Template:Filtered Table: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 7: Line 7:
| align="center" style="background:#f0f0f0;"|'''Type'''
| align="center" style="background:#f0f0f0;"|'''Type'''
| align="center" style="background:#f0f0f0;"|'''Category'''
| align="center" style="background:#f0f0f0;"|'''Category'''
| align="center" style="background:#f0f0f0;"|'''Synopsis'''
|-
|-
<noinclude>| McAfee and the Security Defense Agenda||2012-02-12||[http://www.mcafee.com/us/resources/reports/rp-sda-cyber-security.pdf ""Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World""]||||
<noinclude>
| White House||2009||[http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure]||Government Report||||No
|-
|-
| Business Roundtable||2012-10-11||[http://businessroundtable.org/uploads/studies-reports/downloads/2011_10_Mission_Critical_A_Public-Private_Strategy_for_Effective_Cybersecurity.pdf ""Mission Critical: A Public-Private Strategy for Effective Cybersecurity ""]||||
| White House||2011-04||[http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy]||Government Report||||No
|-
|-
| Centre for Secure Information Technologies||2012-09-11||[http://www.csit.qub.ac.uk/media/pdf/Filetoupload,252359,en.pdf ""World Cybersecurity Technology Research Summit (Belfast 2011) ""]||||
| White House||2011-05||[http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World]||Government Report||||No
|-
|-
| National Security Cyberspace Institute||2012-07-11||[http://www.nsci-va.org/WhitePapers/2011-07-22-Cyber Analogies Whitepaper-K McKee.pdf ""A Review of Frequently Used Cyber Analogies ""]||||
| NSTC||2011-12||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/fed_cybersecurity_rd_strategic_plan_2011.pdf Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity]||Government Report||||No
|-
|-
| Center for a New American Security||2012-06-11||[http://www.cnas.org/node/6405 ""America’s Cyber Future: Security and Prosperity in the Information Age ""]||||
| White House||2012-01||[http://www.whitehouse.gov/sites/default/files/national_strategy_for_global_supply_chain_security.pdf National Strategy for Global Supply Chain Security]||Government Report||||No
|-
|-
| European Network and Information Security Agency (ENISA) ||2011-04-11||[http://www.enisa.europa.eu/act/res/other-areas/inter-x/report/interx-report ""Resilience of the Internet Interconnection Ecosystem, at: ""]||||
| White House||2012-02||[http://www.whitehouse.gov/sites/default/files/privacy-final.pdf Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy]||Government Report||||No
|-
|-
| Business Software Alliance, Center for Democracy & Technology, U.S. Chamber of Commerce, Internet Security Alliance, Tech America ||2011-03-08||[http://www.cdt.org/files/pdfs/20110308_cbyersec_paper.pdf ""Improving our Nation’s Cybersecurity through the Public-Private Partnership: a White Paper ""]||||
| Kundra, Vivek||2011-02-08||[http://www.cio.gov/documents/federal-cloud-computing-strategy.pdf Federal Cloud Computing Strategy]||Government Report||||No
|-
|-
| CSIS Commission on Cybersecurity for the 44th Presidency, Center for Strategic and International Studies ||2011-01||[http://csis.org/files/publication/110128_Lewis_CybersecurityTwoYearsLater_Web.pdf ""Cybersecurity Two Years Later ""]||||
| Kundra, Vivek||2010-12-09||[http://www.cio.gov/documents/25-point-implementation-plan-to-reform-federal%20it.pdf 25 Point Implementation Plan to Reform Federal Information Technology Management]||Government Report||||No
|-
|-
| National Research Council ||2010-09-21||[http://www.nap.edu/catalog.php?record_id=12998 ""Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop ""]||||
| PCAST||2010-12||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-nitrd-report-2010.pdf Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technology]||Government Report||||No
|-
|-
| Joint Workshop of the National Security Threats in Cyberspace and the National Strategy Forum ||2009-09-15||[http://nationalstrategy.com/Portals/0/National%20Security%20Threats%20in%20Cyberspace%20FINAL%2009-15-09.pdf  ""National Security Threats in Cyberspace ""]||||
| PCAST||2011-06||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-advanced-manufacturing-june2011.pdf Report to the President on Ensuring American Leadership in Advanced Manufacturing]||Government Report||||No
|-</noinclude>
| GAO||2012-02-28||[http://www.csit.qub.ac.uk/media/pdf/Filetoupload,252359,en.pdf ""Cybersecurity: Challenges to Securing the Modernized Electricity Grid ""]||Government Report ||
|-
|-
| GAO||2011-12-09||[http://www.gao.gov/products/GAO-12-92 ""Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use ""]||Government Report ||
| DHS||2009-11||[http://www.cyber.st.dhs.gov/docs/DHS-Cybersecurity-Roadmap.pdf A Roadmap for Cybersecurity Research]||Government Report||||No
