Government Reports and Documents: Difference between revisions
No edit summary |
No edit summary |
||
Line 17: | Line 17: | ||
Committee on Improving Cybersecurity Research in the United States, National Research Council ''(2007)'' [[Toward a Safer and More Secure Cyberspace]] | Committee on Improving Cybersecurity Research in the United States, National Research Council ''(2007)'' [[Toward a Safer and More Secure Cyberspace]] | ||
National Institute of Standards and Technology ''(2006)'' [[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]] | |||
NSTC ''(2006)'' [[Federal Plan for Cyber Security and Information Assurance Research and Development]] | NSTC ''(2006)'' [[Federal Plan for Cyber Security and Information Assurance Research and Development]] |
Revision as of 13:46, 9 June 2010
Department of Homeland Security Science and Technology Directorate (2009) A Roadmap for Cybersecurity Research
White House (2010) The Comprehensive National Cybersecurity Initiative
National Cyber Defense Initiative (2009) National Cyber Defense Financial Services Workshop Report
Networking and Information Technology Research and Development (2009) National Cyber Leap Year Summit 2009, Co-Chairs' Report
White House (2009) Cyberspace Policy Review
Center for Strategic and International Studies (2008) Securing Cyberspace for the 44th Presidency
Financial Services Sector Coordinating Council for Critical Infrastructure Protection (2008) Research Agenda for the Banking and Finance Sector
Department of Defense (2007) Mission Impact of Foreign Influence on DoD Software
Committee on Improving Cybersecurity Research in the United States, National Research Council (2007) Toward a Safer and More Secure Cyberspace
National Institute of Standards and Technology (2006) SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security
NSTC (2006) Federal Plan for Cyber Security and Information Assurance Research and Development
DOE (2006) Roadmap to Secure Control Systems in the Energy Sector
IRC (2005) Hard Problem List
PITAC (2005) Cyber Security: A Crisis of Prioritization
USSS (2004) Insider Threat Study
NIAC (2004) Hardening The Internet
Empty (2004) Information Security Governance
CRA (2003) Four Grand Challenges in Trustworthy Computing
White House (2003) The National Strategy to Secure Cyberspace
I3P (2003) Cyber Security Research and Development Agenda
NRC (1999) Trust in Cyberspace
PCCIP (1997) Critical Foundations