Private Efforts/Organizations: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 5: | Line 5: | ||
Bohme, Rainer and Schwartz, Galina (2010) [[Modeling Cyber-Insurance]] | Bohme, Rainer and Schwartz, Galina (2010) [[Modeling Cyber-Insurance]] | ||
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | {| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | ||
Line 16: | Line 16: | ||
! style="background-color: #efefef;" | Expertise | ! style="background-color: #efefef;" | Expertise | ||
! style="background-color: #efefef;" class="unsortable" | Full Text | ! style="background-color: #efefef;" class="unsortable" | Full Text | ||
|- | |||
|Clinton, Larry||||Undated||[[Cyber-Insurance Metrics and Impact on Cyber-Security]]||Online Paper||Low:Technology; Low:Law||[http://www.whitehouse.gov/files/documents/cyber/ISA%20-%20Cyber-Insurance%20Metrics%20and%20Impact%20on%20Cyber-Security.pdf ''Pdf''] | |||
|- | |- | ||
|Moore, Tyler||Clayton, Richard||2009||[[The Impact of Incentives on Notice and Take-down]]||Book Chapter||Moderate:Technology; Low:Law||[http://weis2008.econinfosec.org/papers/MooreImpact.pdf ''Pdf''] | |Moore, Tyler||Clayton, Richard||2009||[[The Impact of Incentives on Notice and Take-down]]||Book Chapter||Moderate:Technology; Low:Law||[http://weis2008.econinfosec.org/papers/MooreImpact.pdf ''Pdf''] |
Revision as of 13:52, 19 August 2010
TOC-> Approaches->Private Efforts/Organizations
Bohme, Rainer and Kataria, Gaurav (2006) Models and Measures for Correlation in Cyber-Insurance
Bohme, Rainer and Schwartz, Galina (2010) Modeling Cyber-Insurance
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Clinton, Larry | Undated | Cyber-Insurance Metrics and Impact on Cyber-Security | Online Paper | Low:Technology; Low:Law | ||
Moore, Tyler | Clayton, Richard | 2009 | The Impact of Incentives on Notice and Take-down | Book Chapter | Moderate:Technology; Low:Law | |
National Cyber Defense Initiative | 2009 | National Cyber Defense Financial Services Workshop Report | Independent Report | Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance | ||
National Cyber Security Summit Task Force | 2004 | Information Security Governance | Government Report | Moderate:Executive Administration | ||
National Infrastructure Advisory Council | 2004 | Hardening The Internet | Government Report | High:Technology | ||
National Institute of Standards and Technology | 2006 | SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security | Government Report | Moderate:Technology | ||
Verizon | 2010 | 2010 Data Breach Investigations Report | Industry Report | Low:Technology | ||
White House | 2009 | Cyberspace Policy Review | Government Report | None |
- Subcategories: None