|-
|-
| GAO||2011-11-29||[http://www.gao.gov/products/GAO-12-8 ""Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination, at: ""]||Government Report ||
| DHS||2009-09-16||[http://www.cyber.st.dhs.gov/docs/National_Cyber_Leap_Year_Summit_2009_Co-Chairs_Report.pdf National Cyber Leap Year Summit 2009]||Government Report||||No
|-
|-
| GAO||2011-10-17||[http://www.gao.gov/products/GAO-11-634 ""Federal Chief Information Officers: Opportunities Exist to Improve Role in Information Technology Management ""]||Government Report ||
| DHS||2010-09||[http://www.federalnewsradio.com/pdfs/NCIRP_Interim_Version_September_2010.pdf National Cyber Incident Response Plan]||Government Report||||No
|-
|-
| GAO||2011-10-05||[http://www.gao.gov/products/GAO-12-130T ""Information Security: Additional Guidance Needed to Address Cloud Computing Concerns ""]||Government Report ||
| Department of Commerce, Internet Policy Task Force||2011-06||[http://www.nist.gov/itl/upload/Cybersecurity_Green-Paper_FinalVersion.pdf Cybersecurity, Innovation and the Internet Economy]||Government Report||||No
|-
|-
| GAO||2011-10-03||[http://www.gao.gov/products/GAO-12-137 ""Information Security: Weaknesses Continue Amid New Federal Efforts to Implement Requirements ""]||Government Report ||
| DOD ||2011-07-14||[http://www.defense.gov/news/d20110714cyber.pdf Department of Defense Strategy for Operating in Cyberspace ]||Government Report ||||No
|-
|-
| GAO||2011-10-17||[http://www.gao.gov/products/GAO-11-634 ""Federal Chief Information Officers: Opportunities Exist to Improve Role in Information Technology Management ""]||Government Report ||
| DHS||2011-11||[http://www.dhs.gov/xlibrary/assets/nppd/blueprint-for-a-secure-cyber-future.pdf Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise]||Government Report||||No
|-
|-
| GAO||2011-07-29||[http://www.gao.gov/products/GAO-11-695R ""Defense Department Cyber Efforts: Definitions, Focal Point, and Methodology Needed for DoD to Develop Full-Spectrum Cyberspace Budget Estimates ""]||Government Report ||
| National Initiative for Cybersecurity Education||2011-08-11||[http://csrc.nist.gov/nice/documents/nicestratplan/Draft_NICE-Strategic-Plan_Aug2011.pdf National Initiative for Cybersecurity Education Strategic Plan: Building a Digital Nation]||Government Report||||No
|-
|-
| GAO||2011-07-26||[http://www.gao.gov/products/GAO-11-463T ""Continued Attention Needed to Protect Our Nation’s Critical Infrastructure ""]||Government Report ||
| Energy Sector Control Systems Working Group||2011-09||[http://www.cyber.st.dhs.gov/wp-content/uploads/2011/09/Energy_Roadmap.pdf Roadmap to Achieve Energy Delivery Systems Cybersecurity]||Government Report||||No
|-
|-
| GAO||2011-07-25||[http://www.gao.gov/products/GAO-11-75 ""Defense Department Cyber Efforts: DoD Faces Challenges in Its Cyber Activities ""]||Government Report ||
| GAO||2011-07-25||[http://www.gao.gov/products/GAO-11-75 Defense Department Cyber Efforts: DoD Faces Challenges in Its Cyber Activities ]||Government Report ||||No
|-
|-
| GAO||2010-08-16||[http://www.gao.gov/products/GAO-10-628 ""Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed ""]||Government Report ||
| GAO||2011-11-29||[http://www.gao.gov/products/GAO-12-8 Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination ]||Government Report||||No
|-
|-
| GAO||2011-07-08||[http://www.gao.gov/products/GAO-11-149 ""Information Security: State Has Taken Steps to Implement a Continuous Monitoring Application, but Key Challenges Remain ""]||Government Report ||
| GAO||2011-07-26||[http://www.gao.gov/products/GAO-11-463T Continued Attention Needed to Protect Our Nation’s Critical Infrastructure ]||Government Report ||||No
|-
|-
| GAO||2011-03-16||[http://www.gao.gov/products/GAO-11-463T ""Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure and Federal Information Systems ""]||Government Report ||
| GAO||2011-10-03||[http://www.gao.gov/products/GAO-12-137 Information Security: Weaknesses Continue Amid New Federal Efforts to Implement Requirements ]||Government Report ||||No
|-
|-
| GAO||2011-01-12||[http://www.gao.gov/products/GAO-11-117 ""Electricity Grid Modernization: Progress Being Made on Cybersecurity Guidelines, but Key Challenges Remain to be Addressed ""]||Government Report ||
| GAO||2010-10-06||[http://www.gao.gov/products/GAO-11-24 Cyberspace Policy: Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed ]||Government Report ||||No
|-
|-
| GAO||2010-11-30||[http://www.gao.gov/products/GAO-11-43 ""Information Security: Federal Agencies Have Taken Steps to Secure Wireless Networks, but Further Actions Can Mitigate Risk ""]||Government Report ||
