Template:Filtered Table: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 10: Line 10:
| align="center" style="background:#f0f0f0;"|'''Synopsis'''
| align="center" style="background:#f0f0f0;"|'''Synopsis'''
|-
|-
<noinclude>
| White House||2009||[http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure]||Government Report||||No
|-
|-
| White House||2011-04||[http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy]||Government Report||||No
| White House||2009||[http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure]||Government Report||1. Overview,<br>4.7 Public-Private Cooperation||No
|-
|-
| White House||2011-05||[http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World]||Government Report||||No
| White House||2011-04||[http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy]||Government Report||4.9 Identity Management,<br>4.7 Public-Private Cooperation||No
|-
|-
| NSTC||2011-12||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/fed_cybersecurity_rd_strategic_plan_2011.pdf Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity]||Government Report||||No
| White House||2011-05||[http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World]||Government Report||1. Overview||No
|-
|-
| White House||2012-01||[http://www.whitehouse.gov/sites/default/files/national_strategy_for_global_supply_chain_security.pdf National Strategy for Global Supply Chain Security]||Government Report||||No
| NSTC||2011-12||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/fed_cybersecurity_rd_strategic_plan_2011.pdf Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program]||Government Report||5.3 Government Organizations||No
|-
|-
| White House||2012-02||[http://www.whitehouse.gov/sites/default/files/privacy-final.pdf Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy]||Government Report||||No
| White House||2012-01||[http://www.whitehouse.gov/sites/default/files/national_strategy_for_global_supply_chain_security.pdf National Strategy for Global Supply Chain Security]||Government Report||4.3 Supply Chain Issues||No
|-
|-
| Kundra, Vivek||2011-02-08||[http://www.cio.gov/documents/federal-cloud-computing-strategy.pdf Federal Cloud Computing Strategy]||Government Report||||No
| White House||2012-02||[http://www.whitehouse.gov/sites/default/files/privacy-final.pdf Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy]||Government Report||4.10 Privacy,<br>5.1 Regulation/Liability||No
|-
|-
| Kundra, Vivek||2010-12-09||[http://www.cio.gov/documents/25-point-implementation-plan-to-reform-federal%20it.pdf 25 Point Implementation Plan to Reform Federal Information Technology Management]||Government Report||||No
| Kundra, Vivek||2011-02-08||[http://www.cio.gov/documents/federal-cloud-computing-strategy.pdf Federal Cloud Computing Strategy]||Government Report||3.3.3.3 Cloud Computing,<br>3.3.1.1 Government Networks (.gov),<br>5.3 Government Organizations||No
|-
|-
| PCAST||2010-12||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-nitrd-report-2010.pdf Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technology]||Government Report||||No
| Kundra, Vivek||2010-12-09||[http://www.cio.gov/documents/25-point-implementation-plan-to-reform-federal%20it.pdf 25 Point Implementation Plan to Reform Federal Information Technology Management]||Government Report||5.3 Government Organizations,<br>3.3.1.1 Government Networks (.gov),<br>3.3.3.3 Cloud Computing||No
|-
|-
| PCAST||2011-06||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-advanced-manufacturing-june2011.pdf Report to the President on Ensuring American Leadership in Advanced Manufacturing]||Government Report||||No
| PCAST||2010-12||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-nitrd-report-2010.pdf Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technology]||Government Report||5.3 Government Organizations,<br>4.10 Privacy,<br>4.3 Supply Chain Issues||No
|-
|-
| DHS||2009-11||[http://www.cyber.st.dhs.gov/docs/DHS-Cybersecurity-Roadmap.pdf A Roadmap for Cybersecurity Research]||Government Report||||No
| PCAST||2011-06||[http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-advanced-manufacturing-june2011.pdf Report to the President on Ensuring American Leadership in Advanced Manufacturing]||Government Report||5.3 Government Organizations,<br>4.2.1 Risk Management and Investment||No
