 2012-02-01 ""Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World "" industry Report
Booz Allen Hamilton and the Economist Intelligence Unit 2012-01-15 ""Cyber Power Index "" Industry Report
Office of the National Counterintelligence Executive 2011-11-03 ""Foreign Spies Stealing US Economic Secrets in Cyberspace "" Government Report
Cabinet Office (United Kingdom) 2012-11-11 ""The UK Cyber Security Strategy: Protecting and promoting the UK in a digital world "" Non-US Government Report
Cyber Security Forum Initiative 2011-05-09 ""Cyber Dawn: Libya ""
U.S. Army War College, Strategy Research Project 2011-03-24 ""China’s Cyber Power and America’s National Security "" Government Report
James Clapper, Director of National Intelligence 2011-02-10 ""Worldwide Threat Assessment of the U.S. Intelligence Community (Testimony) "" Government Report
EastWest Institute 2011-02-03 ""Working Towards Rules for Governing Cyber Conflict: Rendering the Geneva and Hague Conventions in Cyberspace ""
IEEE/EastWest Institute 2010-05-26 ""The Reliability of Global Undersea Communications Cable Infrastructure (The Rogucci Report) ""
International Telecommunications Union 2012-02-10 ""ITU Toolkit for Cybercrime Legislation ""
General Accountability Office (GAO) 2011-11-29 ""Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination "" Government Report
National Initiative for Cybersecurity Education (NICE) 2011-11-21 ""NICE Cybersecurity Workforce Framework ""
National Cyber Security Alliance and Microsoft 2011-05-13 ""2011 State of Cyberethics, Cybersafety and Cybersecurity Curriculum in the U.S. Survey ""
Department of Defense 2012-04-11 ""Cyber Operations Personnel Report (DoD) "" Government Report
University of Southern California (USC) Information Sciences Institute, University of California Berkeley (UCB), McAfee Research 2011-01-13 ""Design of the DETER Security Testbed "" Independent Report
Project on National Security Reform (PNSR) 2012-11-10 ""The Power of People: Building an Integrated National Security Professional System for the 21st Century ""
National Science Foundation (NSF) 2012-01-17 ""Information Security Risk Taking ""
NSF 2011-08-11 ""At the Forefront of Cyber Security Research ""
White House 2010-12-16 ""Designing A Digital Future: Federally Funded Research And Development In Networking And Information Technology "" Government Report
White House Office of Science and Technology Policy 2010-12-06 ""Partnership for Cybersecurity Innovation "" Government Report
Mitre Corp (JASON Program Office) 2012-11-10 ""Science of Cyber-Security ""
National Security Initiative 2010-10-18 ""American Security Challenge ""