Template:Filtered Table: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 9: | Line 9: | ||
! align="center" style="background:#f0f0f0;"|'''Category''' | ! align="center" style="background:#f0f0f0;"|'''Category''' | ||
! align="center" style="background:#f0f0f0;"|'''Synopsis''' | ! align="center" style="background:#f0f0f0;"|'''Synopsis''' | ||
|- | |- | ||
| Anderson, Ross ||1909-06-24||[http://cyber.law.harvard.edu/cybersecurity/Why_Information_Security_is_Hard Why Information Security is Hard ]||Conf. Paper ||4.2.1 [[Risk Management and Investment]],<br>4.2.2 [[Incentives]],<br>5.1 [[Regulation/Liability]]||Yes | | Anderson, Ross ||1909-06-24||[http://cyber.law.harvard.edu/cybersecurity/Why_Information_Security_is_Hard Why Information Security is Hard ]||Conf. Paper ||4.2.1 [[Risk Management and Investment]],<br>4.2.2 [[Incentives]],<br>5.1 [[Regulation/Liability]]||Yes | ||
Line 15: | Line 14: | ||
| Anderson, Ross ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/The_Economics_of_Information_Security The Economics of Information Security ]||Journal Article ||4.2 Economics of Cybersecurity,<br>5.1 Regulation/Liability,<br>5.7 Technology||Yes | | Anderson, Ross ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/The_Economics_of_Information_Security The Economics of Information Security ]||Journal Article ||4.2 Economics of Cybersecurity,<br>5.1 Regulation/Liability,<br>5.7 Technology||Yes | ||
|- | |- | ||
| Anderson, Ross J. ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/Security_Engineering Security Engineering ]||Book ||3.2 [[Security Targets]],<br>4.2 [[Economics of | | Anderson, Ross J. ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/Security_Engineering Security Engineering ]||Book ||3.2 [[Security Targets]],<br>4.2 [[Economics of Cyber Security]],<br>5.1 [[Regulation/Liability]]||Yes | ||
|- | |- | ||
| Anderson, Ross, et. al ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/Security_Economics_and_the_Internal_Market Security Economics and the Internal Market ]||Study ||4.2 [[Economics of Cybersecurity]],<br>4.11 [[Cybercrime]],<br>5.6 [[Deterrence]]||Yes | | Anderson, Ross, et. al ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/Security_Economics_and_the_Internal_Market Security Economics and the Internal Market ]||Study ||4.2 [[Economics of Cybersecurity]],<br>4.11 [[Cybercrime]],<br>5.6 [[Deterrence]]||Yes | ||
Line 43: | Line 42: | ||
| Business Software Alliance, Center for Democracy & Technology, U.S. Chamber of Commerce, Internet Security Alliance, Tech America ||2011-03-08||[http://www.cdt.org/files/pdfs/20110308_cbyersec_paper.pdf Improving our Nation’s Cybersecurity through the Public-Private Partnership: a White Paper ]||Industry Report||4.6 Information Sharing/Disclosure,<br>4.7 Public-Private Cooperation,<br>5. Approaches||No | | Business Software Alliance, Center for Democracy & Technology, U.S. Chamber of Commerce, Internet Security Alliance, Tech America ||2011-03-08||[http://www.cdt.org/files/pdfs/20110308_cbyersec_paper.pdf Improving our Nation’s Cybersecurity through the Public-Private Partnership: a White Paper ]||Industry Report||4.6 Information Sharing/Disclosure,<br>4.7 Public-Private Cooperation,<br>5. Approaches||No | ||
|- | |- | ||
| Cabinet Office (United Kingdom) ||2012-11-11||[http://www.cabinetoffice.gov.uk/sites/default/files/resources/uk-cyber-security-strategy-final.pdf The UK Cyber Security Strategy: Protecting and promoting the UK in a digital world ]||Non-US Government Report||3. Threats and Actors,<br>4.7 Public-Private Cooperation,<br>5.3 Government Organizations||No | | Cabinet Office (United Kingdom) ||2012-11-11||[http://www.cabinetoffice.gov.uk/sites/default/files/resources/uk-cyber-security-strategy-final.pdf The UK Cyber Security Strategy: Protecting and promoting the UK in a digital world ]||Non-US Government Report||3. [[Threats and Actors]],<br>4.7 Public-Private Cooperation,<br>5.3 Government Organizations||No | ||
|- | |- | ||