| GAO||2010-06-16||[http://www.gao.gov/products/GAO-10-834t Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats ]||Government Report ||||No
|-
|-
| GAO||2010-10-06||[http://www.gao.gov/products/GAO-11-24 ""Cyberspace Policy: Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed ""]||Government Report ||
| GAO||2009-07||[http://www.gao.gov/new.items/d09546.pdf Information Security: Agencies Continue to Report Progress, but Need to. Mitigate Persistent Weaknesses]||Government Report||||No
|-
|-
| GAO||2010-09-23||[http://www.gao.gov/products/GAO-10-772 ""DHS Efforts to Assess and Promote Resiliency Are Evolving but Program Management Could Be Strengthened ""]||Government Report ||
| GAO||2009-09-24||[http://www.gao.gov/new.items/d09969.pdf Critical Infrastructure Protection: Current Cyber Sector-Specific Planning Approach Needs Reassessment]||Government Report||||No
|-
|-
| GAO||2010-09-15||[http://www.gao.gov/products/GAO-10-916 ""Information Security: Progress Made on Harmonizing Policies and Guidance for National Security and Non-National Security Systems ""]||Government Report ||
| GAO||2009-09||[http://www.gao.gov/new.items/d09617.pdf Information Security: Concerted Effort Needed to Improve Federal Performance Measures]||Government Report||||No
|-
|-
| GAO||2010-08-02||[http://www.gao.gov/products/GAO-10-606 ""United States Faces Challenges in Addressing Global Cybersecurity and Governance ""]||Government Report ||
| GAO||2010-06-03||[http://www.gao.gov/assets/310/305208.pdf Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development]||Government Report||||No
|-
|-
| GAO||2010-07-01||[http://www.gao.gov/products/GAO-10-513 ""Federal Guidance Needed to Address Control Issues With Implementing Cloud Computing ""]||Government Report ||
| GAO||2008-07-31||[http://www.gao.gov/assets/280/279084.pdf Cyber Analysis And Warning: DHS Faces Challenges in Establishing a Comprehensive National Capability]||Government Report||||No
</noinclude>|-
| GAO||2004-05-28||[http://www.gao.gov/assets/160/157541.pdf Technology Assessment: Cybersecurity for Critical Infrastructure Protection]||Government Report||||No
|-
|-
| GAO||2010-06-16||[http://www.gao.gov/products/GAO-10-834t ""Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats ""]||Government Report ||
| GAO||2010-07-15||[http://www.gao.gov/assets/310/307222.pdf Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed]||Government Report||||No
|-
|-
| GAO||2010-03-24||[http://www.gao.gov/products/GAO-10-536t ""Information Security: Concerted Response Needed to Resolve Persistent Weaknesses, at: ""]||Government Report ||
| GAO||2012-01-13||[http://www.gao.gov/assets/590/587681.pdf Defense Contracting: Improved Policies and Tools Could Help Increase Competition on DOD's National Security Exception Procurements]||Government Report||||No
|-
|-
| GAO||2010-03-16||[http://www.gao.gov/products/GAO-11-463T ""Cybersecurity: Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats ""]||Government Report ||
| Fischer, Eric A.<br />CRS||2012-04-23||[http://www.fas.org/sgp/crs/natsec/R42114.pdf Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions]||Government Report||||No
|-
|-
| GAO||2010-04-12||[http://www.gao.gov/products/GAO-10-237 ""Concerted Effort Needed to Consolidate and Secure Internet Connections at Federal Agencies ""]||Government Report ||
| Kerr, Paul K. et al.<br />CRS||2010-12-09||[http://www.fas.org/sgp/crs/natsec/R41524.pdf The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability]||Government Report||||No
|-
|-
| GAO||2010-03-05||[http://www.gao.gov/products/GAO-10-338 ""Cybersecurity: Progress Made But Challenges Remain in Defining and Coordinating the Comprehensive National Initiative ""]||Government Report ||
| Wilson, Clay<br />CRS||2007-03-20||[http://www.fas.org/sgp/crs/natsec/RL31787.pdf Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues]||Government Report||||No
|-
|-
| GAO||2009-11-17||[http://www.gao.gov/products/GAO-10-230t ""Continued Efforts Are Needed to Protect Information Systems from Evolving Threats ""]||Government Report ||
| Department of Energy||2012-04||[http://energy.gov/sites/prod/files/OAS-RA-12-04.pdf The Department's Management of the Smart Grid Investment Grant Program]||Government Report||||No
|-
|-
| GAO||2003-08-27||[http://www.gao.gov/products/GAO-03-760 ""Efforts to Improve Information sharing Need to Be Strengthened ""]||Government Report ||
| Department of Justice||2011-04||[http://www.justice.gov/oig/reports/FBI/a1122r.pdf The Federal Bureau of Investigation's Ability to Address the National Security Cyber Intrusion Threat]||Government Report||||No
|-
|-
| White House/OMB||2011-12-06||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/fed_cybersecurity_rd_strategic_plan_2011.pdf ""Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program ""]||Government Report ||
