Government Reports and Documents: Difference between revisions
No edit summary |
No edit summary |
||
Line 27: | Line 27: | ||
PITAC ''(2005)'' [[Cyber Security: A Crisis of Prioritization]] | PITAC ''(2005)'' [[Cyber Security: A Crisis of Prioritization]] | ||
USSS ''(2004)'' [[Insider Threat Study | USSS ''(2004)'' [[Insider Threat Study]] | ||
NIAC ''(2004)'' [[Hardening The Internet]] | NIAC ''(2004)'' [[Hardening The Internet]] | ||
Empty ''(2004)'' [[Information Security Governance | Empty ''(2004)'' [[Information Security Governance]] | ||
CRA ''(2003)'' [[Four Grand Challenges in Trustworthy Computing]] | CRA ''(2003)'' [[Four Grand Challenges in Trustworthy Computing]] |
Revision as of 10:42, 4 June 2010
DHS S&T (2009) A Roadmap for Cybersecurity Research
White House (2010) The Comprehensive National Cybersecurity Initiative
NCDI (2009) National Cyber Defense Financial Services Workshop Report
NITRD (2009) National Cyber Leap Year Summit 2009, Co-Chairs' Report
White House (2009) Cyberspace Policy Review
CSIS (2008) Securing Cyberspace for the 44th Presidency
FSSCC (2008) Research Agenda for the Banking and Finance Sector
DoD (2007) Mission Impact of Foreign Influence on DoD Software
NRC (2007) Toward a Safer and More Secure Cyberspace
NIST (2006) SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security
NSTC (2006) Federal Plan for Cyber Security and Information Assurance Research and Development
DOE (2006) Roadmap to Secure Control Systems in the Energy Sector
IRC (2005) Hard Problem List
PITAC (2005) Cyber Security: A Crisis of Prioritization
USSS (2004) Insider Threat Study
NIAC (2004) Hardening The Internet
Empty (2004) Information Security Governance
CRA (2003) Four Grand Challenges in Trustworthy Computing
White House (2003) The National Strategy to Secure Cyberspace
I3P (2003) Cyber Security Research and Development Agenda
NRC (1999) Trust in Cyberspace
PCCIP (1997) Critical Foundations: Protecting America's Infrastructures