| Camp, L. Jean ||1909-06-27||[http://cyber.law.harvard.edu/cybersecurity/Economics_of_Information_Security Economics of Information Security ]||Book ||4.2 Economics of Cybersecurity,<br>5.1 Regulation/Liability||Yes | | Camp, L. Jean ||1909-06-27||[http://cyber.law.harvard.edu/cybersecurity/Economics_of_Information_Security Economics of Information Security ]||Book ||4.2 Economics of Cybersecurity,<br>5.1 Regulation/Liability||Yes | ||
Line 49: | Line 48: | ||
| Camp, L. Jean ||1909-06-27||[http://cyber.law.harvard.edu/cybersecurity/Pricing_Security Pricing Security ]||Book Chapter ||4.2.1 Risk Management and Investment,<br>4.2.2 Incentives||Yes | | Camp, L. Jean ||1909-06-27||[http://cyber.law.harvard.edu/cybersecurity/Pricing_Security Pricing Security ]||Book Chapter ||4.2.1 Risk Management and Investment,<br>4.2.2 Incentives||Yes | ||
|- | |- | ||
| Center for a New American Security||2012-06-11||[http://www.cnas.org/node/6405 America’s Cyber Future: Security and Prosperity in the Information Age ]||Independent Report||1. Overview,<br>4. Issues,<br>5. Approaches||No | | Center for a New American Security||2012-06-11||[http://www.cnas.org/node/6405 America’s Cyber Future: Security and Prosperity in the Information Age ]||Independent Report||1. [[Overview]],<br>4. Issues,<br>5. Approaches||No | ||
|- | |- | ||
| Center for Strategic and International Studies ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/Securing_Cyberspace_for_the_44th_Presidency Securing Cyberspace for the 44th Presidency ]||Independent Report ||4.7 Public-Private Cooperation,<br>5.1 Regulation/Liability,<br>5.4 International Cooperation||Yes | | Center for Strategic and International Studies ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/Securing_Cyberspace_for_the_44th_Presidency Securing Cyberspace for the 44th Presidency ]||Independent Report ||4.7 Public-Private Cooperation,<br>5.1 Regulation/Liability,<br>5.4 International Cooperation||Yes | ||
Line 55: | Line 54: | ||
| Centre for Secure Information Technologies||2012-09-11||[http://www.csit.qub.ac.uk/media/pdf/Filetoupload,252359,en.pdf World Cybersecurity Technology Research Summit (Belfast 2011) ]||Independent Report||||No | | Centre for Secure Information Technologies||2012-09-11||[http://www.csit.qub.ac.uk/media/pdf/Filetoupload,252359,en.pdf World Cybersecurity Technology Research Summit (Belfast 2011) ]||Independent Report||||No | ||
|- | |- | ||
| Clarke, Richard A. ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/Cyber_War Cyber War ]||Book ||3. | | Clarke, Richard A. ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/Cyber_War Cyber War ]||Book ||3. [[The Threat and Skeptics]],<br>3.2.1 States,<br>4.12 Cyberwar||Yes | ||
|- | |- | ||
| Clinton, Larry ||Undated ||[http://cyber.law.harvard.edu/cybersecurity/Cyber-Insurance_Metrics_and_Impact_on_Cyber-Security Cyber-Insurance Metrics and Impact on Cyber-Security ]||Online Paper ||4.2.3 Insurance,<br>5.2 Private Efforts/Organizations||Yes | | Clinton, Larry ||Undated ||[http://cyber.law.harvard.edu/cybersecurity/Cyber-Insurance_Metrics_and_Impact_on_Cyber-Security Cyber-Insurance Metrics and Impact on Cyber-Security ]||Online Paper ||4.2.3 Insurance,<br>5.2 Private Efforts/Organizations||Yes | ||
Line 67: | Line 66: | ||
| Council on Foreign Relations ||2010-07-15||[http://i.cfr.org/content/publications/attachments/Knake%20-Testimony%20071510.pdf Untangling Attribution: Moving to Accountability in Cyberspace [Testimony] ]||Independent Report||3.2 Actors and Incentives,<br>4.8 Attribution,<br>5. Approaches||No | | Council on Foreign Relations ||2010-07-15||[http://i.cfr.org/content/publications/attachments/Knake%20-Testimony%20071510.pdf Untangling Attribution: Moving to Accountability in Cyberspace [Testimony] ]||Independent Report||3.2 Actors and Incentives,<br>4.8 Attribution,<br>5. Approaches||No | ||
|- | |- | ||
| CSIS Commission on Cybersecurity for the 44th Presidency, Center for Strategic and International Studies ||2011-01||[http://csis.org/files/publication/110128_Lewis_CybersecurityTwoYearsLater_Web.pdf Cybersecurity Two Years Later ]||Independent Report||3. Threats and Actors,<br>5. Approaches,<br>5.3 Government Organizations||No | | CSIS Commission on Cybersecurity for the 44th Presidency, Center for Strategic and International Studies ||2011-01||[http://csis.org/files/publication/110128_Lewis_CybersecurityTwoYearsLater_Web.pdf Cybersecurity Two Years Later ]||Independent Report||3. [[Threats and Actors]],<br>5. Approaches,<br>5.3 Government Organizations||No | ||