|-
|-
| DHS||2009-09-16||[http://www.cyber.st.dhs.gov/docs/National_Cyber_Leap_Year_Summit_2009_Co-Chairs_Report.pdf National Cyber Leap Year Summit 2009]||Government Report||||No
| DHS||2009-11||[http://www.cyber.st.dhs.gov/docs/DHS-Cybersecurity-Roadmap.pdf A Roadmap for Cybersecurity Research]||Government Report||1. Overview,<br>4.2.1 Risk management and Investment||No
|-
|-
| DHS||2010-09||[http://www.federalnewsradio.com/pdfs/NCIRP_Interim_Version_September_2010.pdf National Cyber Incident Response Plan]||Government Report||||No
| DHS||2009-09-16||[http://www.cyber.st.dhs.gov/docs/National_Cyber_Leap_Year_Summit_2009_Co-Chairs_Report.pdf National Cyber Leap Year Summit 2009: Co-Chairs' Report]||Government Report||4.2 Economics of Cybersecurity,<br>3.3 Security Targets,<br>4.8 Attribution||No
|-
|-
| Department of Commerce, Internet Policy Task Force||2011-06||[http://www.nist.gov/itl/upload/Cybersecurity_Green-Paper_FinalVersion.pdf Cybersecurity, Innovation and the Internet Economy]||Government Report||||No
| DHS||2010-09||[http://www.federalnewsradio.com/pdfs/NCIRP_Interim_Version_September_2010.pdf National Cyber Incident Response Plan]||Government Report||5.3 Government Organizations,<br>3. Threats and Actors||No
|-
| Department of Commerce, Internet Policy Task Force||2011-06||[http://www.nist.gov/itl/upload/Cybersecurity_Green-Paper_FinalVersion.pdf Cybersecurity, Innovation and the Internet Economy]||Government Report||4.7 Public-Private Cooperation,<br>4.2 Economics of Cybersecurity||No
|-
|-
| DOD ||2011-07-14||[http://www.defense.gov/news/d20110714cyber.pdf Department of Defense Strategy for Operating in Cyberspace ]||Government Report ||||No
| DOD ||2011-07-14||[http://www.defense.gov/news/d20110714cyber.pdf Department of Defense Strategy for Operating in Cyberspace ]||Government Report ||||No
|-
|-
| DHS||2011-11||[http://www.dhs.gov/xlibrary/assets/nppd/blueprint-for-a-secure-cyber-future.pdf Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise]||Government Report||||No
| DHS||2011-11||[http://www.dhs.gov/xlibrary/assets/nppd/blueprint-for-a-secure-cyber-future.pdf Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise]||Government Report||5.3 Government Organizations,<br>3.3 Security Targets||No
|-
|-
| National Initiative for Cybersecurity Education||2011-08-11||[http://csrc.nist.gov/nice/documents/nicestratplan/Draft_NICE-Strategic-Plan_Aug2011.pdf National Initiative for Cybersecurity Education Strategic Plan: Building a Digital Nation]||Government Report||||No
| National Initiative for Cybersecurity Education||2011-08-11||[http://csrc.nist.gov/nice/documents/nicestratplan/Draft_NICE-Strategic-Plan_Aug2011.pdf National Initiative for Cybersecurity Education Strategic Plan: Building a Digital Nation]||Government Report||1. Overview,<br>5.3 Government Organizations||No
|-
|-
| Energy Sector Control Systems Working Group||2011-09||[http://www.cyber.st.dhs.gov/wp-content/uploads/2011/09/Energy_Roadmap.pdf Roadmap to Achieve Energy Delivery Systems Cybersecurity]||Government Report||||No
| Energy Sector Control Systems Working Group||2011-09||[http://www.cyber.st.dhs.gov/wp-content/uploads/2011/09/Energy_Roadmap.pdf Roadmap to Achieve Energy Delivery Systems Cybersecurity]||Government Report||3.3.2.1 Electricity, Oil and Natural Gas,<br>4.7 Public-Private Cooperation||No
|-
|-
| GAO||2011-07-25||[http://www.gao.gov/products/GAO-11-75 Defense Department Cyber Efforts: DoD Faces Challenges in Its Cyber Activities ]||Government Report ||||No
| GAO||2011-07-25||[http://www.gao.gov/products/GAO-11-75 Defense Department Cyber Efforts: DoD Faces Challenges in Its Cyber Activities ]||Government Report ||||No
Line 59: Line 59:
| GAO||2010-06-16||[http://www.gao.gov/products/GAO-10-834t Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats ]||Government Report ||||No
| GAO||2010-06-16||[http://www.gao.gov/products/GAO-10-834t Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats ]||Government Report ||||No
|-
|-
| GAO||2009-07||[http://www.gao.gov/new.items/d09546.pdf Information Security: Agencies Continue to Report Progress, but Need to. Mitigate Persistent Weaknesses]||Government Report||||No
