US Government Reports and Documents: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 1: Line 1:
''[[Table of Contents | TOC->]][[Resource by Type | Resource by Type->]][[Government Reports and Documents | Government Reports and Documents->]][[US Government Reports and Documents]]''
''[[Table of Contents | TOC->]][[Resource by Type | Resource by Type->]][[Government Reports and Documents | Government Reports and Documents->]][[US Government Reports and Documents]]''


Department of Commerce (2010) [[Defense Industrial Base Assessment]]
| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
 
|-
Department of Defense (2007) [[Mission Impact of Foreign Influence on DoD Software]]
! style="background-color: #efefef;" | Author/Agency
 
! style="background-color: #efefef;" | Year
Department of Defense (2005) [[Strategy for Homeland Defense and Civil Support]]
! style="background-color: #efefef;" | Title
 
! style="background-color: #efefef;" | Source
Department of Homeland Security (2009) [[A Roadmap for Cybersecurity Research]]
! style="background-color: #efefef;" | Expertise
 
! style="background-color: #efefef;" class="unsortable" | Full Text 
Department of Homeland Security (2003) [[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]
|-
 
| Department of Commerce || 2010 || [[Defense Industrial Base Assessment]] || Government Report || None || [http://www.bis.doc.gov/defenseindustrialbaseprograms/osies/defmarketresearchrpts/final_counterfeit_electronics_report.pdf  ''Pdf'']
Deputy Chief of Staff for Intelligence (2006) [[Critical Infrastructure Threats and Terrorism]]
|-
 
| Department of Defense || 2007 || [[Mission Impact of Foreign Influence on DoD Software]] || Government Report || Low:Defense Policy/Procurement || [http://www.cyber.st.dhs.gov/docs/Defense%20Science%20Board%20Task%20Force%20-%20Report%20on%20Mission%20Impact%20of%20Foreign%20Influence%20on%20DoD%20Software%20(2007).pdf  ''Pdf'']
National Cyber Defense Initiative (2009) [[National Cyber Defense Financial Services Workshop Report]]
|-
 
| Department of Defense || 2005 || [[Strategy for Homeland Defense and Civil Support]] || Government Report || None || [http://www.defense.gov/news/Jun2005/d20050630homeland.pdf  ''Pdf'']
National Cyber Security Summit Task Force (2004) [[Information Security Governance]]
|-
 
| Department of Homeland Security || 2009 || [[A Roadmap for Cybersecurity Research]] || Government Report || Low:Technology || [http://www.cyber.st.dhs.gov/docs/DHS-Cybersecurity-Roadmap.pdf  ''Pdf'']
National Infrastructure Advisory Council (2004) [[Hardening The Internet]]
|-
 
| Department of Homeland Security || 2003 || [[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]] || Government Report || None || [http://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf  ''Pdf'']
National Institute of Standards and Technology (2006) [[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]
|-
 
| Deputy Chief of Staff for Intelligence || 2006 || [[Critical Infrastructure Threats and Terrorism]] || Government Report || Low:Organizational Analysis; Low:Risk Management || [http://www.fas.org/irp/threat/terrorism/sup2.pdf  ''Pdf'']
National Science and Technology Council ''(2006)'' [[Federal Plan for Cyber Security and Information Assurance Research and Development]]
|-
 
| National Cyber Defense Initiative || 2009 || [[National Cyber Defense Financial Services Workshop Report]] || Government Report || Moderate:Financial Services Infrastructure  || [http://www.cyber.st.dhs.gov/docs/NCDI_FI_Workshop_Report.pdf ''Pdf'']
Networking and Information Technology Research and Development ''(2009)'' [[National Cyber Leap Year Summit 2009, Co-Chairs' Report]]
|-
 
| National Cyber Security Summit Task Force || 2004 || [[Information Security Governance]] || Government Report || Moderate:Executive Administration || [http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf  ''Pdf'']
President's Commission on Critical Infrastructure Protection ''(1997)'' [[Critical Foundations]]
|-
 
| National Infrastructure Advisory Council || 2004 || [[Hardening The Internet]] || Government Report || High:Technology || [http://www.cyber.st.dhs.gov/docs/NIAC%20Internet%20Hardening.pdf  ''Pdf'']
President's Information Technology Advisory Council ''(2005)'' [[Cyber Security: A Crisis of Prioritization]]
|-
 
| National Institute of Standards and Technology || 2006 || [[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]] || Government Report || Moderate:Technology || [http://www.cyber.st.dhs.gov/docs/NIST%20Guide%20to%20Supervisory%20and%20Data%20Acquisition-SCADA%20and%20Industrial%20Control%20Systems%20Security%20(2007).pdf ''Pdf'']
United States Secret Service (2004) [[Insider Threat Study]]
|-
 
| National Science and Technology Council || ''2006'' || [[Federal Plan for Cyber Security and Information Assurance Research and Development]] || Government Report || None || [http://www.cyber.st.dhs.gov/docs/Federal%20R&D%20Plan%202006.pdf ''Pdf'']
White House ''(2003)'' [[The National Strategy to Secure Cyberspace]]
|-
 