| DHS||2010-08||[http://www.dhs.gov/xoig/assets/mgmtrpts/OIG_10-111_Aug10.pdf DHS Needs to Improve the Security Posture of Its Cybersecurity Program Systems]||Government Report||||No
|-
|-
| White House/OMB||2011-10-07||[http://www.whitehouse.gov/the-press-office/2011/10/07/executive-order-structural-reforms-improve-security-classified-networks- ""Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information ""]||Government Report ||
| DHS||2007-06||[http://www.oig.dhs.gov/assets/Mgmt/OIG_07-48_Jun07.pdf Challenges Remain in Securing the Nation’s Cyber Infrastructure]||Government Report||||No
|-
| White House/OMB||2011-09-14||[http://www.whitehouse.gov/sites/default/files/omb/memoranda/2011/m11-33.pdf ""FY 2012 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Managementa ""]||Government Report ||
|-
| White House/OMB||2011-05-16||[http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf ""International Strategy for Cyberspace ""]||Government Report ||
|-
| White House/OMB||2011-05-12||[http://www.whitehouse.gov/the-press-office/2011/05/12/fact-sheet-cybersecurity-legislative-proposal ""Cybersecurity Legislative Proposal (Fact Sheet) ""]||Government Report ||
|-
| White House/OMB||2011-02-13||[http://www.cio.gov/documents/Federal-Cloud-Computing-Strategy.pdf ""Federal Cloud Computing Strategy ""]||Government Report ||
|-
| White House/OMB||2010-12-09||[http://www.cio.gov/documents/25-Point-Implementation-Plan-to-Reform-Federal%20IT.pdf ""25 Point Implementation Plan to Reform Federal Information Technology Management ""]||Government Report ||
|-
| White House/OMB||2010-07-06||[http://www.whitehouse.gov/sites/default/files/omb/assets/memoranda_2010/m10-28.pdf ""Clarifying Cybersecurity Responsibilities ""]||Government Report ||
|-
| White House/OMB||2010-06-25||[http://www.dhs.gov/xlibrary/assets/ns_tic.pdf ""The National Strategy for Trusted Identities in Cyberspace: Creating Options for Enhanced Online Security and Privacy ""]||Government Report ||
|-
| White House/OMB||2010-03-02||[http://www.whitehouse.gov/cybersecurity/comprehensive-national-cybersecurity-initiative ""Comprehensive National Cybersecurity Initiative (CNCI) ""]||Government Report ||
|-
| White House/OMB||2009-05-29||[http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf ""Cyberspace Policy Review: Assuring a Trusted and Resilient Communications Infrastructure ""]||Government Report ||
|-
| DOD ||2012-02-16||[http://www.fas.org/sgp/othergov/dod/5200_01v1.pdf ""DOD Information Security Program: Overview, Classification, and Declassification ""]||Government Report ||
|-
| General Accountability Office (GAO) ||2011-07-29||[http://www.gao.gov/products/GAO-11-695R ""Defense Department Cyber Efforts: Definitions, Focal Point, and Methodology Needed for DOD to Develop Full-Spectrum Cyberspace Budget Estimates ""]||Government Report ||
|-
| Secretary of the Air Force ||2011-07-27||[http://www.e-publishing.af.mil/shared/media/epubs/AFI51-402.pdf ""Legal Reviews of Weapons and Cyber Capabilities ""]||Government Report ||
|-
| DOD ||2011-07-14||[http://www.defense.gov/news/d20110714cyber.pdf ""Department of Defense Strategy for Operating in Cyberspace ""]||Government Report ||
|-
| DOD ||2011-04||[http://www.nsci-va.org/CyberReferenceLib/2011-04-Cyber%20Ops%20Personnel.pdf ""Cyber Operations Personnel Report (DOD) ""]||Government Report ||
|-
| National Research Council, Committee for Advancing Software-Intensive Systems Producibility ||2010-10-20||[http://www.nap.edu/catalog.php?record_id=12979 ""Critical Code: Software Producibility for Defense ""]||Government Report ||
|-
| U.S. Deputy Secretary of Defense, William J. Lynn (Foreign Affairs) ||2010-009||[http://www.foreignaffairs.com/articles/66552/william-j-lynn-iii/defending-a-new-domain ""Defending a New Domain ""]||Government Report ||
|-
| Quadrennial Defense Review ||2010-07-30||[http://www.usip.org/quadrennial-defense-review-independent-panel-/view-the-report ""The QDR in Perspective: Meeting AmericaÅfs National Security Needs In the 21st Century (QDR Final Report) ""]||Government Report ||
|-
| U.S. Air Force ||2010-07-15||[http://www.e-publishing.af.mil/shared/media/epubs/afdd3-12.pdf ""Cyberspace Operations: Air Force Doctrine Document 3-12 ""]||Government Report ||
|-
| U.S. Navy ||2010-06-17||[http://www.doncio.navy.mil/PolicyView.aspx?ID=1804 ""DON (Department of the Navy) Cybersecurity/Information Assurance Workforce Management, Oversight and Compliance ""]||Government Report ||
|-
| NIST ||2012-02-17||[http://www.nist.gov/nstic/2012-nstic-governance-recs.pdf ""Recommendations for Establishing an Identity Ecosystem Governance Structure for the National Strategy for Trusted Identities in Cyberspace ""]||Government Report ||