|- | |- | ||
| Cyber Security Forum Initiative ||2011-05-09||[http://www.unveillance.com/wp-content/uploads/2011/05/Project_Cyber_Dawn_Public.pdf Cyber Dawn: Libya ]||Industry Report||3. Threats and Actors,<br>4. Issues,<br>5. Approaches||No | | Cyber Security Forum Initiative ||2011-05-09||[http://www.unveillance.com/wp-content/uploads/2011/05/Project_Cyber_Dawn_Public.pdf Cyber Dawn: Libya ]||Industry Report||3. [[Threats and Actors]],<br>4. Issues,<br>5. Approaches||No | ||
|- | |- | ||
| Department of Commerce ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/Defense_Industrial_Base_Assessment Defense Industrial Base Assessment ]||Government Report ||3.2.5 Criminals and Criminal Organizations,<br>3.3.1 Public Critical Infrastructure,<br>4.7 Public-Private Cooperation||Yes | | Department of Commerce ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/Defense_Industrial_Base_Assessment Defense Industrial Base Assessment ]||Government Report ||3.2.5 Criminals and Criminal Organizations,<br>3.3.1 Public Critical Infrastructure,<br>4.7 Public-Private Cooperation||Yes | ||
Line 105: | Line 104: | ||
| DHS||2007-06||[http://www.oig.dhs.gov/assets/Mgmt/OIG_07-48_Jun07.pdf Challenges Remain in Securing the Nation’s Cyber Infrastructure]||Government Report||4.6 Information Sharing,<br>4.7 Public-Private Cooperation,<br>5.3 Government Organizations||No | | DHS||2007-06||[http://www.oig.dhs.gov/assets/Mgmt/OIG_07-48_Jun07.pdf Challenges Remain in Securing the Nation’s Cyber Infrastructure]||Government Report||4.6 Information Sharing,<br>4.7 Public-Private Cooperation,<br>5.3 Government Organizations||No | ||
|- | |- | ||
| DHS||2009-11||[http://www.cyber.st.dhs.gov/docs/DHS-Cybersecurity-Roadmap.pdf A Roadmap for Cybersecurity Research]||Government Report||1. Overview,<br>4.2.1 Risk management and Investment||No | | DHS||2009-11||[http://www.cyber.st.dhs.gov/docs/DHS-Cybersecurity-Roadmap.pdf A Roadmap for Cybersecurity Research]||Government Report||1. [[Overview]],<br>4.2.1 Risk management and Investment||No | ||
|- | |- | ||
| DHS||2010-08||[http://www.dhs.gov/xoig/assets/mgmtrpts/OIG_10-111_Aug10.pdf DHS Needs to Improve the Security Posture of Its Cybersecurity Program Systems]||Government Report||3.3.1.1 Government Networks (.gov),<br>5.3 Government Organizations||No | | DHS||2010-08||[http://www.dhs.gov/xoig/assets/mgmtrpts/OIG_10-111_Aug10.pdf DHS Needs to Improve the Security Posture of Its Cybersecurity Program Systems]||Government Report||3.3.1.1 Government Networks (.gov),<br>5.3 Government Organizations||No | ||
|- | |- | ||
| DHS||2010-09||[http://www.federalnewsradio.com/pdfs/NCIRP_Interim_Version_September_2010.pdf National Cyber Incident Response Plan]||Government Report||3. Threats and Actors,<br>5.3 Government Organizations||No | | DHS||2010-09||[http://www.federalnewsradio.com/pdfs/NCIRP_Interim_Version_September_2010.pdf National Cyber Incident Response Plan]||Government Report||3. [[Threats and Actors]],<br>5.3 Government Organizations||No | ||
|- | |- | ||
| DHS||2011-11||[http://www.dhs.gov/xlibrary/assets/nppd/blueprint-for-a-secure-cyber-future.pdf Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise]||Government Report||3.3 Security Targets,<br>5.3 Government Organizations||No | | DHS||2011-11||[http://www.dhs.gov/xlibrary/assets/nppd/blueprint-for-a-secure-cyber-future.pdf Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise]||Government Report||3.3 Security Targets,<br>5.3 Government Organizations||No | ||
Line 135: | Line 134: | ||
| Epstein, Richard A. ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/Cybersecurity_in_the_Payment_Card_Industry Cybersecurity in the Payment Card Industry ]||Law Review ||3.2.5 Criminals and Criminal Organizations,<br>4.11 Cybercrime,<br>5.1 Regulation/Liability||Yes | | Epstein, Richard A. ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/Cybersecurity_in_the_Payment_Card_Industry Cybersecurity in the Payment Card Industry ]||Law Review ||3.2.5 Criminals and Criminal Organizations,<br>4.11 Cybercrime,<br>5.1 Regulation/Liability||Yes | ||