| GAO||2009-07||[http://www.gao.gov/new.items/d09546.pdf Information Security: Agencies Continue to Report Progress, but Need to. Mitigate Persistent Weaknesses]||Government Report||3.3.1.1 Government Networks (.gov),<br>5.3 Government Organizations||No
|-
| GAO||2009-09-24||[http://www.gao.gov/new.items/d09969.pdf Critical Infrastructure Protection: Current Cyber Sector-Specific Planning Approach Needs Reassessment]||Government Report||3.3.1 Public Critical Infrastructure,<br>Government Organizations||No
|-
|-
| GAO||2009-09-24||[http://www.gao.gov/new.items/d09969.pdf Critical Infrastructure Protection: Current Cyber Sector-Specific Planning Approach Needs Reassessment]||Government Report||||No
| GAO||2009-09||[http://www.gao.gov/new.items/d09617.pdf Information Security: Concerted Effort Needed to Improve Federal Performance Measures]||Government Report||5.3 Government Organizations,<br> 3.3.1 Public Critical Infrastructure||No
|-
|-
| GAO||2009-09||[http://www.gao.gov/new.items/d09617.pdf Information Security: Concerted Effort Needed to Improve Federal Performance Measures]||Government Report||||No
| GAO||2010-06-03||[http://www.gao.gov/assets/310/305208.pdf Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development]||Government Report||5.3 Government Organizations,<br> 4.7 Public-Private Cooperation||No
|-
|-
| GAO||2010-06-03||[http://www.gao.gov/assets/310/305208.pdf Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development]||Government Report||||No
| GAO||2008-07-31||[http://www.gao.gov/assets/280/279084.pdf Cyber Analysis And Warning: DHS Faces Challenges in Establishing a Comprehensive National Capability]||Government Report||5.3 Government Organizations||No
|-
|-
| GAO||2008-07-31||[http://www.gao.gov/assets/280/279084.pdf Cyber Analysis And Warning: DHS Faces Challenges in Establishing a Comprehensive National Capability]||Government Report||||No
| GAO||2004-05-28||[http://www.gao.gov/assets/160/157541.pdf Technology Assessment: Cybersecurity for Critical Infrastructure Protection]||Government Report||5.7 Technology,<br>3.3 Security Targets,<br>4.7 Public-Private Cooperation||No
</noinclude>|-
| GAO||2004-05-28||[http://www.gao.gov/assets/160/157541.pdf Technology Assessment: Cybersecurity for Critical Infrastructure Protection]||Government Report||||No
|-
|-
| GAO||2010-07-15||[http://www.gao.gov/assets/310/307222.pdf Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed]||Government Report||||No
| GAO||2010-07-15||[http://www.gao.gov/assets/310/307222.pdf Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed]||Government Report||4.7 Public-Private Cooperation,<br>3.3.1.2 Military Networks (.mil)||No
|-
|-
| GAO||2012-01-13||[http://www.gao.gov/assets/590/587681.pdf Defense Contracting: Improved Policies and Tools Could Help Increase Competition on DOD's National Security Exception Procurements]||Government Report||||No
| GAO||2012-01-13||[http://www.gao.gov/assets/590/587681.pdf Defense Contracting: Improved Policies and Tools Could Help Increase Competition on DOD's National Security Exception Procurements]||Government Report||4.7 Public-Private Cooperation,<br>3.3.1.2 Military Networks (.mil)||No
|-
|-
| Fischer, Eric A.<br />CRS||2012-04-23||[http://www.fas.org/sgp/crs/natsec/R42114.pdf Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions]||Government Report||||No
| Fischer, Eric A.<br />CRS||2012-04-23||[http://www.fas.org/sgp/crs/natsec/R42114.pdf Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions]||Government Report||5.1 Regulation/Liability,<br>3.3 Security Targets||No
|-
|-
| Kerr, Paul K. et al.<br />CRS||2010-12-09||[http://www.fas.org/sgp/crs/natsec/R41524.pdf The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability]||Government Report||||No
| Kerr, Paul K. et al.<br />CRS||2010-12-09||[http://www.fas.org/sgp/crs/natsec/R41524.pdf The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability]||Government Report||5.4 International Law (including Laws of War),<br> 3.3 Security Targets,<br> 4.12 Cyberwar||No
|-
|-
| Wilson, Clay<br />CRS||2007-03-20||[http://www.fas.org/sgp/crs/natsec/RL31787.pdf Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues]||Government Report||||No
