Security Targets: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 42: Line 42:


Thomas, Rob and Martin, Jerry (2006) [[The Underground Economy]]
Thomas, Rob and Martin, Jerry (2006) [[The Underground Economy]]
'''''Subcategories:'''''
*''[[Security Targets | Security Targets->]][[Public Critical Infrastructure | Public Critical Infrastructure->]][[Military Networks (.mil)]]''
*''[[Security Targets | Security Targets->]][[Public Critical Infrastructure | Public Critical Infrastructure->]][[Military Networks (.mil)]]''
*''[[Security Targets | Security Targets->]][[Private Critical Infrastructure | Private Critical Infrastructure->]][[Electricity, Oil and Natural Gas]]''
*''[[Security Targets | Security Targets->]][[Private Critical Infrastructure | Private Critical Infrastructure->]][[Financial Institutions and Networks]]''
*''[[Security Targets | Security Targets->]][[Private Critical Infrastructure | Private Critical Infrastructure->]][[Transportation]]''
*''[[Security Targets | Security Targets->]][[Private Critical Infrastructure | Private Critical Infrastructure->]][[Water, Sewer, etc.]]''
*''[[Security Targets | Security Targets->]][[Communications | Communications->]][[Telephone]]''
*''[[Security Targets | Security Targets->]][[Communications | Communications->]][[Public Data Networks]]''
*''[[Security Targets | Security Targets->]][[Communications | Communications->]][[Cloud Computing]]''


''[[Table of Contents | Jump to Table of Contents]]''
''[[Table of Contents | Jump to Table of Contents]]''

Revision as of 13:46, 16 July 2010

TOC-> Threats and Actors->Security Targets

Anderson, Ross J. (2008) Security Engineering

Clarke, Richard A. and Knake, Robert (2010) Cyber War

Department of Defense (2005) Strategy for Homeland Defense and Civil Support

Department of Defense (2007) Mission Impact of Foreign Influence on DoD Software

Department of Homeland Security (2003) The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets

Deputy Chief of Staff for Intelligence (2006) Critical Infrastructure Threats and Terrorism

Energetics Inc. (2006) Roadmap to Secure Control Systems in the Energy Sector

Epstein, Richard A. and Brown, Thomas P. (2008) Cybersecurity in the Payment Card Industry

Financial Services Sector Coordinating Council for Critical Infrastructure Protection (2008) Research Agenda for the Banking and Finance Sector

Johnson, Eric M. (2008) Managing Information Risk and the Economics of Security

Kramer, Franklin D., et. al (2009) Cyberpower and National Security

McAfee, Inc. (2010) McAfee Threats Report

Moore, Tyler and Clayton, Richard (2007) Examining the Impact of Website Take-down on Phishing

Moore, Tyler and Clayton, Richard (2008) The Consequence of Non-Cooperation in the Fight Against Phishing

Moore, Tyler, et. al (2009) The Economics of Online Crime

National Research Council (2007) Toward a Safer and More Secure Cyberspace

National Research Council (1999) Trust in Cyberspace

Powell, Benjamin (2005) Is Cybersecurity a Public Good

Schneier, Bruce (2003) Beyond Fear

Symantec Corporation (2010) Symantec Global Internet Security Threat Report

Thomas, Rob and Martin, Jerry (2006) The Underground Economy

Subcategories:

Jump to Table of Contents