Independent Reports: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 11: | Line 11: | ||
|- | |- | ||
|Center for Strategic and International Studies||2008||[[Securing Cyberspace for the 44th Presidency]]||Independent Reports||Low:Policy||[http://www.cyber.st.dhs.gov/docs/081208_securingcyberspace_44.pdf ''Pdf''] | |Center for Strategic and International Studies||2008||[[Securing Cyberspace for the 44th Presidency]]||Independent Reports||Low:Policy||[http://www.cyber.st.dhs.gov/docs/081208_securingcyberspace_44.pdf ''Pdf''] | ||
|- | |||
|Computing Research Association||2003||[[Four Grand Challenges in Trustworthy Computing]]||Independent Reports||None||[http://www.cyber.st.dhs.gov/docs/CRA%20Grand%20Challenges%202003.pdf ''Pdf''] | |||
|- | |- | ||
|Dörmann, Knut||2004||[[Applicability of the Additional Protocols to Computer Network Attacks]]||Independent Reports||Low:Law||[http://www.icrc.org/Web/eng/siteeng0.nsf/htmlall/68LG92/$File/ApplicabilityofIHLtoCNA.pdf ''Pdf''] | |Dörmann, Knut||2004||[[Applicability of the Additional Protocols to Computer Network Attacks]]||Independent Reports||Low:Law||[http://www.icrc.org/Web/eng/siteeng0.nsf/htmlall/68LG92/$File/ApplicabilityofIHLtoCNA.pdf ''Pdf''] | ||
|- | |- | ||
|Energetics Inc.||2006||[[Roadmap to Secure Control Systems in the Energy Sector]]||Independent Reports||None||[http://www.cyber.st.dhs.gov/docs/DOE%20Roadmap%202006.pdf ''Pdf''] | |Energetics Inc.||2006||[[Roadmap to Secure Control Systems in the Energy Sector]]||Independent Reports||None||[http://www.cyber.st.dhs.gov/docs/DOE%20Roadmap%202006.pdf ''Pdf''] | ||
Line 27: | Line 23: | ||
|- | |- | ||
|National Cyber Defense Initiative||2009||[[National Cyber Defense Financial Services Workshop Report]]||Independent Report||Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance||[http://www.cyber.st.dhs.gov/docs/NCDI_FI_Workshop_Report.pdf ''Pdf''] | |National Cyber Defense Initiative||2009||[[National Cyber Defense Financial Services Workshop Report]]||Independent Report||Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance||[http://www.cyber.st.dhs.gov/docs/NCDI_FI_Workshop_Report.pdf ''Pdf''] | ||
|- | |||
|National Research Council||2007||[[Toward a Safer and More Secure Cyberspace]]||Independent Reports||Low:Research Processes; Low:Technology||[http://www.cyber.st.dhs.gov/docs/Toward_a_Safer_and_More_Secure_Cyberspace-Full_report.pdf ''Pdf''] | |||
|- | |||
|National Research Council||1999||[[Trust in Cyberspace]]||Independent Reports||Moderate:Technology||[http://www.cyber.st.dhs.gov/docs/Trust%20in%20Cyberspace%20Report%201999.pdf ''Pdf''] | |||
|} | |} | ||
Revision as of 12:10, 11 August 2010
TOC-> Resource by Type->Independent Reports
Organization | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|
Center for Strategic and International Studies | 2008 | Securing Cyberspace for the 44th Presidency | Independent Reports | Low:Policy | |
Computing Research Association | 2003 | Four Grand Challenges in Trustworthy Computing | Independent Reports | None | |
Dörmann, Knut | 2004 | Applicability of the Additional Protocols to Computer Network Attacks | Independent Reports | Low:Law | |
Energetics Inc. | 2006 | Roadmap to Secure Control Systems in the Energy Sector | Independent Reports | None | |
Financial Services Sector Coordinating Council for Critical Infrastructure Protection | 2008 | Research Agenda for the Banking and Finance Sector | Independent Reports | None | |
Institute for Information Infrastructure Protection | 2003 | Cyber Security Research and Development Agenda | Independent Reports | Low/None:Technology | |
National Cyber Defense Initiative | 2009 | National Cyber Defense Financial Services Workshop Report | Independent Report | Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance | |
National Research Council | 2007 | Toward a Safer and More Secure Cyberspace | Independent Reports | Low:Research Processes; Low:Technology | |
National Research Council | 1999 | Trust in Cyberspace | Independent Reports | Moderate:Technology |
- Subcategories: None