| Wilson, Clay<br />CRS||2007-03-20||[http://www.fas.org/sgp/crs/natsec/RL31787.pdf Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues]||Government Report||4.12 Cyberwar,<br>3.3 Security Targets||No
|-
|-
| Department of Energy||2012-04||[http://energy.gov/sites/prod/files/OAS-RA-12-04.pdf The Department's Management of the Smart Grid Investment Grant Program]||Government Report||||No
| Department of Energy||2012-04||[http://energy.gov/sites/prod/files/OAS-RA-12-04.pdf The Department's Management of the Smart Grid Investment Grant Program]||Government Report||3.3.2.1 Electricity, Oil and Natural Gas,<br>4.2.1 Risk Management and Investment||No
|-
|-
| Department of Justice||2011-04||[http://www.justice.gov/oig/reports/FBI/a1122r.pdf The Federal Bureau of Investigation's Ability to Address the National Security Cyber Intrusion Threat]||Government Report||||No
| Department of Justice||2011-04||[http://www.justice.gov/oig/reports/FBI/a1122r.pdf The Federal Bureau of Investigation's Ability to Address the National Security Cyber Intrusion Threat]||Government Report||5.3 Government Organizations,<br>4.11 Cybercrime,<br>4.6 Information Sharing/Disclosure||No
|-
|-
| DHS||2010-08||[http://www.dhs.gov/xoig/assets/mgmtrpts/OIG_10-111_Aug10.pdf DHS Needs to Improve the Security Posture of Its Cybersecurity Program Systems]||Government Report||||No
| DHS||2010-08||[http://www.dhs.gov/xoig/assets/mgmtrpts/OIG_10-111_Aug10.pdf DHS Needs to Improve the Security Posture of Its Cybersecurity Program Systems]||Government Report||3.3.1.1 Government Networks (.gov),<br>5.3 Government Organizations||No
|-
|-
| DHS||2007-06||[http://www.oig.dhs.gov/assets/Mgmt/OIG_07-48_Jun07.pdf Challenges Remain in Securing the Nation’s Cyber Infrastructure]||Government Report||||No
| DHS||2007-06||[http://www.oig.dhs.gov/assets/Mgmt/OIG_07-48_Jun07.pdf Challenges Remain in Securing the Nation’s Cyber Infrastructure]||Government Report||5.3 Government Organizations,<br>4.7 Public-Private Cooperation,<br>4.6 Information Sharing||No
|}
|}
<includeonly>[[Template:Filtered Table|Filtered Table Template]]</includeonly>
<includeonly>[[Template:Filtered Table|Filtered Table Template]]</includeonly>

Revision as of 13:51, 20 June 2012

Filtering for type: All Types

Author/Agency Date Title Type Category Synopsis
White House 2009 Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure Government Report 1. Overview,
4.7 Public-Private Cooperation
No
White House 2011-04 National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy Government Report 4.9 Identity Management,
4.7 Public-Private Cooperation
No
White House 2011-05 International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World Government Report 1. Overview No
NSTC 2011-12 Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program Government Report 5.3 Government Organizations No
White House 2012-01 National Strategy for Global Supply Chain Security Government Report 4.3 Supply Chain Issues No
White House 2012-02 Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy Government Report 4.10 Privacy,
5.1 Regulation/Liability
No
Kundra, Vivek 2011-02-08 Federal Cloud Computing Strategy Government Report 3.3.3.3 Cloud Computing,
3.3.1.1 Government Networks (.gov),
5.3 Government Organizations
No
Kundra, Vivek 2010-12-09 25 Point Implementation Plan to Reform Federal Information Technology Management Government Report 5.3 Government Organizations,
3.3.1.1 Government Networks (.gov),
3.3.3.3 Cloud Computing
No
PCAST 2010-12 Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technology Government Report 5.3 Government Organizations,
4.10 Privacy,
4.3 Supply Chain Issues
No
PCAST 2011-06 Report to the President on Ensuring American Leadership in Advanced Manufacturing Government Report 5.3 Government Organizations,
4.2.1 Risk Management and Investment
No
DHS 2009-11 A Roadmap for Cybersecurity Research Government Report 1. Overview,
4.2.1 Risk management and Investment
No
DHS 2009-09-16 National Cyber Leap Year Summit 2009: Co-Chairs' Report Government Report 4.2 Economics of Cybersecurity,
3.3 Security Targets,
4.8 Attribution
No
DHS 2010-09 National Cyber Incident Response Plan Government Report 5.3 Government Organizations,
3. Threats and Actors
No
