Government Reports and Documents: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 11: Line 11:
Ctr. for Strategic and Int'l Studies ''(2008)'' [[Securing Cyberspace for the 44th Presidency]]
Ctr. for Strategic and Int'l Studies ''(2008)'' [[Securing Cyberspace for the 44th Presidency]]


FSSCC ''(2008)'' [[Research Agenda for the Banking and Finance Sector]]
Financial Services Sector Coordinating Council for Critical Infrastructure Protection ''(2008)'' [[Research Agenda for the Banking and Finance Sector]]


DoD ''(2007)'' [[Mission Impact of Foreign Influence on DoD Software]]
Department of Defense ''(2007)'' [[Mission Impact of Foreign Influence on DoD Software]]


NRC ''(2007)'' [[Toward a Safer and More Secure Cyberspace]]
NRC ''(2007)'' [[Toward a Safer and More Secure Cyberspace]]

Revision as of 13:44, 9 June 2010

Department of Homeland Security Science and Technology Directorate (2009) A Roadmap for Cybersecurity Research

White House (2010) The Comprehensive National Cybersecurity Initiative

National Cyber Defense Initiative (2009) National Cyber Defense Financial Services Workshop Report

Networking and Information Technology Research and Development (2009) National Cyber Leap Year Summit 2009, Co-Chairs' Report

White House (2009) Cyberspace Policy Review

Ctr. for Strategic and Int'l Studies (2008) Securing Cyberspace for the 44th Presidency

Financial Services Sector Coordinating Council for Critical Infrastructure Protection (2008) Research Agenda for the Banking and Finance Sector

Department of Defense (2007) Mission Impact of Foreign Influence on DoD Software

NRC (2007) Toward a Safer and More Secure Cyberspace

NIST (2006) SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security

NSTC (2006) Federal Plan for Cyber Security and Information Assurance Research and Development

DOE (2006) Roadmap to Secure Control Systems in the Energy Sector

IRC (2005) Hard Problem List

PITAC (2005) Cyber Security: A Crisis of Prioritization

USSS (2004) Insider Threat Study

NIAC (2004) Hardening The Internet

Empty (2004) Information Security Governance

CRA (2003) Four Grand Challenges in Trustworthy Computing

White House (2003) The National Strategy to Secure Cyberspace

I3P (2003) Cyber Security Research and Development Agenda

NRC (1999) Trust in Cyberspace

PCCIP (1997) Critical Foundations