|-
| Department of Commerce ||2011-06-14||[http://www.nist.gov/nstic/2012-nstic-governance-recs.pdf ""Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace ""]||Government Report ||
|-
| White House ||2011-04-15||[http://www.whitehouse.gov/the-press-office/2011/04/15/administration-releases-strategy-protect-online-consumers-and-support-in ""Administration Releases Strategy to Protect Online Consumers and Support Innovation and Fact Sheet on National Strategy for Trusted Identities in Cyberspace ""]||Government Report ||
|-
| White House ||2011-04-15||[http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf ""National Strategy for Trusted Identities in Cyberspace ""]||Government Report ||
|-
| Business Software Alliance ||2012-02-02||[http://portal.bsa.org/cloudscorecard2012/ ""Global Cloud Computing Scorecard a Blueprint for Economic Opportunity ""]||||
|-
| General Services Administration (GSA) ||2012-02-07||[http://www.gsa.gov/graphics/staffoffices/FedRAMP_CONOPS.pdf ""Concept of Operations: FedRAMP ""]||Government Report ||
|-
| Federal CIO Council ||2012-01-04||[http://www.gsa.gov/portal/category/102371 ""Federal Risk and Authorization Management Program (FedRAMP) ""]||Government Report ||
|-
| White House/Office of Management and Budget (OMB) ||2011-12-08||[http://www.cio.gov/fedrampmemo.pdf ""Security Authorization of Information Systems in Cloud Computing Environments (FedRAMP) ""]||Government Report ||
|-
| NIST ||2011-12-01||[http://www.nist.gov/itl/cloud/upload/SP_500_293_volumeI-2.pdf ""U.S. Government Cloud Computing Technology Roadmap, Volume I, Release 1.0 (Draft). High-Priority Requirements to Further USG Agency Cloud Computing Adoption ""]||Government Report ||
|-
| NIST ||2011-12-01||[http://www.nist.gov/itl/cloud/upload/SP_500_293_volumeII.pdf ""U.S. Government Cloud Computing Technology Roadmap, Release 1.0 (Draft), Volume II Useful Information for Cloud Adopters ""]||Government Report ||
|-
| GAO ||2011-10-05||[http://www.gao.gov/products/GAO-12-130T ""Information Security: Additional Guidance Needed to Address Cloud Computing Concerns ""]||Government Report ||
|-
| NIST ||2011-09-01||[http://www.nist.gov/customcf/get_pdf.cfm?pub_id=909505 ""Cloud Computing Reference Architecture ""]||Government Report ||
|-
| Software and Information Industry Association (SAII) ||2011-07-26||[http://www.siia.net/index.php?option=com_docman&task=doc_download&gid=3040&Itemid=318 ""Guide to Cloud Computing for Policy Makers ""]||Government Report ||
|-
| White House ||2011-02-13||[http://www.cio.gov/documents/Federal-Cloud-Computing-Strategy.pdf ""Federal Cloud Computing Strategy ""]||Government Report ||
|-
| Department of Energy, Office of Electricity Delivery & Energy Reliability ||1899-12-30||[http://energy.gov/oe/technology-development/energy-delivery-systems-cybersecurity ""Cybersecurity for Energy Delivery Systems Program ""]||Government Report ||
|-
| Organization for Economic Co-operation and Development (OECD) ||2012-01-10||[http://www.oecd-ilibrary.org/docserver/download/fulltext/5k9h2q8v9bln.pdf?expires=1330527950&id=id&accname=guest&checksum=F4470043AC638BE19D5131C3D5CE5EA4 ""ICT Applications for the Smart Grid: Opportunities and Policy Implications ""]||Government Report ||
|-
| Department of Energy (DOE) Inspector General ||2012-01-01||[http://energy.gov/ig/downloads/departments-management-smart-grid-investment-grant-program-oas-ra-12-04 ""The Department’s Management of the Smart Grid Investment Grant Program ""]||Government Report ||
|-
| General Accountability Office (GAO) ||2011-12-09||[http://www.gao.gov/products/GAO-12-92 ""Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use ""]||Government Report ||
|-
| Massachusetts Institute of Technology (MIT) ||2011-12-05||[http://web.mit.edu/mitei/research/studies/the-electric-grid-2011.shtml ""The Future of the Electric Grid ""]||Independent Report||
|-
<noinclude>| Federal Communications Commission (FCC) ||2011-06-03||[ftp://ftp.fcc.gov/pub/Daily_Releases/Daily_Business/2011/ db0610/DOC-307454A1.txt  ""FCC's Plan for Ensuring the Security of Telecommunications Networks""]||||
|-
| U.S. Army War College ||2011-05-09||[http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?pubid=10670 ""Cyber Infrastructure Protection ""]||||
|-
| McAfee and Center for Strategic and International Studies (CSIS) ||2011-04-21||[http://www.mcafee.com/us/resources/reports/rp-critical-infrastructure-protection.pdf ""In the Dark: Crucial Industries Confront Cyberattacks ""]||||
|-
| General Accountability Office (GAO) ||2011-03-16||[http://www.gao.gov/products/GAO-11-463T ""Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure and Federal Information Systems ""]||||
|-
