Financial Institutions and Networks: Difference between revisions
No edit summary |
No edit summary |
||
Line 2: | Line 2: | ||
Epstein, Richard A. and Brown, Thomas P. (2008) [[Cybersecurity in the Payment Card Industry]] | Epstein, Richard A. and Brown, Thomas P. (2008) [[Cybersecurity in the Payment Card Industry]] | ||
McAfee, Inc. (2010) [[McAfee Threats Report]] | McAfee, Inc. (2010) [[McAfee Threats Report]] | ||
Line 36: | Line 34: | ||
|- | |- | ||
|Deputy Chief of Staff for Intelligence||||2006||[[Critical Infrastructure Threats and Terrorism]]||Government Report||Low:Organizational Analysis; Low:Risk Management||[http://www.fas.org/irp/threat/terrorism/sup2.pdf ''Pdf''] | |Deputy Chief of Staff for Intelligence||||2006||[[Critical Infrastructure Threats and Terrorism]]||Government Report||Low:Organizational Analysis; Low:Risk Management||[http://www.fas.org/irp/threat/terrorism/sup2.pdf ''Pdf''] | ||
|- | |||
|Financial Services Sector Coordinating Council for Critical Infrastructure Protection||||2008||[[Research Agenda for the Banking and Finance Sector]]||Independent Reports||None||[http://www.cyber.st.dhs.gov/docs/RD_Agenda-FINAL.pdf ''Pdf''] | |||
|- | |- | ||
|Johnson, Eric M.||||2008||[[Managing Information Risk and the Economics of Security]]||Book||High:Economics||N/A | |Johnson, Eric M.||||2008||[[Managing Information Risk and the Economics of Security]]||Book||High:Economics||N/A |
Revision as of 11:16, 11 August 2010
TOC-> Threats and Actors-> Security Targets-> Private Critical Infrastructure->Financial Institutions and Networks
Epstein, Richard A. and Brown, Thomas P. (2008) Cybersecurity in the Payment Card Industry
McAfee, Inc. (2010) McAfee Threats Report
Moore, Tyler and Clayton, Richard (2008) The Consequence of Non-Cooperation in the Fight Against Phishing
Moore, Tyler and Clayton, Richard (2009) The Impact of Incentives on Notice and Take-down
Moore, Tyler, et. al (2009) The Economics of Online Crime
National Cyber Defense Initiative (2009) National Cyber Defense Financial Services Workshop Report
Powell, Benjamin (2005) Is Cybersecurity a Public Good
Symantec Corporation (2010) Symantec Global Internet Security Threat Report
Thomas, Rob and Martin, Jerry (2006) The Underground Economy
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross J. | 2008 | Security Engineering | Book | Moderate:Technology; Moderate:Cryptography | N/A | |
Department of Homeland Security | 2003 | The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets | Government Report | None | ||
Deputy Chief of Staff for Intelligence | 2006 | Critical Infrastructure Threats and Terrorism | Government Report | Low:Organizational Analysis; Low:Risk Management | ||
Financial Services Sector Coordinating Council for Critical Infrastructure Protection | 2008 | Research Agenda for the Banking and Finance Sector | Independent Reports | None | ||
Johnson, Eric M. | 2008 | Managing Information Risk and the Economics of Security | Book | High:Economics | N/A | |
United States Secret Service | 2004 | Insider Threat Study | Government Report | None |
- Subcategories: None