|- | |- | ||
| European Network and Information Security Agency ||2010-10-07||[http://www.enisa.europa.eu/media/press-releases/stuxnet-analysis Stuxnet Analysis ]||Non-US Government Report||3. Threats and Actors,<br>5.7 Technology||No | | European Network and Information Security Agency ||2010-10-07||[http://www.enisa.europa.eu/media/press-releases/stuxnet-analysis Stuxnet Analysis ]||Non-US Government Report||3. [[Threats and Actors]],<br>5.7 Technology||No | ||
|- | |- | ||
| European Network and Information Security Agency (ENISA) ||2011-04-11||[http://www.enisa.europa.eu/act/res/other-areas/inter-x/report/interx-report Resilience of the Internet Interconnection Ecosystem, at: ]||Non-US Government Report||3. Threats and Actors,<br>4. Issues,<br>5. Approaches||No | | European Network and Information Security Agency (ENISA) ||2011-04-11||[http://www.enisa.europa.eu/act/res/other-areas/inter-x/report/interx-report Resilience of the Internet Interconnection Ecosystem, at: ]||Non-US Government Report||3. [[Threats and Actors]],<br>4. Issues,<br>5. Approaches||No | ||
|- | |- | ||
| Federal CIO Council ||2012-01-04||[http://www.gsa.gov/portal/category/102371 Federal Risk and Authorization Management Program (FedRAMP) ]||Government Report ||3.3.3.3 Cloud Computing,<br>5.3 Government Organizations||No | | Federal CIO Council ||2012-01-04||[http://www.gsa.gov/portal/category/102371 Federal Risk and Authorization Management Program (FedRAMP) ]||Government Report ||3.3.3.3 Cloud Computing,<br>5.3 Government Organizations||No | ||
Line 225: | Line 224: | ||
| General Accountability Office (GAO) ||2011-01-12||[http://www.gao.gov/products/GAO-11-117 Electricity Grid Modernization: Progress Being Made on Cybersecurity Guidelines, but Key Challenges Remain to be Addressed ]||Government Report||3.3.2.1 Electricity, Oil and Natural Gas,<br>5.1 Regulation/Liability,<br>5.3 Government Organizations||No | | General Accountability Office (GAO) ||2011-01-12||[http://www.gao.gov/products/GAO-11-117 Electricity Grid Modernization: Progress Being Made on Cybersecurity Guidelines, but Key Challenges Remain to be Addressed ]||Government Report||3.3.2.1 Electricity, Oil and Natural Gas,<br>5.1 Regulation/Liability,<br>5.3 Government Organizations||No | ||
|- | |- | ||
| General Accountability Office (GAO) ||2011-03-16||[http://www.gao.gov/products/GAO-11-463T Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure and Federal Information Systems ]||Government Report||3. Threats and Actors,<br>3.3.1 Public Critical Infrastructure,<br>5.3 Government Organizations||No | | General Accountability Office (GAO) ||2011-03-16||[http://www.gao.gov/products/GAO-11-463T Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure and Federal Information Systems ]||Government Report||3. [[Threats and Actors]],<br>3.3.1 Public Critical Infrastructure,<br>5.3 Government Organizations||No | ||
|- | |- | ||
| General Accountability Office (GAO) ||2011-07-29||[http://www.gao.gov/products/GAO-11-695R Defense Department Cyber Efforts: Definitions, Focal Point, and Methodology Needed for DOD to Develop Full-Spectrum Cyberspace Budget Estimates ]||Government Report ||4.2 Economics of Cybersecurity,<br>5.3 Government Organizations||No | | General Accountability Office (GAO) ||2011-07-29||[http://www.gao.gov/products/GAO-11-695R Defense Department Cyber Efforts: Definitions, Focal Point, and Methodology Needed for DOD to Develop Full-Spectrum Cyberspace Budget Estimates ]||Government Report ||4.2 Economics of Cybersecurity,<br>5.3 Government Organizations||No | ||
Line 249: | Line 248: | ||
