US Government Reports and Documents: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 30: | Line 30: | ||
|National Institute of Standards and Technology||2006||[[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]||Government Report||Moderate:Technology||[http://www.cyber.st.dhs.gov/docs/NIST%20Guide%20to%20Supervisory%20and%20Data%20Acquisition-SCADA%20and%20Industrial%20Control%20Systems%20Security%20(2007).pdf ''Pdf''] | |National Institute of Standards and Technology||2006||[[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]||Government Report||Moderate:Technology||[http://www.cyber.st.dhs.gov/docs/NIST%20Guide%20to%20Supervisory%20and%20Data%20Acquisition-SCADA%20and%20Industrial%20Control%20Systems%20Security%20(2007).pdf ''Pdf''] | ||
|- | |- | ||
|National Science and Technology Council|| | |National Science and Technology Council||2006||[[Federal Plan for Cyber Security and Information Assurance Research and Development]]||Government Report||Low:Technology||[http://www.cyber.st.dhs.gov/docs/Federal%20R&D%20Plan%202006.pdf ''Pdf''] | ||
|- | |- | ||
|Networking and Information Technology Research and Development||2009||[[National Cyber Leap Year Summit 2009, Co-Chairs' Report]]||Government Report||Low:Technology||[http://www.cyber.st.dhs.gov/docs/National_Cyber_Leap_Year_Summit_2009_Co-Chairs_Report.pdf ''Pdf''] | |Networking and Information Technology Research and Development||2009||[[National Cyber Leap Year Summit 2009, Co-Chairs' Report]]||Government Report||Low:Technology||[http://www.cyber.st.dhs.gov/docs/National_Cyber_Leap_Year_Summit_2009_Co-Chairs_Report.pdf ''Pdf''] |
Latest revision as of 10:30, 9 September 2010
TOC-> Resource by Type-> Government Reports and Documents->US Government Reports and Documents
Author/Agency | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|
Department of Commerce | 2010 | Defense Industrial Base Assessment | Government Report | None | |
Department of Defense | 1999 | An Assessment of International Legal Issues in Information Operations | Government Report | Moderate:Law | |
Department of Defense | 2007 | Mission Impact of Foreign Influence on DoD Software | Government Report | Low:Defense Policy/Procurement | |
Department of Defense | 2005 | Strategy for Homeland Defense and Civil Support | Government Report | None | |
Department of Homeland Security | 2009 | A Roadmap for Cybersecurity Research | Government Report | Low:Technology | |
Department of Homeland Security | 2003 | The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets | Government Report | None | |
Deputy Chief of Staff for Intelligence | 2006 | Critical Infrastructure Threats and Terrorism | Government Report | Low:Organizational Analysis; Low:Risk Management | |
National Cyber Security Summit Task Force | 2004 | Information Security Governance | Government Report | Moderate:Executive Administration | |
National Infrastructure Advisory Council | 2004 | Hardening The Internet | Government Report | High:Technology | |
National Institute of Standards and Technology | 2006 | SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security | Government Report | Moderate:Technology | |
National Science and Technology Council | 2006 | Federal Plan for Cyber Security and Information Assurance Research and Development | Government Report | Low:Technology | |
Networking and Information Technology Research and Development | 2009 | National Cyber Leap Year Summit 2009, Co-Chairs' Report | Government Report | Low:Technology | |
President's Commission on Critical Infrastructure Protection | 1997 | Critical Foundations | Government Report | None | |
President's Information Technology Advisory Council | 2005 | Cyber Security: A Crisis of Prioritization | Government Report | None | |
United States Secret Service | 2004 | Insider Threat Study | Government Report | None | |
White House | 2003 | The National Strategy to Secure Cyberspace | Government Report | None | |
White House | 2009 | Cyberspace Policy Review | Government Report | None | |
White House | 2010 | The Comprehensive National Cybersecurity Initiative | Government Report | None |
- Subcategories: None