Template:Filtered Table: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 7: | Line 7: | ||
| align="center" style="background:#f0f0f0;"|'''Type''' | | align="center" style="background:#f0f0f0;"|'''Type''' | ||
| align="center" style="background:#f0f0f0;"|'''Category''' | | align="center" style="background:#f0f0f0;"|'''Category''' | ||
| align="center" style="background:#f0f0f0;"|'''Synopsis''' | |||
|- | |- | ||
<noinclude>| | <noinclude> | ||
| White House||2009||[http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure]||Government Report||||No | |||
|- | |- | ||
| | | White House||2011-04||[http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy]||Government Report||||No | ||
|- | |- | ||
| | | White House||2011-05||[http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World]||Government Report||||No | ||
|- | |- | ||
| | | NSTC||2011-12||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/fed_cybersecurity_rd_strategic_plan_2011.pdf Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity]||Government Report||||No | ||
|- | |- | ||
| | | White House||2012-01||[http://www.whitehouse.gov/sites/default/files/national_strategy_for_global_supply_chain_security.pdf National Strategy for Global Supply Chain Security]||Government Report||||No | ||
|- | |- | ||
| | | White House||2012-02||[http://www.whitehouse.gov/sites/default/files/privacy-final.pdf Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy]||Government Report||||No | ||
|- | |- | ||
| | | Kundra, Vivek||2011-02-08||[http://www.cio.gov/documents/federal-cloud-computing-strategy.pdf Federal Cloud Computing Strategy]||Government Report||||No | ||
|- | |- | ||
| | | Kundra, Vivek||2010-12-09||[http://www.cio.gov/documents/25-point-implementation-plan-to-reform-federal%20it.pdf 25 Point Implementation Plan to Reform Federal Information Technology Management]||Government Report||||No | ||
|- | |- | ||
| | | PCAST||2010-12||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-nitrd-report-2010.pdf Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technology]||Government Report||||No | ||
|- | |- | ||
| | | PCAST||2011-06||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-advanced-manufacturing-june2011.pdf Report to the President on Ensuring American Leadership in Advanced Manufacturing]||Government Report||||No | ||
|- | |- | ||
| | | DHS||2009-11||[http://www.cyber.st.dhs.gov/docs/DHS-Cybersecurity-Roadmap.pdf A Roadmap for Cybersecurity Research]||Government Report||||No | ||
|- | |- | ||
| | | DHS||2009-09-16||[http://www.cyber.st.dhs.gov/docs/National_Cyber_Leap_Year_Summit_2009_Co-Chairs_Report.pdf National Cyber Leap Year Summit 2009]||Government Report||||No | ||
|- | |- | ||
| | | DHS||2010-09||[http://www.federalnewsradio.com/pdfs/NCIRP_Interim_Version_September_2010.pdf National Cyber Incident Response Plan]||Government Report||||No | ||
|- | |- | ||
| | | Department of Commerce, Internet Policy Task Force||2011-06||[http://www.nist.gov/itl/upload/Cybersecurity_Green-Paper_FinalVersion.pdf Cybersecurity, Innovation and the Internet Economy]||Government Report||||No | ||
|- | |- | ||
| | | DOD ||2011-07-14||[http://www.defense.gov/news/d20110714cyber.pdf Department of Defense Strategy for Operating in Cyberspace ]||Government Report ||||No | ||
|- | |- | ||
| | | DHS||2011-11||[http://www.dhs.gov/xlibrary/assets/nppd/blueprint-for-a-secure-cyber-future.pdf Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise]||Government Report||||No | ||
|- | |- | ||
| | | National Initiative for Cybersecurity Education||2011-08-11||[http://csrc.nist.gov/nice/documents/nicestratplan/Draft_NICE-Strategic-Plan_Aug2011.pdf National Initiative for Cybersecurity Education Strategic Plan: Building a Digital Nation]||Government Report||||No | ||
|- | |- | ||
| | | Energy Sector Control Systems Working Group||2011-09||[http://www.cyber.st.dhs.gov/wp-content/uploads/2011/09/Energy_Roadmap.pdf Roadmap to Achieve Energy Delivery Systems Cybersecurity]||Government Report||||No | ||
|- | |- | ||
| GAO||2011-07-25||[http://www.gao.gov/products/GAO-11-75 | | GAO||2011-07-25||[http://www.gao.gov/products/GAO-11-75 Defense Department Cyber Efforts: DoD Faces Challenges in Its Cyber Activities ]||Government Report ||||No | ||
