Government Reports and Documents: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 11: Line 11:
! style="background-color: #efefef;" class="unsortable" | Full Text   
! style="background-color: #efefef;" class="unsortable" | Full Text   
|-
|-
| Department of Commerce ||    || (2010) || [[Defense Industrial Base Assessment]] || Government Report || None || [http://  ''Pdf'']
| Department of Commerce ||    || 2010 || [[Defense Industrial Base Assessment]] || Government Report || None || [http://  ''Pdf'']
|-
|-
| Department of Defense ||    || (2007) || [[Mission Impact of Foreign Influence on DoD Software]] || Government Report || None || [http://  ''Pdf'']
| Department of Defense ||    || 2007 || [[Mission Impact of Foreign Influence on DoD Software]] || Government Report || None || [http://  ''Pdf'']
|-
|-
| Department of Defense ||    || (2005) || [[Strategy for Homeland Defense and Civil Support]] || Government Report || None || [http://  ''Pdf'']
| Department of Defense ||    || 2005 || [[Strategy for Homeland Defense and Civil Support]] || Government Report || None || [http://  ''Pdf'']
|-
|-
| Department of Homeland Security ||    || (2009) || [[A Roadmap for Cybersecurity Research]] || Government Report || None || [http://  ''Pdf'']
| Department of Homeland Security ||    || 2009 || [[A Roadmap for Cybersecurity Research]] || Government Report || None || [http://  ''Pdf'']
|-
|-
| Department of Homeland Security ||    || (2003) || [[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]] || Government Report || None || [http://  ''Pdf'']
| Department of Homeland Security ||    || 2003 || [[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]] || Government Report || None || [http://  ''Pdf'']
|-
|-
| Deputy Chief of Staff for Intelligence ||    || (2006) || [[Critical Infrastructure Threats and Terrorism]] || Government Report || None || [http://  ''Pdf'']
| Deputy Chief of Staff for Intelligence ||    || 2006 || [[Critical Infrastructure Threats and Terrorism]] || Government Report || None || [http://  ''Pdf'']
|-
|-
| INFOSEC Research Council ||    || (2005) || [[Hard Problem List]] || Government Report || None || [http://  ''Pdf'']
| INFOSEC Research Council ||    || 2005 || [[Hard Problem List]] || Government Report || None || [http://  ''Pdf'']
|-
|-
| National Cyber Defense Initiative ||    || (2009) || [[National Cyber Defense Financial Services Workshop Report]] || Government Report || None || [http://  ''Pdf'']
| National Cyber Defense Initiative ||    || 2009 || [[National Cyber Defense Financial Services Workshop Report]] || Government Report || None || [http://  ''Pdf'']
|-
|-
| National Cyber Security Summit Task Force ||    || (2004) || [[Information Security Governance]] || Government Report || None || [http://  ''Pdf'']
| National Cyber Security Summit Task Force ||    || 2004 || [[Information Security Governance]] || Government Report || None || [http://  ''Pdf'']
|-
|-
| National Infrastructure Advisory Council ||    || (2004) || [[Hardening The Internet]] || Government Report || None || [http://  ''Pdf'']
| National Infrastructure Advisory Council ||    || 2004 || [[Hardening The Internet]] || Government Report || None || [http://  ''Pdf'']
|-
|-
| National Institute of Standards and Technology ||    || (2006) || [[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]] || Government Report || None || [http://  ''Pdf'']
| National Institute of Standards and Technology ||    || 2006 || [[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]] || Government Report || None || [http://  ''Pdf'']
|-
|-
| National Science and Technology Council ||    || ''(2006)'' || [[Federal Plan for Cyber Security and Information Assurance Research and Development]] || Government Report || None || [http://  ''Pdf'']
| National Science and Technology Council ||    || ''2006'' || [[Federal Plan for Cyber Security and Information Assurance Research and Development]] || Government Report || None || [http://  ''Pdf'']
|-
|-
| Networking and Information Technology Research and Development ||    || ''(2009)'' || [[National Cyber Leap Year Summit 2009, Co-Chairs' Report]] || Government Report || None || [http://  ''Pdf'']
| Networking and Information Technology Research and Development ||    || ''2009'' || [[National Cyber Leap Year Summit 2009, Co-Chairs' Report]] || Government Report || None || [http://  ''Pdf'']
|-
|-
| President's Commission on Critical Infrastructure Protection ||    || ''(1997)'' || [[Critical Foundations]] || Government Report || None || [http://  ''Pdf'']
| President's Commission on Critical Infrastructure Protection ||    || ''(1997'' || [[Critical Foundations]] || Government Report || None || [http://  ''Pdf'']
|-
|-
| President's Information Technology Advisory Council ||    || ''(2005)'' || [[Cyber Security: A Crisis of Prioritization]] || Government Report || None || [http://  ''Pdf'']
| President's Information Technology Advisory Council ||    || ''2005'' || [[Cyber Security: A Crisis of Prioritization]] || Government Report || None || [http://  ''Pdf'']
|-
|-
| United States Secret Service ||    || ''(2004)'' || [[Insider Threat Study]] || Government Report || None || [http://  ''Pdf'']
| United States Secret Service ||    || ''2004'' || [[Insider Threat Study]] || Government Report || None || [http://  ''Pdf'']
|-
|-
| White House ||    || ''(2003)'' || [[The National Strategy to Secure Cyberspace]] || Government Report || None || [http://  ''Pdf'']
| White House ||    || ''2003'' || [[The National Strategy to Secure Cyberspace]] || Government Report || None || [http://  ''Pdf'']
|-
|-
| White House ||    || ''(2009)'' || [[Cyberspace Policy Review]] || Government Report || None || [http://  ''Pdf'']
| White House ||    || ''2009'' || [[Cyberspace Policy Review]] || Government Report || None || [http://  ''Pdf'']
|-
|-
| White House ||    || ''(2010)'' || [[The Comprehensive National Cybersecurity Initiative]] || Government Report || None || [http://  ''Pdf'']ne
| White House ||    || ''2010'' || [[The Comprehensive National Cybersecurity Initiative]] || Government Report || None || [http://  ''Pdf'']
|}
|}



