Technology: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 11: Line 11:
! style="background-color: #efefef;" class="unsortable" | Full Text   
! style="background-color: #efefef;" class="unsortable" | Full Text   
|-
|-
| Anderson, Ross || Moore, Tyler ||2006||[[The Economics of Information Security]]||Science||Low:Economics||[http://people.seas.harvard.edu/~tmoore/science-econ.pdf  ''Pdf'']  
|Anderson, Ross||Moore, Tyler||2006||[[The Economics of Information Security]]||Science||Low:Economics||[http://people.seas.harvard.edu/~tmoore/science-econ.pdf  ''Pdf''][http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.89.3331&rep=rep1&type=pdf [''AltPdf'']
|-
|-
| Gandal, Neil || ||2008||[[An Introduction to Key Themes in the Economics of Cyber Security]]||Book Chapter||Low:Economics||[http://www.tau.ac.il/~gandal/security%20encyclopedia%20entry.pdf ''Pdf'']
|Gandal, Neil||||2008||[[An Introduction to Key Themes in the Economics of Cyber Security]]||Book Chapter||Low:Economics||[http://www.tau.ac.il/~gandal/security%20encyclopedia%20entry.pdf ''Pdf'']
|-
|-
| Moore, Tyler || Clayton, Richard ||2007||[[Examining the Impact of Website Take-down on Phishing]]||Conf. Paper||Low:Technology||[http://www.ecrimeresearch.org/2007/proceedings/p1_moore.pdf ''Pdf'']  
|Moore, Tyler||Clayton, Richard||2007||[[Examining the Impact of Website Take-down on Phishing]]||Conf. Paper||Low:Technology||[http://www.ecrimeresearch.org/2007/proceedings/p1_moore.pdf ''Pdf'']  
|-
|-
| Moore, Tyler || Clayton, Richard ||2008||[[The Consequence of Non-Cooperation in the Fight Against Phishing]]||Conf. Paper||Low:Technology; Low:Economics||[http://people.seas.harvard.edu/~tmoore/ecrime08.pdf ''Pdf'']
|Moore, Tyler||Clayton, Richard||2008||[[The Consequence of Non-Cooperation in the Fight Against Phishing]]||Conf. Paper||Low:Technology; Low:Economics||[http://people.seas.harvard.edu/~tmoore/ecrime08.pdf ''Pdf'']
|-
|-
| National Cyber Defense Initiative || ||2009|| [[National Cyber Defense Financial Services Workshop Report]] || Independent Report|| Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance ||[http://www.cyber.st.dhs.gov/docs/NCDI_FI_Workshop_Report.pdf ''Pdf'']
|National Cyber Defense Initiative||||2009||[[National Cyber Defense Financial Services Workshop Report]]||Independent Report||Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance||[http://www.cyber.st.dhs.gov/docs/NCDI_FI_Workshop_Report.pdf ''Pdf'']
|-
|-
| National Infrastructure Advisory Council || ||2004||[[Hardening The Internet]]||Government Report||High:Technology||[http://www.cyber.st.dhs.gov/docs/NIAC%20Internet%20Hardening.pdf  ''Pdf'']
|National Infrastructure Advisory Council||||2004||[[Hardening The Internet]]||Government Report||High:Technology||[http://www.cyber.st.dhs.gov/docs/NIAC%20Internet%20Hardening.pdf  ''Pdf'']
|-
|-
| National Institute of Standards and Technology || ||2006||[[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]||Government Report||Moderate:Technology||[http://www.cyber.st.dhs.gov/docs/NIST%20Guide%20to%20Supervisory%20and%20Data%20Acquisition-SCADA%20and%20Industrial%20Control%20Systems%20Security%20(2007).pdf ''Pdf'']
|National Institute of Standards and Technology||||2006||[[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]||Government Report||Moderate:Technology||[http://www.cyber.st.dhs.gov/docs/NIST%20Guide%20to%20Supervisory%20and%20Data%20Acquisition-SCADA%20and%20Industrial%20Control%20Systems%20Security%20(2007).pdf ''Pdf'']
|-
|-
| National Cyber Security Summit Task Force || ||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf  ''Pdf'']
|National Cyber Security Summit Task Force||||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf  ''Pdf'']
|}
|}



Revision as of 14:21, 10 August 2010

TOC-> Approaches->Technology

Author 1 Author 2 Year Title Source Expertise Full Text
Anderson, Ross Moore, Tyler 2006 The Economics of Information Security Science Low:Economics Pdf[AltPdf
Gandal, Neil 2008 An Introduction to Key Themes in the Economics of Cyber Security Book Chapter Low:Economics Pdf
Moore, Tyler Clayton, Richard 2007 Examining the Impact of Website Take-down on Phishing Conf. Paper Low:Technology Pdf
Moore, Tyler Clayton, Richard 2008 The Consequence of Non-Cooperation in the Fight Against Phishing Conf. Paper Low:Technology; Low:Economics Pdf
National Cyber Defense Initiative 2009 National Cyber Defense Financial Services Workshop Report Independent Report Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance Pdf
National Infrastructure Advisory Council 2004 Hardening The Internet Government Report High:Technology Pdf
National Institute of Standards and Technology 2006 SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security Government Report Moderate:Technology Pdf
National Cyber Security Summit Task Force 2004 Information Security Governance Government Report Moderate:Executive Administration Pdf
  • Subcategories: None

Jump to Table of Contents