Independent Reports: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 12: | Line 12: | ||
| Center for Strategic and International Studies ||2008|| [[Securing Cyberspace for the 44th Presidency]] ||Independent Reports||Low:Policy|| [http://www.cyber.st.dhs.gov/docs/081208_securingcyberspace_44.pdf ''Pdf''] | | Center for Strategic and International Studies ||2008|| [[Securing Cyberspace for the 44th Presidency]] ||Independent Reports||Low:Policy|| [http://www.cyber.st.dhs.gov/docs/081208_securingcyberspace_44.pdf ''Pdf''] | ||
|- | |- | ||
| National Research Council ||2007|| [[Toward a Safer and More Secure Cyberspace]] ||Independent Reports|| | | National Research Council ||2007|| [[Toward a Safer and More Secure Cyberspace]] ||Independent Reports||Low:Research Processes; Low:Technology|| [http://www.cyber.st.dhs.gov/docs/Toward_a_Safer_and_More_Secure_Cyberspace-Full_report.pdf ''Pdf''] | ||
|- | |- | ||
| National Research Council ||1999|| [[Trust in Cyberspace]] ||Independent Reports|| | | National Research Council ||1999|| [[Trust in Cyberspace]] ||Independent Reports||Moderate:Technology|| [http://www.cyber.st.dhs.gov/docs/Trust%20in%20Cyberspace%20Report%201999.pdf ''Pdf''] | ||
|- | |- | ||
| Computing Research Association ||2003|| [[Four Grand Challenges in Trustworthy Computing]] ||Independent Reports||None|| [ ''Pdf''] | | Computing Research Association ||2003|| [[Four Grand Challenges in Trustworthy Computing]] ||Independent Reports||None|| [http://www.cyber.st.dhs.gov/docs/CRA%20Grand%20Challenges%202003.pdf ''Pdf''] | ||
|- | |- | ||
| Energetics Inc. ||2006|| [[Roadmap to Secure Control Systems in the Energy Sector]] ||Independent Reports||None|| [ ''Pdf''] | | Energetics Inc. ||2006|| [[Roadmap to Secure Control Systems in the Energy Sector]] ||Independent Reports||None|| [http://www.cyber.st.dhs.gov/docs/DOE%20Roadmap%202006.pdf ''Pdf''] | ||
|- | |- | ||
| Financial Services Sector Coordinating Council for Critical Infrastructure Protection ||2008|| [[Research Agenda for the Banking and Finance Sector]] ||Independent Reports||None|| [ ''Pdf''] | | Financial Services Sector Coordinating Council for Critical Infrastructure Protection ||2008|| [[Research Agenda for the Banking and Finance Sector]] ||Independent Reports||None|| [http://www.cyber.st.dhs.gov/docs/RD_Agenda-FINAL.pdf ''Pdf''] | ||
|- | |- | ||
| Institute for Information Infrastructure Protection ||2003|| [[Cyber Security Research and Development Agenda]] ||Independent Reports||None|| [ ''Pdf''] | | Institute for Information Infrastructure Protection ||2003|| [[Cyber Security Research and Development Agenda]] ||Independent Reports||Low/None:Technology|| [http://www.cyber.st.dhs.gov/docs/I3P%20Research%20Agenda%202003.pdf ''Pdf''] | ||
|} | |} | ||
Revision as of 16:14, 9 August 2010
TOC-> Resource by Type->Independent Reports
Author/Agency | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|
Center for Strategic and International Studies | 2008 | Securing Cyberspace for the 44th Presidency | Independent Reports | Low:Policy | |
National Research Council | 2007 | Toward a Safer and More Secure Cyberspace | Independent Reports | Low:Research Processes; Low:Technology | |
National Research Council | 1999 | Trust in Cyberspace | Independent Reports | Moderate:Technology | |
Computing Research Association | 2003 | Four Grand Challenges in Trustworthy Computing | Independent Reports | None | |
Energetics Inc. | 2006 | Roadmap to Secure Control Systems in the Energy Sector | Independent Reports | None | |
Financial Services Sector Coordinating Council for Critical Infrastructure Protection | 2008 | Research Agenda for the Banking and Finance Sector | Independent Reports | None | |
Institute for Information Infrastructure Protection | 2003 | Cyber Security Research and Development Agenda | Independent Reports | Low/None:Technology |
- Subcategories: None