| Institute for Information Infrastructure Protection ||1909-06-26||[http://cyber.law.harvard.edu/cybersecurity/Cyber_Security_Research_and_Development_Agenda Cyber Security Research and Development Agenda ]||Independent Report ||4.1 Metrics,<br>4.2.1 Risk Management and Investment,<br>5.1 Regulation/Liability||Yes | | Institute for Information Infrastructure Protection ||1909-06-26||[http://cyber.law.harvard.edu/cybersecurity/Cyber_Security_Research_and_Development_Agenda Cyber Security Research and Development Agenda ]||Independent Report ||4.1 Metrics,<br>4.2.1 Risk Management and Investment,<br>5.1 Regulation/Liability||Yes | ||
|- | |- | ||
| Institute for Science and International Security ||2010-12-22||[http://isis-online.org/isis-reports/detail/did-stuxnet-take-out-1000-centrifuges-at-the-natanz-enrichment-plant/ Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant? Preliminary Assessment ]||Independent Report||3. Threats and Actors,<br>3.3 Security Targets,<br>5.7 Technology||No | | Institute for Science and International Security ||2010-12-22||[http://isis-online.org/isis-reports/detail/did-stuxnet-take-out-1000-centrifuges-at-the-natanz-enrichment-plant/ Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant? Preliminary Assessment ]||Independent Report||3. [[Threats and Actors]],<br>3.3 Security Targets,<br>5.7 Technology||No | ||
|- | |- | ||
| International Instrument Users Association (WIB) ||2010-11-10||[http://www.isssource.com/wib/ WIB Security Standard Released ]||Industry Report||3.3 Security Targets,<br>5.4 International Cooperation||No | | International Instrument Users Association (WIB) ||2010-11-10||[http://www.isssource.com/wib/ WIB Security Standard Released ]||Industry Report||3.3 Security Targets,<br>5.4 International Cooperation||No | ||
Line 255: | Line 254: | ||
| International Telecommunications Union ||2012-02-10||[http://www.itu.int/ITU-D/cyb/cybersecurity/docs/itu-toolkit-cybercrime-legislation.pdf ITU Toolkit for Cybercrime Legislation ]||ndependent Report||||No | | International Telecommunications Union ||2012-02-10||[http://www.itu.int/ITU-D/cyb/cybersecurity/docs/itu-toolkit-cybercrime-legislation.pdf ITU Toolkit for Cybercrime Legislation ]||ndependent Report||||No | ||
|- | |- | ||
| James Clapper, Director of National Intelligence ||2011-02-10||[http://www.dni.gov/testimonies/20110210_testimony_clapper.pdf Worldwide Threat Assessment of the U.S. Intelligence Community (Testimony) ]||Government Report||3. | | James Clapper, Director of National Intelligence ||2011-02-10||[http://www.dni.gov/testimonies/20110210_testimony_clapper.pdf Worldwide Threat Assessment of the U.S. Intelligence Community (Testimony) ]||Government Report||3. [[The Threat and Skeptics]],<br>3.2 Actors and Incentives||No | ||
|- | |- | ||
| Johnson, Eric M. ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/Managing_Information_Risk_and_the_Economics_of_Security Managing Information Risk and the Economics of Security ]||Book ||4.2 Economics of Cybersecurity,<br>4.2.1 Risk Management and Investment,<br>5.1 Regulation/Liability||Yes | | Johnson, Eric M. ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/Managing_Information_Risk_and_the_Economics_of_Security Managing Information Risk and the Economics of Security ]||Book ||4.2 Economics of Cybersecurity,<br>4.2.1 Risk Management and Investment,<br>5.1 Regulation/Liability||Yes | ||
Line 271: | Line 270: | ||
| Korns, Stephen W. ||1909-07-02||[http://cyber.law.harvard.edu/cybersecurity/Cyber_Operations Cyber Operations ]||Journal Article ||4.8 Attribution,<br>4.12 Cyberwar,<br>5.6 Deterrence||Yes | | Korns, Stephen W. ||1909-07-02||[http://cyber.law.harvard.edu/cybersecurity/Cyber_Operations Cyber Operations ]||Journal Article ||4.8 Attribution,<br>4.12 Cyberwar,<br>5.6 Deterrence||Yes | ||
|- | |- | ||
| Kramer, Franklin D., et. al ||1909-07-02||[http://cyber.law.harvard.edu/cybersecurity/Cyberpower_and_National_Security Cyberpower and National Security ]||Book ||1. Overview||Yes | | Kramer, Franklin D., et. al ||1909-07-02||[http://cyber.law.harvard.edu/cybersecurity/Cyberpower_and_National_Security Cyberpower and National Security ]||Book ||1. [[Overview]]||Yes | ||
|- | |- | ||
