Independent Reports: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 12: Line 12:
| Center for Strategic and International Studies ||2008|| [[Securing Cyberspace for the 44th Presidency]] ||Independent Reports||Low:Policy|| [http://www.cyber.st.dhs.gov/docs/081208_securingcyberspace_44.pdf ''Pdf'']
| Center for Strategic and International Studies ||2008|| [[Securing Cyberspace for the 44th Presidency]] ||Independent Reports||Low:Policy|| [http://www.cyber.st.dhs.gov/docs/081208_securingcyberspace_44.pdf ''Pdf'']
|-
|-
| National Research Council ||2007|| [[Toward a Safer and More Secure Cyberspace]] ||Independent Reports||None|| [ ''Pdf'']
| National Research Council ||2007|| [[Toward a Safer and More Secure Cyberspace]] ||Independent Reports||Low:Research Processes; Low:Technology|| [http://www.cyber.st.dhs.gov/docs/Toward_a_Safer_and_More_Secure_Cyberspace-Full_report.pdf ''Pdf'']
|-
|-
| National Research Council ||1999|| [[Trust in Cyberspace]] ||Independent Reports||None|| [ ''Pdf'']
| National Research Council ||1999|| [[Trust in Cyberspace]] ||Independent Reports||Moderate:Technology|| [http://www.cyber.st.dhs.gov/docs/Trust%20in%20Cyberspace%20Report%201999.pdf ''Pdf'']
|-
|-
| Computing Research Association ||2003|| [[Four Grand Challenges in Trustworthy Computing]] ||Independent Reports||None|| [ ''Pdf'']
| Computing Research Association ||2003|| [[Four Grand Challenges in Trustworthy Computing]] ||Independent Reports||None|| [http://www.cyber.st.dhs.gov/docs/CRA%20Grand%20Challenges%202003.pdf ''Pdf'']
|-
|-
| Energetics Inc. ||2006|| [[Roadmap to Secure Control Systems in the Energy Sector]] ||Independent Reports||None|| [ ''Pdf'']
| Energetics Inc. ||2006|| [[Roadmap to Secure Control Systems in the Energy Sector]] ||Independent Reports||None|| [http://www.cyber.st.dhs.gov/docs/DOE%20Roadmap%202006.pdf ''Pdf'']
|-
|-
| Financial Services Sector Coordinating Council for Critical Infrastructure Protection ||2008|| [[Research Agenda for the Banking and Finance Sector]] ||Independent Reports||None|| [ ''Pdf'']
| Financial Services Sector Coordinating Council for Critical Infrastructure Protection ||2008|| [[Research Agenda for the Banking and Finance Sector]] ||Independent Reports||None|| [http://www.cyber.st.dhs.gov/docs/RD_Agenda-FINAL.pdf ''Pdf'']
|-
|-
| Institute for Information Infrastructure Protection ||2003|| [[Cyber Security Research and Development Agenda]] ||Independent Reports||None|| [ ''Pdf'']
| Institute for Information Infrastructure Protection ||2003|| [[Cyber Security Research and Development Agenda]] ||Independent Reports||Low/None:Technology|| [http://www.cyber.st.dhs.gov/docs/I3P%20Research%20Agenda%202003.pdf ''Pdf'']
|}
|}



Revision as of 16:14, 9 August 2010

TOC-> Resource by Type->Independent Reports

Author/Agency Year Title Source Expertise Full Text
Center for Strategic and International Studies 2008 Securing Cyberspace for the 44th Presidency Independent Reports Low:Policy Pdf
National Research Council 2007 Toward a Safer and More Secure Cyberspace Independent Reports Low:Research Processes; Low:Technology Pdf
National Research Council 1999 Trust in Cyberspace Independent Reports Moderate:Technology Pdf
Computing Research Association 2003 Four Grand Challenges in Trustworthy Computing Independent Reports None Pdf
Energetics Inc. 2006 Roadmap to Secure Control Systems in the Energy Sector Independent Reports None Pdf
Financial Services Sector Coordinating Council for Critical Infrastructure Protection 2008 Research Agenda for the Banking and Finance Sector Independent Reports None Pdf
Institute for Information Infrastructure Protection 2003 Cyber Security Research and Development Agenda Independent Reports Low/None:Technology Pdf
  • Subcategories: None

Jump to Table of Contents