| Networking and Information Technology Research and Development || ''2009'' || [[National Cyber Leap Year Summit 2009, Co-Chairs' Report]] || Government Report || None || [http://www.cyber.st.dhs.gov/docs/National_Cyber_Leap_Year_Summit_2009_Co-Chairs_Report.pdf ''Pdf'']
White House (2009) [[Cyberspace Policy Review]]
|-
 
| President's Commission on Critical Infrastructure Protection || ''1997'' || [[Critical Foundations]] || Government Report || None || [http://www.cyber.st.dhs.gov/docs/PCCIP%20Report%201997.pdf ''Pdf'']
White House ''(2010)'' [[The Comprehensive National Cybersecurity Initiative]]
|-
| President's Information Technology Advisory Council || ''2005'' || [[Cyber Security: A Crisis of Prioritization]] || Government Report || None || [http://www.cyber.st.dhs.gov/docs/PITAC%20Report%202005.pdf ''Pdf'']
|-
| United States Secret Service || 2004 || [[Insider Threat Study]] || Government Report || None || [http://www.cyber.st.dhs.gov/docs/its_report_040820.pdf ''Pdf'']
|-
| White House || ''2003'' || [[The National Strategy to Secure Cyberspace]] || Government Report || None || [http://www.cyber.st.dhs.gov/docs/National%20Strategy%20to%20Secure%20Cyberspace%202003.pdf ''Pdf'']
|-
| White House || 2009 || [[Cyberspace Policy Review]] || Government Report || None || [http://www.cyber.st.dhs.gov/docs/Cyberspace_Policy_Review_final.pdf ''Pdf'']
|-
| White House || ''2010'' || [[The Comprehensive National Cybersecurity Initiative]] || Government Report || None || [http://www.cyber.st.dhs.gov/docs/CNCI-Cybersecurity.pdf ''Pdf'']
|}


*'''''Subcategories:''''' ''None''
*'''''Subcategories:''''' ''None''


''[[Table of Contents | Jump to Table of Contents]]''
''[[Table of Contents | Jump to Table of Contents]]''

Revision as of 14:59, 9 August 2010

TOC-> Resource by Type-> Government Reports and Documents->US Government Reports and Documents

| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" |- ! style="background-color: #efefef;" | Author/Agency ! style="background-color: #efefef;" | Year ! style="background-color: #efefef;" | Title ! style="background-color: #efefef;" | Source ! style="background-color: #efefef;" | Expertise ! style="background-color: #efefef;" class="unsortable" | Full Text |- | Department of Commerce || 2010 || Defense Industrial Base Assessment || Government Report || None || Pdf |- | Department of Defense || 2007 || Mission Impact of Foreign Influence on DoD Software || Government Report || Low:Defense Policy/Procurement || Pdf |- | Department of Defense || 2005 || Strategy for Homeland Defense and Civil Support || Government Report || None || Pdf |- | Department of Homeland Security || 2009 || A Roadmap for Cybersecurity Research || Government Report || Low:Technology || Pdf |- | Department of Homeland Security || 2003 || The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets || Government Report || None || Pdf |- | Deputy Chief of Staff for Intelligence || 2006 || Critical Infrastructure Threats and Terrorism || Government Report || Low:Organizational Analysis; Low:Risk Management || Pdf |- | National Cyber Defense Initiative || 2009 || National Cyber Defense Financial Services Workshop Report || Government Report || Moderate:Financial Services Infrastructure || Pdf |- | National Cyber Security Summit Task Force || 2004 || Information Security Governance || Government Report || Moderate:Executive Administration || Pdf |- | National Infrastructure Advisory Council || 2004 || Hardening The Internet || Government Report || High:Technology || Pdf |- | National Institute of Standards and Technology || 2006 || SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security || Government Report || Moderate:Technology || Pdf |- | National Science and Technology Council || 2006 || Federal Plan for Cyber Security and Information Assurance Research and Development || Government Report || None || Pdf |- | Networking and Information Technology Research and Development || 2009 || National Cyber Leap Year Summit 2009, Co-Chairs' Report || Government Report || None || Pdf |- | President's Commission on Critical Infrastructure Protection || 1997 || Critical Foundations || Government Report || None || Pdf |- | President's Information Technology Advisory Council || 2005 || Cyber Security: A Crisis of Prioritization || Government Report || None || Pdf |- | United States Secret Service || 2004 || Insider Threat Study || Government Report || None || Pdf |- | White House || 2003 || The National Strategy to Secure Cyberspace || Government Report || None || Pdf |- | White House || 2009 || Cyberspace Policy Review || Government Report || None || Pdf |- | White House || 2010 || The Comprehensive National Cybersecurity Initiative || Government Report || None || Pdf |}

  • Subcategories: None

Jump to Table of Contents