| Kundra, Vivek||2010-12-09||[http://www.cio.gov/documents/25-point-implementation-plan-to-reform-federal%20it.pdf 25 Point Implementation Plan to Reform Federal Information Technology Management]||Government Report||3.3.1.1 Government Networks (.gov),<br>3.3.3.3 Cloud Computing,<br>5.3 Government Organizations||No | | Kundra, Vivek||2010-12-09||[http://www.cio.gov/documents/25-point-implementation-plan-to-reform-federal%20it.pdf 25 Point Implementation Plan to Reform Federal Information Technology Management]||Government Report||3.3.1.1 Government Networks (.gov),<br>3.3.3.3 Cloud Computing,<br>5.3 Government Organizations||No | ||
Line 285: | Line 284: | ||
| McAfee ||2011-08-02||[http://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf Revealed: Operation Shady RAT: an Investigation Of Targeted Intrusions Into 70+ Global Companies, Governments, and Non-Profit Organizations During the Last 5 Years ]||Industry Report||3.2.1 States,<br>3.3 Security Targets,<br>4.13 Espionage||No | | McAfee ||2011-08-02||[http://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf Revealed: Operation Shady RAT: an Investigation Of Targeted Intrusions Into 70+ Global Companies, Governments, and Non-Profit Organizations During the Last 5 Years ]||Industry Report||3.2.1 States,<br>3.3 Security Targets,<br>4.13 Espionage||No | ||
|- | |- | ||
| McAfee ||2012-02-01||[http://www.mcafee.com/us/resources/reports/rp-sda-cyber-security.pdf?cid=WBB048 Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World ]||Industry Report||3. Threats and Actors,<br>4. Issues,<br>5. Approaches||No | | McAfee ||2012-02-01||[http://www.mcafee.com/us/resources/reports/rp-sda-cyber-security.pdf?cid=WBB048 Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World ]||Industry Report||3. [[Threats and Actors]],<br>4. Issues,<br>5. Approaches||No | ||
|- | |- | ||
| McAfee and Center for Strategic and International Studies (CSIS) ||2011-04-21||[http://www.mcafee.com/us/resources/reports/rp-critical-infrastructure-protection.pdf In the Dark: Crucial Industries Confront Cyberattacks ]||Industry Report||3. Threats and Actors,<br>3.3.2 Private Critical Infrastructure,<br> 4.7 Public-Private Cooperation||No | | McAfee and Center for Strategic and International Studies (CSIS) ||2011-04-21||[http://www.mcafee.com/us/resources/reports/rp-critical-infrastructure-protection.pdf In the Dark: Crucial Industries Confront Cyberattacks ]||Industry Report||3. [[Threats and Actors]],<br>3.3.2 Private Critical Infrastructure,<br> 4.7 Public-Private Cooperation||No | ||
|- | |- | ||
| McAfee and the Security Defense Agenda||2012-02-12||[http://www.mcafee.com/us/resources/reports/rp-sda-cyber-security.pdf Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World]||Industry Report||1. Overview,<br>4. Issues,<br>5. Approaches||No | | McAfee and the Security Defense Agenda||2012-02-12||[http://www.mcafee.com/us/resources/reports/rp-sda-cyber-security.pdf Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World]||Industry Report||1. [[Overview]],<br>4. Issues,<br>5. Approaches||No | ||
|- | |- | ||
| McAfee, Inc. ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/McAfee_Threats_Report McAfee Threats Report ]||Industry Report ||3.2.3 Hacktivists,<br>3.2.5 Criminals and Criminal Organizations,<br>4.11 Cybercrime||Yes | | McAfee, Inc. ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/McAfee_Threats_Report McAfee Threats Report ]||Industry Report ||3.2.3 Hacktivists,<br>3.2.5 Criminals and Criminal Organizations,<br>4.11 Cybercrime||Yes | ||
Line 295: | Line 294: | ||
| Microsoft||2012-11-10||[http://cdn.globalfoundationservices.com/documents/InformationSecurityMangSysforMSCloudInfrastructure.pdf Information Security Management System for Microsoft Cloud Infrastructure ]||Industry Report||3.3.3.3 Cloud Computing,<br>5.2 Private Efforts/Organizations||No | | Microsoft||2012-11-10||[http://cdn.globalfoundationservices.com/documents/InformationSecurityMangSysforMSCloudInfrastructure.pdf Information Security Management System for Microsoft Cloud Infrastructure ]||Industry Report||3.3.3.3 Cloud Computing,<br>5.2 Private Efforts/Organizations||No | ||
|- | |- | ||