Revision as of 15:21, 9 August 2010

TOC-> Resource by Type->Government Reports and Documents

Author 1 Author 2 Year Title Source Expertise Full Text
Department of Commerce 2010 Defense Industrial Base Assessment Government Report None [http:// Pdf]
Department of Defense 2007 Mission Impact of Foreign Influence on DoD Software Government Report None [http:// Pdf]
Department of Defense 2005 Strategy for Homeland Defense and Civil Support Government Report None [http:// Pdf]
Department of Homeland Security 2009 A Roadmap for Cybersecurity Research Government Report None [http:// Pdf]
Department of Homeland Security 2003 The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets Government Report None [http:// Pdf]
Deputy Chief of Staff for Intelligence 2006 Critical Infrastructure Threats and Terrorism Government Report None [http:// Pdf]
INFOSEC Research Council 2005 Hard Problem List Government Report None [http:// Pdf]
National Cyber Defense Initiative 2009 National Cyber Defense Financial Services Workshop Report Government Report None [http:// Pdf]
National Cyber Security Summit Task Force 2004 Information Security Governance Government Report None [http:// Pdf]
National Infrastructure Advisory Council 2004 Hardening The Internet Government Report None [http:// Pdf]
National Institute of Standards and Technology 2006 SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security Government Report None [http:// Pdf]
National Science and Technology Council 2006 Federal Plan for Cyber Security and Information Assurance Research and Development Government Report None [http:// Pdf]
Networking and Information Technology Research and Development 2009 National Cyber Leap Year Summit 2009, Co-Chairs' Report Government Report None [http:// Pdf]
President's Commission on Critical Infrastructure Protection (1997 Critical Foundations Government Report None [http:// Pdf]
President's Information Technology Advisory Council 2005 Cyber Security: A Crisis of Prioritization Government Report None [http:// Pdf]
United States Secret Service 2004 Insider Threat Study Government Report None [http:// Pdf]
White House 2003 The National Strategy to Secure Cyberspace Government Report None [http:// Pdf]
White House 2009 Cyberspace Policy Review Government Report None [http:// Pdf]
White House 2010 The Comprehensive National Cybersecurity Initiative Government Report None [http:// Pdf]

Subcategories:

Jump to Table of Contents