Technology: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
''[[Table of Contents | TOC->]][[Approaches | Approaches->]][[Technology]]'' | ''[[Table of Contents | TOC->]][[Approaches | Approaches->]][[Technology]]'' | ||
Line 22: | Line 20: | ||
|- | |- | ||
National Cyber Defense Initiative || ||2009|| [[National Cyber Defense Financial Services Workshop Report]] || Independent Report|| Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance ||[http://www.cyber.st.dhs.gov/docs/NCDI_FI_Workshop_Report.pdf ''Pdf''] | National Cyber Defense Initiative || ||2009|| [[National Cyber Defense Financial Services Workshop Report]] || Independent Report|| Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance ||[http://www.cyber.st.dhs.gov/docs/NCDI_FI_Workshop_Report.pdf ''Pdf''] | ||
|- | |||
| National Infrastructure Advisory Council || 2004 || [[Hardening The Internet]] || Government Report || High:Technology || [http://www.cyber.st.dhs.gov/docs/NIAC%20Internet%20Hardening.pdf ''Pdf''] | |||
|- | |- | ||
| National Institute of Standards and Technology || ||2006||[[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]||Government Report||Moderate:Technology||[http://www.cyber.st.dhs.gov/docs/NIST%20Guide%20to%20Supervisory%20and%20Data%20Acquisition-SCADA%20and%20Industrial%20Control%20Systems%20Security%20(2007).pdf ''Pdf''] | | National Institute of Standards and Technology || ||2006||[[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]||Government Report||Moderate:Technology||[http://www.cyber.st.dhs.gov/docs/NIST%20Guide%20to%20Supervisory%20and%20Data%20Acquisition-SCADA%20and%20Industrial%20Control%20Systems%20Security%20(2007).pdf ''Pdf''] | ||
|- | |- | ||
| National Cyber Security Summit Task Force || ||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf''] | | National Cyber Security Summit Task Force || ||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf''] | ||
|} | |} | ||
*'''''Subcategories:''''' ''None'' | *'''''Subcategories:''''' ''None'' | ||
''[[Table of Contents| Jump to Table of Contents]]'' | ''[[Table of Contents| Jump to Table of Contents]]'' |
Revision as of 11:26, 10 August 2010
National Cyber Defense Initiative || ||2009|| National Cyber Defense Financial Services Workshop Report || Independent Report|| Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance ||Pdf
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross | Moore, Tyler | 2006 | The Economics of Information Security | Science | Low:Economics | |
Gandal, Neil | 2008 | An Introduction to Key Themes in the Economics of Cyber Security | Book Chapter | Low:Economics | ||
Moore, Tyler | Clayton, Richard | 2007 | Examining the Impact of Website Take-down on Phishing | Conf. Paper | Low:Technology | |
Moore, Tyler | Clayton, Richard | 2008 | The Consequence of Non-Cooperation in the Fight Against Phishing | Conf. Paper | Low:Technology; Low:Economics | |
National Infrastructure Advisory Council | 2004 | Hardening The Internet | Government Report | High:Technology | ||
National Institute of Standards and Technology | 2006 | SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security | Government Report | Moderate:Technology | ||
National Cyber Security Summit Task Force | 2004 | Information Security Governance | Government Report | Moderate:Executive Administration |
- Subcategories: None