Security Targets: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 12: Line 12:


Department of Homeland Security (2003) [[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]
Department of Homeland Security (2003) [[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]
Deputy Chief of Staff for Intelligence (2006) [[Critical Infrastructure Threats and Terrorism]]


Energetics Inc. (2006) [[Roadmap to Secure Control Systems in the Energy Sector]]
Energetics Inc. (2006) [[Roadmap to Secure Control Systems in the Energy Sector]]
Line 62: Line 60:
|-
|-
|Clarke, Richard A.||Knake, Robert||2010||[[Cyber War]]||Book||None||N/A
|Clarke, Richard A.||Knake, Robert||2010||[[Cyber War]]||Book||None||N/A
|-
|Deputy Chief of Staff for Intelligence||||2006||[[Critical Infrastructure Threats and Terrorism]]||Government Report||Low:Organizational Analysis; Low:Risk Management||[http://www.fas.org/irp/threat/terrorism/sup2.pdf  ''Pdf'']
|}
|}



Revision as of 10:25, 11 August 2010

TOC-> Threats and Actors->Security Targets

Anderson, Ross J. (2008) Security Engineering

Brown, Davis (2006) A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict

Department of Commerce (2010) Defense Industrial Base Assessment

Department of Defense (2005) Strategy for Homeland Defense and Civil Support

Department of Defense (2007) Mission Impact of Foreign Influence on DoD Software

Department of Homeland Security (2003) The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets

Energetics Inc. (2006) Roadmap to Secure Control Systems in the Energy Sector

Epstein, Richard A. and Brown, Thomas P. (2008) Cybersecurity in the Payment Card Industry

Financial Services Sector Coordinating Council for Critical Infrastructure Protection (2008) Research Agenda for the Banking and Finance Sector

Johnson, Eric M. (2008) Managing Information Risk and the Economics of Security

Kramer, Franklin D., et. al (2009) Cyberpower and National Security

McAfee, Inc. (2010) McAfee Threats Report

Moore, Tyler and Clayton, Richard (2007) Examining the Impact of Website Take-down on Phishing

Moore, Tyler and Clayton, Richard (2008) The Consequence of Non-Cooperation in the Fight Against Phishing

Moore, Tyler and Clayton, Richard (2009) The Impact of Incentives on Notice and Take-down

Moore, Tyler, et. al (2009) The Economics of Online Crime

National Cyber Security Summit Task Force (2004) Information Security Governance

National Institute of Standards and Technology (2006) SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security

National Research Council (2007) Toward a Safer and More Secure Cyberspace

National Research Council (1999) Trust in Cyberspace

Powell, Benjamin (2005) Is Cybersecurity a Public Good

Schneier, Bruce (2003) Beyond Fear

Symantec Corporation (2010) Symantec Global Internet Security Threat Report

Thomas, Rob and Martin, Jerry (2006) The Underground Economy

Author 1 Author 2 Year Title Source Expertise Full Text
Clarke, Richard A. Knake, Robert 2010 Cyber War Book None N/A
Deputy Chief of Staff for Intelligence 2006 Critical Infrastructure Threats and Terrorism Government Report Low:Organizational Analysis; Low:Risk Management Pdf

Subcategories:

Jump to Table of Contents