| North American Electric Reliability Corp. (NERC) ||2011-01-26||[http://www.wired.com/images_blogs/threatlevel/2011/02/DoE-IG-Report-on-Grid-Security.pdf ""Federal Energy Regulatory Commission's Monitoring of Power Grid Cyber Security ""]||||
|-
| General Accountability Office (GAO) ||2011-01-12||[http://www.gao.gov/products/GAO-11-117 ""Electricity Grid Modernization: Progress Being Made on Cybersecurity Guidelines, but Key Challenges Remain to be Addressed ""]||||
|-
| White House (Office of Science & Technology Policy) ||2010-12-06||[http://www.whitehouse.gov/blog/2010/12/06/partnership-cybersecurity-innovation ""Partnership for Cybersecurity Innovation ""]||||
|-
| International Instrument Users Association (WIB) ||2010-11-10||[http://www.isssource.com/wib/ ""WIB Security Standard Released ""]||||
|-
| Microsoft||2012-11-10||[http://cdn.globalfoundationservices.com/documents/InformationSecurityMangSysforMSCloudInfrastructure.pdf ""Information Security Management System for Microsoft Cloud Infrastructure ""]||||
|-
| National Institute of Standards and Technology (NIST) ||2010-09-02||[http://www.nist.gov/public_affairs/releases/nist-finalizes-initial-set-of-smart-grid-cyber-security-guidelines.cfm ""NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines ""]||||
|-
| General Accountability Office (GAO) ||2010-07-15||[http://www.gao.gov/products/GAO-10-628 ""Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed ""]||||
|-
| Pew Research Center’s Internet & American Life Project ||2010-06-11||[http://pewinternet.org/Reports/2010/The-future-of-cloud-computing.aspx ""The future of cloud computing ""]||||
|-
| IEEE/EastWest Institute ||2010-05-26||[http://www.ieee-rogucci.org/files/The%20ROGUCCI%20Report.pdf ""The Reliability of Global Undersea Communications Cable Infrastructure (The ROGUCCI Report) ""]||||
|-
| Department of Energy, Idaho National Laboratory ||2010-05-01||[http://www.fas.org/sgp/eprint/nstb.pdf ""NSTB Assessments Summary Report: Common Industrial Control System Cyber Security Weaknesses ""]||||
|-
| Federal Communications Commission (FCC) ||2010-04-21||[http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-305618A1.doc ""Explore the reliability and resiliency of commercial broadband communications networks ""]||||
|-
| Cloud Security Alliance ||2012-12-09||[http://www.cloudsecurityalliance.org/csaguide.pdf ""Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 ""]||Independent Report||
|-
| U.S. Department of Energy, Infrastructure Security and Energy Restoration ||2007-01-01||[http://www.oe.netl.doe.gov/docs/prepare/21stepsbooklet.pdf ""21 Steps to Improve Cyber Security of SCADA Networks ""]||||
|-
| National Association of Secretaries of State ||2012-01-12||[http://www.nass.org/index.php?option=com_docman&task=doc_download&gid=1257 ""Developing State Solutions to Business Identity Theft: Assistance, Prevention and Detection Efforts by Secretary of State Offices ""]||||
|-
| RAND||2011-12-21||[http://www.rand.org/content/dam/rand/pubs/occasional_papers/2011/RAND_OP342.pdf ""A Cyberworm that Knows No Boundaries ""]||||
|-
| DOD ||2011-11-15||[http://www.defense.gov/home/features/2011/0411_cyberstrategy/docs/NDAA%20Section%20934%20Report_For%20webpage.pdf ""Department of Defense Cyberspace Policy Report : A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934 ""]||||
|-
| Symantec||2011-10-24||[http://www.symantec.com/connect/w32_duqu_precursor_next_stuxnet ""W32.Duqu: The Precursor to the Next Stuxnet ""]||||
|-
| Journal of Strategic Studies ||2011-10-05||[http://www.tandfonline.com/doi/abs/10.1080/01402390.2011.6089393 ""Cyber War Will Not Take Place ""]||||
|-
| McAfee ||2011-08-02||[http://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf ""Revealed: Operation Shady RAT: an Investigation Of Targeted Intrusions Into 70+ Global Companies, Governments, and Non-Profit Organizations During the Last 5 Years ""]||Industry Report||
|-
| Threat Level Blog (Wired) ||2010-12-27||[http://www.wired.com/threatlevel/2010/12/a-four-day-dive-into-stuxnets-heart/ ""A Four-Day Dive Into Stuxnet’s Heart ""]||Independent Report||
|-
| Institute for Science and International Security ||2010-12-22||[http://isis-online.org/isis-reports/detail/did-stuxnet-take-out-1000-centrifuges-at-the-natanz-enrichment-plant/ ""Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant? Preliminary Assessment ""]||||
|-
| Organisation for Economic Co-operation and Development (OECD) ||2010-11-12||[http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.165.2211&rep=rep1&type=pdf ""The Role of Internet Service Providers in Botnet Mitigation: an Empirical Analysis Bases on Spam Data ""]||||
|-
| European Network and Information Security Agency ||2010-10-07||[http://www.enisa.europa.eu/media/press-releases/stuxnet-analysis ""Stuxnet Analysis ""]||||