| Mitre Corp (JASON Program Office) ||2012-11-10||[http://www.fas.org/irp/agency/dod/jason/cyber.pdf Science of Cyber-Security ]||Independent Report||1. Overview,<br>4. Issues||No | | Mitre Corp (JASON Program Office) ||2012-11-10||[http://www.fas.org/irp/agency/dod/jason/cyber.pdf Science of Cyber-Security ]||Independent Report||1. [[Overview]],<br>4. Issues||No | ||
|- | |- | ||
| Moore, Tyler ||1909-06-30||[http://cyber.law.harvard.edu/cybersecurity/Examining_the_Impact_of_Website_Take-down_on_Phishing Examining the Impact of Website Take-down on Phishing ]||Conf. Paper ||4.2 Economics of Cybersecurity,<br>4.11 Cybercrime,<br>5.7 Technology||Yes | | Moore, Tyler ||1909-06-30||[http://cyber.law.harvard.edu/cybersecurity/Examining_the_Impact_of_Website_Take-down_on_Phishing Examining the Impact of Website Take-down on Phishing ]||Conf. Paper ||4.2 Economics of Cybersecurity,<br>4.11 Cybercrime,<br>5.7 Technology||Yes | ||
Line 315: | Line 314: | ||
| National Infrastructure Advisory Council ||1909-06-27||[http://cyber.law.harvard.edu/cybersecurity/Hardening_The_Internet Hardening The Internet ]||Government Report ||3.3 Security Targets,<br>4.7 Public-Private Cooperation,<br>5.3 Government Organizations||Yes | | National Infrastructure Advisory Council ||1909-06-27||[http://cyber.law.harvard.edu/cybersecurity/Hardening_The_Internet Hardening The Internet ]||Government Report ||3.3 Security Targets,<br>4.7 Public-Private Cooperation,<br>5.3 Government Organizations||Yes | ||
|- | |- | ||
| National Initiative for Cybersecurity Education||2011-08-11||[http://csrc.nist.gov/nice/documents/nicestratplan/Draft_NICE-Strategic-Plan_Aug2011.pdf National Initiative for Cybersecurity Education Strategic Plan: Building a Digital Nation]||Government Report||1. Overview,<br>5.3 Government Organizations||No | | National Initiative for Cybersecurity Education||2011-08-11||[http://csrc.nist.gov/nice/documents/nicestratplan/Draft_NICE-Strategic-Plan_Aug2011.pdf National Initiative for Cybersecurity Education Strategic Plan: Building a Digital Nation]||Government Report||1. [[Overview]],<br>5.3 Government Organizations||No | ||
|- | |- | ||
| National Initiative for Cybersecurity Education (NICE) ||2011-11-21||[http://csrc.nist.gov/nice/framework/documents/NICE-Cybersecurity-Workforce-Framework-printable.pdf NICE Cybersecurity Workforce Framework ]||Government Report||4.4 Usability/Human Factors,<br>5.3 Government Organizations||No | | National Initiative for Cybersecurity Education (NICE) ||2011-11-21||[http://csrc.nist.gov/nice/framework/documents/NICE-Cybersecurity-Workforce-Framework-printable.pdf NICE Cybersecurity Workforce Framework ]||Government Report||4.4 Usability/Human Factors,<br>5.3 Government Organizations||No | ||
Line 325: | Line 324: | ||
| National Research Council ||1909-06-22||[http://cyber.law.harvard.edu/cybersecurity/Trust_in_Cyberspace Trust in Cyberspace ]||Independent Report ||3.3.3.2 Public Data Networks,<br>4.2.2 Incentives,<br>4.7 Public-Private Cooperation||Yes | | National Research Council ||1909-06-22||[http://cyber.law.harvard.edu/cybersecurity/Trust_in_Cyberspace Trust in Cyberspace ]||Independent Report ||3.3.3.2 Public Data Networks,<br>4.2.2 Incentives,<br>4.7 Public-Private Cooperation||Yes | ||
|- | |- | ||
| National Research Council ||1909-06-30||[http://cyber.law.harvard.edu/cybersecurity/Toward_a_Safer_and_More_Secure_Cyberspace Toward a Safer and More Secure Cyberspace ]||Independent Report ||1. Overview,<br>4.8 Attribution,<br>5.6 Deterrence||Yes | | National Research Council ||1909-06-30||[http://cyber.law.harvard.edu/cybersecurity/Toward_a_Safer_and_More_Secure_Cyberspace Toward a Safer and More Secure Cyberspace ]||Independent Report ||1. [[Overview]],<br>4.8 Attribution,<br>5.6 Deterrence||Yes | ||
|- | |- | ||
| National Research Council ||2010-09-21||[http://www.nap.edu/catalog.php?record_id=12998 Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop ]||Independent Report||4.2 Economics of Cybersecurity,<br>4.4 Usability/Human Factors,<br>4.10 Privacy||No | | National Research Council ||2010-09-21||[http://www.nap.edu/catalog.php?record_id=12998 Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop ]||Independent Report||4.2 Economics of Cybersecurity,<br>4.4 Usability/Human Factors,<br>4.10 Privacy||No | ||
