Government Reports and Documents: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
| Line 20: | Line 20: | ||
| Department of Homeland Security || 2003 || [[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]] || Government Report || None || [http://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf ''Pdf''] | | Department of Homeland Security || 2003 || [[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]] || Government Report || None || [http://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf ''Pdf''] | ||
|- | |- | ||
| Deputy Chief of Staff for Intelligence || 2006 || [[Critical Infrastructure Threats and Terrorism]] || Government Report || | | Deputy Chief of Staff for Intelligence || 2006 || [[Critical Infrastructure Threats and Terrorism]] || Government Report || Low:Organizational Analysis; Low:Risk Management || [http://www.fas.org/irp/threat/terrorism/sup2.pdf ''Pdf''] | ||
|- | |- | ||
| INFOSEC Research Council || 2005 || [[Hard Problem List]] || Government Report || None || [http:// ''Pdf''] | | INFOSEC Research Council || 2005 || [[Hard Problem List]] || Government Report || None || [http:// ''Pdf''] | ||
Revision as of 19:30, 9 August 2010
TOC-> Resource by Type->Government Reports and Documents
| Author/Agency | Year | Title | Source | Expertise | Full Text |
|---|---|---|---|---|---|
| Department of Commerce | 2010 | Defense Industrial Base Assessment | Government Report | None | |
| Department of Defense | 2007 | Mission Impact of Foreign Influence on DoD Software | Government Report | Low:Defense Policy/Procurement | |
| Department of Defense | 2005 | Strategy for Homeland Defense and Civil Support | Government Report | None | |
| Department of Homeland Security | 2009 | A Roadmap for Cybersecurity Research | Government Report | Low:Technology | |
| Department of Homeland Security | 2003 | The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets | Government Report | None | |
| Deputy Chief of Staff for Intelligence | 2006 | Critical Infrastructure Threats and Terrorism | Government Report | Low:Organizational Analysis; Low:Risk Management | |
| INFOSEC Research Council | 2005 | Hard Problem List | Government Report | None | [http:// Pdf] |
| National Cyber Defense Initiative | 2009 | National Cyber Defense Financial Services Workshop Report | Government Report | None | [http:// Pdf] |
| National Cyber Security Summit Task Force | 2004 | Information Security Governance | Government Report | None | [http:// Pdf] |
| National Infrastructure Advisory Council | 2004 | Hardening The Internet | Government Report | None | [http:// Pdf] |
| National Institute of Standards and Technology | 2006 | SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security | Government Report | None | [http:// Pdf] |
| National Science and Technology Council | 2006 | Federal Plan for Cyber Security and Information Assurance Research and Development | Government Report | None | [http:// Pdf] |
| Networking and Information Technology Research and Development | 2009 | National Cyber Leap Year Summit 2009, Co-Chairs' Report | Government Report | None | [http:// Pdf] |
| President's Commission on Critical Infrastructure Protection | 1997 | Critical Foundations | Government Report | None | [http:// Pdf] |
| President's Information Technology Advisory Council | 2005 | Cyber Security: A Crisis of Prioritization | Government Report | None | [http:// Pdf] |
| United States Secret Service | 2004 | Insider Threat Study | Government Report | None | [http:// Pdf] |
| White House | 2003 | The National Strategy to Secure Cyberspace | Government Report | None | [http:// Pdf] |
| White House | 2009 | Cyberspace Policy Review | Government Report | None | [http:// Pdf] |
| White House | 2010 | The Comprehensive National Cybersecurity Initiative | Government Report | None | [http:// Pdf] |
Subcategories: