Security Targets: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 24: Line 24:


McAfee, Inc. (2010) [[McAfee Threats Report]]
McAfee, Inc. (2010) [[McAfee Threats Report]]
Moore, Tyler and Clayton, Richard  (2007) [[Examining the Impact of Website Take-down on Phishing]]


Moore, Tyler and Clayton, Richard  (2008) [[The Consequence of Non-Cooperation in the Fight Against Phishing]]
Moore, Tyler and Clayton, Richard  (2008) [[The Consequence of Non-Cooperation in the Fight Against Phishing]]
Line 62: Line 60:
|-
|-
|Deputy Chief of Staff for Intelligence||||2006||[[Critical Infrastructure Threats and Terrorism]]||Government Report||Low:Organizational Analysis; Low:Risk Management||[http://www.fas.org/irp/threat/terrorism/sup2.pdf  ''Pdf'']
|Deputy Chief of Staff for Intelligence||||2006||[[Critical Infrastructure Threats and Terrorism]]||Government Report||Low:Organizational Analysis; Low:Risk Management||[http://www.fas.org/irp/threat/terrorism/sup2.pdf  ''Pdf'']
|-
|Moore, Tyler||Clayton, Richard||2007||[[Examining the Impact of Website Take-down on Phishing]]||Conference Paper||Low:Technology||[http://www.ecrimeresearch.org/2007/proceedings/p1_moore.pdf ''Pdf''] [http://www.cl.cam.ac.uk/~rnc1/ecrime07.pdf  ''Alt Pdf'']
|}
|}



Revision as of 12:38, 11 August 2010

TOC-> Threats and Actors->Security Targets

Anderson, Ross J. (2008) Security Engineering

Brown, Davis (2006) A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict

Department of Commerce (2010) Defense Industrial Base Assessment

Department of Defense (2005) Strategy for Homeland Defense and Civil Support

Department of Defense (2007) Mission Impact of Foreign Influence on DoD Software

Department of Homeland Security (2003) The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets

Energetics Inc. (2006) Roadmap to Secure Control Systems in the Energy Sector

Epstein, Richard A. and Brown, Thomas P. (2008) Cybersecurity in the Payment Card Industry

Financial Services Sector Coordinating Council for Critical Infrastructure Protection (2008) Research Agenda for the Banking and Finance Sector

Johnson, Eric M. (2008) Managing Information Risk and the Economics of Security

Kramer, Franklin D., et. al (2009) Cyberpower and National Security

McAfee, Inc. (2010) McAfee Threats Report

Moore, Tyler and Clayton, Richard (2008) The Consequence of Non-Cooperation in the Fight Against Phishing

Moore, Tyler and Clayton, Richard (2009) The Impact of Incentives on Notice and Take-down

Moore, Tyler, et. al (2009) The Economics of Online Crime

National Cyber Security Summit Task Force (2004) Information Security Governance

National Institute of Standards and Technology (2006) SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security

National Research Council (2007) Toward a Safer and More Secure Cyberspace

National Research Council (1999) Trust in Cyberspace

Powell, Benjamin (2005) Is Cybersecurity a Public Good

Schneier, Bruce (2003) Beyond Fear

Symantec Corporation (2010) Symantec Global Internet Security Threat Report

Thomas, Rob and Martin, Jerry (2006) The Underground Economy

Author 1 Author 2 Year Title Source Expertise Full Text
Clarke, Richard A. Knake, Robert 2010 Cyber War Book None N/A
Deputy Chief of Staff for Intelligence 2006 Critical Infrastructure Threats and Terrorism Government Report Low:Organizational Analysis; Low:Risk Management Pdf
Moore, Tyler Clayton, Richard 2007 Examining the Impact of Website Take-down on Phishing Conference Paper Low:Technology Pdf Alt Pdf

Subcategories:

Jump to Table of Contents