Department of Commerce, Internet Policy Task Force 2011-06 Cybersecurity, Innovation and the Internet Economy Government Report 4.7 Public-Private Cooperation,
4.2 Economics of Cybersecurity
No
DOD 2011-07-14 Department of Defense Strategy for Operating in Cyberspace Government Report No
DHS 2011-11 Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise Government Report 5.3 Government Organizations,
3.3 Security Targets
No
National Initiative for Cybersecurity Education 2011-08-11 National Initiative for Cybersecurity Education Strategic Plan: Building a Digital Nation Government Report 1. Overview,
5.3 Government Organizations
No
Energy Sector Control Systems Working Group 2011-09 Roadmap to Achieve Energy Delivery Systems Cybersecurity Government Report 3.3.2.1 Electricity, Oil and Natural Gas,
4.7 Public-Private Cooperation
No
GAO 2011-07-25 Defense Department Cyber Efforts: DoD Faces Challenges in Its Cyber Activities Government Report No
GAO 2011-11-29 Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination Government Report No
GAO 2011-07-26 Continued Attention Needed to Protect Our Nation’s Critical Infrastructure Government Report No
GAO 2011-10-03 Information Security: Weaknesses Continue Amid New Federal Efforts to Implement Requirements Government Report No
GAO 2010-10-06 Cyberspace Policy: Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed Government Report No
GAO 2010-06-16 Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats Government Report No
GAO 2009-07 Information Security: Agencies Continue to Report Progress, but Need to. Mitigate Persistent Weaknesses Government Report 3.3.1.1 Government Networks (.gov),
5.3 Government Organizations
No
GAO 2009-09-24 Critical Infrastructure Protection: Current Cyber Sector-Specific Planning Approach Needs Reassessment Government Report 3.3.1 Public Critical Infrastructure,
Government Organizations
No
GAO 2009-09 Information Security: Concerted Effort Needed to Improve Federal Performance Measures Government Report 5.3 Government Organizations,
3.3.1 Public Critical Infrastructure
No
GAO 2010-06-03 Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development Government Report 5.3 Government Organizations,
4.7 Public-Private Cooperation
No
GAO 2008-07-31 Cyber Analysis And Warning: DHS Faces Challenges in Establishing a Comprehensive National Capability Government Report 5.3 Government Organizations No
GAO 2004-05-28 Technology Assessment: Cybersecurity for Critical Infrastructure Protection Government Report 5.7 Technology,
3.3 Security Targets,
4.7 Public-Private Cooperation
No
GAO 2010-07-15 Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed Government Report 4.7 Public-Private Cooperation,
3.3.1.2 Military Networks (.mil)
No
GAO 2012-01-13 Defense Contracting: Improved Policies and Tools Could Help Increase Competition on DOD's National Security Exception Procurements Government Report 4.7 Public-Private Cooperation,
3.3.1.2 Military Networks (.mil)
No
Fischer, Eric A.
CRS
2012-04-23 Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions Government Report 5.1 Regulation/Liability,
3.3 Security Targets
No
Kerr, Paul K. et al.
CRS
2010-12-09 The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability Government Report 5.4 International Law (including Laws of War),
3.3 Security Targets,
4.12 Cyberwar
No
Wilson, Clay
CRS
2007-03-20 Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues Government Report 4.12 Cyberwar,
3.3 Security Targets
No
Department of Energy 2012-04 The Department's Management of the Smart Grid Investment Grant Program Government Report 3.3.2.1 Electricity, Oil and Natural Gas,
4.2.1 Risk Management and Investment
No
Department of Justice 2011-04 The Federal Bureau of Investigation's Ability to Address the National Security Cyber Intrusion Threat Government Report 5.3 Government Organizations,
4.11 Cybercrime,
4.6 Information Sharing/Disclosure
No
DHS 2010-08 DHS Needs to Improve the Security Posture of Its Cybersecurity Program Systems Government Report 3.3.1.1 Government Networks (.gov),
5.3 Government Organizations
No
DHS 2007-06 Challenges Remain in Securing the Nation’s Cyber Infrastructure Government Report 5.3 Government Organizations,
4.7 Public-Private Cooperation,
4.6 Information Sharing
No