|-
| National Research Council ||2010-10-05||[http://www.nap.edu/catalog.php?record_id=12997#description ""Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy ""]||||
|-
| Council on Foreign Relations ||2010-07-15||[http://i.cfr.org/content/publications/attachments/Knake%20-Testimony%20071510.pdf ""Untangling Attribution: Moving to Accountability in Cyberspace [Testimony] ""]||||
|-
| McAfee ||2012-02-01||[http://www.mcafee.com/us/resources/reports/rp-sda-cyber-security.pdf?cid=WBB048 ""Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World ""]||industry Report||
|-
| Booz Allen Hamilton and the Economist Intelligence Unit ||2012-01-15||[http://www.cyberhub.com/CyberPowerIndex ""Cyber Power Index ""]||Industry Report||
|-
| Office of the National Counterintelligence Executive ||2011-11-03||[http://www.ncix.gov/publications/reports/fecie_all/Foreign_Economic_Collection_2011.pdf ""Foreign Spies Stealing US Economic Secrets in Cyberspace ""]||Government Report||
|-
| Cabinet Office (United Kingdom) ||2012-11-11||[http://www.cabinetoffice.gov.uk/sites/default/files/resources/uk-cyber-security-strategy-final.pdf ""The UK Cyber Security Strategy: Protecting and promoting the UK in a digital world ""]||Non-US Government Report||
|-
| Cyber Security Forum Initiative ||2011-05-09||[http://www.unveillance.com/wp-content/uploads/2011/05/Project_Cyber_Dawn_Public.pdf ""Cyber Dawn: Libya ""]||||
|-
| U.S. Army War College, Strategy Research Project ||2011-03-24||[http://www.dtic.mil/dtic/tr/fulltext/u2/a552990.pdf ""China’s Cyber Power and America’s National Security ""]||Government Report||
|-
| James Clapper, Director of National Intelligence ||2011-02-10||[http://www.dni.gov/testimonies/20110210_testimony_clapper.pdf ""Worldwide Threat Assessment of the U.S. Intelligence Community (Testimony) ""]||Government Report||
|-
| EastWest Institute ||2011-02-03||[http://vialardi.org/nastrazzuro/pdf/US-Russia.pdf ""Working Towards Rules for Governing Cyber Conflict: Rendering the Geneva and Hague Conventions in Cyberspace ""]||||
|-
| IEEE/EastWest Institute ||2010-05-26||[http://www.ieee-rogucci.org/files/The%20ROGUCCI%20Report.pdf ""The Reliability of Global Undersea Communications Cable Infrastructure (The Rogucci Report) ""]||||
|-
| International Telecommunications Union ||2012-02-10||[http://www.itu.int/ITU-D/cyb/cybersecurity/docs/itu-toolkit-cybercrime-legislation.pdf ""ITU Toolkit for Cybercrime Legislation ""]||||
|-
| General Accountability Office (GAO) ||2011-11-29||[http://www.gao.gov/products/GAO-12-8 ""Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination ""]||Government Report||
|-
| National Initiative for Cybersecurity Education (NICE) ||2011-11-21||[http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909505 ""NICE Cybersecurity Workforce Framework ""]||||
|-
| National Cyber Security Alliance and Microsoft ||2011-05-13||[http://www.staysafeonline.org/sites/default/files/resource_documents/2011%20National%20K-12%20Study%20Final_0.pdf ""2011 State of Cyberethics, Cybersafety and Cybersecurity Curriculum in the U.S. Survey ""]||||
|-
| Department of Defense ||2012-04-11||[http://www.nsci-va.org/CyberReferenceLib/2011-04-Cyber%20Ops%20Personnel.pdf ""Cyber Operations Personnel Report (DoD) ""]||Government Report||
|-
| University of Southern California (USC) Information Sciences Institute, University of California Berkeley (UCB), McAfee Research ||2011-01-13||[http://www.isi.edu/deter/news/news.php?story=20 ""Design of the DETER Security Testbed ""]||Independent Report||
|-
| Project on National Security Reform (PNSR) ||2012-11-10||[http://www.pnsr.org/data/images/pnsr_the_power_of_people_report.pdf ""The Power of People: Building an Integrated National Security Professional System for the 21st Century ""]||||
|-
| National Science Foundation (NSF) ||2012-01-17||[http://www.nsf.gov/awardsearch/showAward.do?AwardNumber=1127185 ""Information Security Risk Taking ""]||||
|-
| NSF ||2011-08-11||[http://www.livescience.com/15423-forefront-cyber-security-research-nsf-bts.html ""At the Forefront of Cyber Security Research ""]||||
|-
| White House ||2010-12-16||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-nitrd-report-2010.pdf ""Designing A Digital Future: Federally Funded Research And Development In Networking And Information Technology ""]||Government Report||
|-
| White House Office of Science and Technology Policy ||2010-12-06||[http://www.whitehouse.gov/blog/2010/12/06/partnership-cybersecurity-innovation ""Partnership for Cybersecurity Innovation ""]||Government Report||
|-
| Mitre Corp (JASON Program Office) ||2012-11-10||[http://www.fas.org/irp/agency/dod/jason/cyber.pdf ""Science of Cyber-Security ""]||||