|- | |- | ||
| GAO|| | | GAO||2011-11-29||[http://www.gao.gov/products/GAO-12-8 Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination ]||Government Report||||No | ||
|- | |- | ||
| GAO||2011-07- | | GAO||2011-07-26||[http://www.gao.gov/products/GAO-11-463T Continued Attention Needed to Protect Our Nation’s Critical Infrastructure ]||Government Report ||||No | ||
|- | |- | ||
| GAO||2011-03 | | GAO||2011-10-03||[http://www.gao.gov/products/GAO-12-137 Information Security: Weaknesses Continue Amid New Federal Efforts to Implement Requirements ]||Government Report ||||No | ||
|- | |- | ||
| GAO|| | | GAO||2010-10-06||[http://www.gao.gov/products/GAO-11-24 Cyberspace Policy: Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed ]||Government Report ||||No | ||
|- | |- | ||
| GAO||2010- | | GAO||2010-06-16||[http://www.gao.gov/products/GAO-10-834t Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats ]||Government Report ||||No | ||
|- | |- | ||
| GAO|| | | GAO||2009-07||[http://www.gao.gov/new.items/d09546.pdf Information Security: Agencies Continue to Report Progress, but Need to. Mitigate Persistent Weaknesses]||Government Report||||No | ||
|- | |- | ||
| GAO|| | | GAO||2009-09-24||[http://www.gao.gov/new.items/d09969.pdf Critical Infrastructure Protection: Current Cyber Sector-Specific Planning Approach Needs Reassessment]||Government Report||||No | ||
|- | |- | ||
| GAO|| | | GAO||2009-09||[http://www.gao.gov/new.items/d09617.pdf Information Security: Concerted Effort Needed to Improve Federal Performance Measures]||Government Report||||No | ||
|- | |- | ||
| GAO||2010- | | GAO||2010-06-03||[http://www.gao.gov/assets/310/305208.pdf Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development]||Government Report||||No | ||
|- | |- | ||
| GAO|| | | GAO||2008-07-31||[http://www.gao.gov/assets/280/279084.pdf Cyber Analysis And Warning: DHS Faces Challenges in Establishing a Comprehensive National Capability]||Government Report||||No | ||
</noinclude>|- | |||
| GAO||2004-05-28||[http://www.gao.gov/assets/160/157541.pdf Technology Assessment: Cybersecurity for Critical Infrastructure Protection]||Government Report||||No | |||
|- | |- | ||
| GAO||2010- | | GAO||2010-07-15||[http://www.gao.gov/assets/310/307222.pdf Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed]||Government Report||||No | ||
|- | |- | ||
| GAO|| | | GAO||2012-01-13||[http://www.gao.gov/assets/590/587681.pdf Defense Contracting: Improved Policies and Tools Could Help Increase Competition on DOD's National Security Exception Procurements]||Government Report||||No | ||
|- | |- | ||
| | | Fischer, Eric A.<br />CRS||2012-04-23||[http://www.fas.org/sgp/crs/natsec/R42114.pdf Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions]||Government Report||||No | ||
|- | |- | ||
| | | Kerr, Paul K. et al.<br />CRS||2010-12-09||[http://www.fas.org/sgp/crs/natsec/R41524.pdf The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability]||Government Report||||No | ||
|- | |- | ||
| | | Wilson, Clay<br />CRS||2007-03-20||[http://www.fas.org/sgp/crs/natsec/RL31787.pdf Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues]||Government Report||||No | ||
|- | |- | ||
| | | Department of Energy||2012-04||[http://energy.gov/sites/prod/files/OAS-RA-12-04.pdf The Department's Management of the Smart Grid Investment Grant Program]||Government Report||||No | ||
|- | |- | ||
| | | Department of Justice||2011-04||[http://www.justice.gov/oig/reports/FBI/a1122r.pdf The Federal Bureau of Investigation's Ability to Address the National Security Cyber Intrusion Threat]||Government Report||||No | ||
|- | |- | ||
| | | DHS||2010-08||[http://www.dhs.gov/xoig/assets/mgmtrpts/OIG_10-111_Aug10.pdf DHS Needs to Improve the Security Posture of Its Cybersecurity Program Systems]||Government Report||||No | ||
|- | |- | ||
| | | DHS||2007-06||[http://www.oig.dhs.gov/assets/Mgmt/OIG_07-48_Jun07.pdf Challenges Remain in Securing the Nation’s Cyber Infrastructure]||Government Report||||No | ||
| | |||
| | |||
|} | |} | ||
<includeonly>[[Template:Filtered Table|Filtered Table Template]]</includeonly> | <includeonly>[[Template:Filtered Table|Filtered Table Template]]</includeonly> |
Revision as of 14:15, 14 June 2012
Filtering for type: All Types