|-
| National Security Initiative ||2010-10-18||[http://www.americansecuritychallenge.com/ ""American Security Challenge ""]||||
</noinclude>
|}
|}
<includeonly>[[Template:Filtered Table|Filtered Table Template]]</includeonly>
<includeonly>[[Template:Filtered Table|Filtered Table Template]]</includeonly>

Revision as of 15:15, 14 June 2012

Filtering for type: All Types

Author/Agency Date Title Type Category Synopsis
White House 2009 Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure Government Report No
White House 2011-04 National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy Government Report No
White House 2011-05 International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World Government Report No
NSTC 2011-12 Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Government Report No
White House 2012-01 National Strategy for Global Supply Chain Security Government Report No
White House 2012-02 Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy Government Report No
Kundra, Vivek 2011-02-08 Federal Cloud Computing Strategy Government Report No
Kundra, Vivek 2010-12-09 25 Point Implementation Plan to Reform Federal Information Technology Management Government Report No
PCAST 2010-12 Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technology Government Report No
PCAST 2011-06 Report to the President on Ensuring American Leadership in Advanced Manufacturing Government Report No
DHS 2009-11 A Roadmap for Cybersecurity Research Government Report No
DHS 2009-09-16 National Cyber Leap Year Summit 2009 Government Report No
DHS 2010-09 National Cyber Incident Response Plan Government Report No
Department of Commerce, Internet Policy Task Force 2011-06 Cybersecurity, Innovation and the Internet Economy Government Report No
DOD 2011-07-14 Department of Defense Strategy for Operating in Cyberspace Government Report No
DHS 2011-11 Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise Government Report No
National Initiative for Cybersecurity Education 2011-08-11 National Initiative for Cybersecurity Education Strategic Plan: Building a Digital Nation Government Report No
Energy Sector Control Systems Working Group 2011-09 Roadmap to Achieve Energy Delivery Systems Cybersecurity Government Report No
GAO 2011-07-25 Defense Department Cyber Efforts: DoD Faces Challenges in Its Cyber Activities Government Report No
GAO 2011-11-29 Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination Government Report No
GAO 2011-07-26 Continued Attention Needed to Protect Our Nation’s Critical Infrastructure Government Report No
GAO 2011-10-03 Information Security: Weaknesses Continue Amid New Federal Efforts to Implement Requirements Government Report No
GAO 2010-10-06 Cyberspace Policy: Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed Government Report No
GAO 2010-06-16 Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats Government Report No
GAO 2009-07 Information Security: Agencies Continue to Report Progress, but Need to. Mitigate Persistent Weaknesses Government Report No
GAO 2009-09-24 Critical Infrastructure Protection: Current Cyber Sector-Specific Planning Approach Needs Reassessment Government Report No
GAO 2009-09 Information Security: Concerted Effort Needed to Improve Federal Performance Measures Government Report No
GAO 2010-06-03 Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development Government Report No
GAO 2008-07-31 Cyber Analysis And Warning: DHS Faces Challenges in Establishing a Comprehensive National Capability Government Report No
GAO 2004-05-28 Technology Assessment: Cybersecurity for Critical Infrastructure Protection Government Report No
GAO 2010-07-15 Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed Government Report No
GAO 2012-01-13 Defense Contracting: Improved Policies and Tools Could Help Increase Competition on DOD's National Security Exception Procurements Government Report No
Fischer, Eric A.
CRS
2012-04-23 Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions Government Report No
Kerr, Paul K. et al.
CRS
2010-12-09 The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability Government Report No
Wilson, Clay
CRS
2007-03-20 Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues Government Report No
Department of Energy 2012-04 The Department's Management of the Smart Grid Investment Grant Program Government Report No
Department of Justice 2011-04 The Federal Bureau of Investigation's Ability to Address the National Security Cyber Intrusion Threat Government Report No
DHS 2010-08 DHS Needs to Improve the Security Posture of Its Cybersecurity Program Systems Government Report No
DHS 2007-06 Challenges Remain in Securing the Nation’s Cyber Infrastructure Government Report No