|- | |- | ||
| National Research Council ||2010-10-05||[http://www.nap.edu/catalog.php?record_id=12997#description Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy ]||Independent Report||3. Threats and Actors,<br>4. Issues,<br>5. Approaches||No | | National Research Council ||2010-10-05||[http://www.nap.edu/catalog.php?record_id=12997#description Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy ]||Independent Report||3. [[Threats and Actors]],<br>4. Issues,<br>5. Approaches||No | ||
|- | |- | ||
| National Research Council, Committee for Advancing Software-Intensive Systems Producibility ||2010-10-20||[http://www.nap.edu/catalog.php?record_id=12979 Critical Code: Software Producibility for Defense ]||Government Report ||3.3.1.2 Military Networks (.mil),<br>5.3 Government Organizations,<br>5.7 Technology||No | | National Research Council, Committee for Advancing Software-Intensive Systems Producibility ||2010-10-20||[http://www.nap.edu/catalog.php?record_id=12979 Critical Code: Software Producibility for Defense ]||Government Report ||3.3.1.2 Military Networks (.mil),<br>5.3 Government Organizations,<br>5.7 Technology||No | ||
Line 357: | Line 356: | ||
| Nye, Joseph ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/Cyber_Power Cyber Power ]||Book Chapter ||4.12 Cyberwar,<br>4.13 Espionage,<br>5.5 International Law (including Laws of War)||Yes | | Nye, Joseph ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/Cyber_Power Cyber Power ]||Book Chapter ||4.12 Cyberwar,<br>4.13 Espionage,<br>5.5 International Law (including Laws of War)||Yes | ||
|- | |- | ||
| Office of the National Counterintelligence Executive ||2011-11-03||[http://www.ncix.gov/publications/reports/fecie_all/Foreign_Economic_Collection_2011.pdf Foreign Spies Stealing US Economic Secrets in Cyberspace ]||Government Report||3. Threats and Actors,<br>3.2 Actors and Incentives,<br>4.13 Espionage||No | | Office of the National Counterintelligence Executive ||2011-11-03||[http://www.ncix.gov/publications/reports/fecie_all/Foreign_Economic_Collection_2011.pdf Foreign Spies Stealing US Economic Secrets in Cyberspace ]||Government Report||3. [[Threats and Actors]],<br>3.2 Actors and Incentives,<br>4.13 Espionage||No | ||
|- | |- | ||
| Organisation for Economic Co-operation and Development (OECD) ||2010-11-12||[http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.165.2211&rep=rep1&type=pdf The Role of Internet Service Providers in Botnet Mitigation: an Empirical Analysis Bases on Spam Data ]||Independent Report||3. Threats and Actors,<br>5.7 Technology||No | | Organisation for Economic Co-operation and Development (OECD) ||2010-11-12||[http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.165.2211&rep=rep1&type=pdf The Role of Internet Service Providers in Botnet Mitigation: an Empirical Analysis Bases on Spam Data ]||Independent Report||3. [[Threats and Actors]],<br>5.7 Technology||No | ||
|- | |- | ||
| Organization for Economic Co-operation and Development (OECD) ||2012-01-10||[http://www.oecd-ilibrary.org/docserver/download/fulltext/5k9h2q8v9bln.pdf?expires=1330527950&id=id&accname=guest&checksum=F4470043AC638BE19D5131C3D5CE5EA4 ICT Applications for the Smart Grid: Opportunities and Policy Implications ]||Government Report ||||No | | Organization for Economic Co-operation and Development (OECD) ||2012-01-10||[http://www.oecd-ilibrary.org/docserver/download/fulltext/5k9h2q8v9bln.pdf?expires=1330527950&id=id&accname=guest&checksum=F4470043AC638BE19D5131C3D5CE5EA4 ICT Applications for the Smart Grid: Opportunities and Policy Implications ]||Government Report ||||No | ||
Line 379: | Line 378: | ||
| Quadrennial Defense Review ||2010-07-30||[http://www.usip.org/quadrennial-defense-review-independent-panel-/view-the-report The QDR in Perspective: Meeting AmericaÅfs National Security Needs In the 21st Century (QDR Final Report) ]||Government Report ||3.3.1.2 Military Networks (.mil),<br>5.3 Government Organizations||No | | Quadrennial Defense Review ||2010-07-30||[http://www.usip.org/quadrennial-defense-review-independent-panel-/view-the-report The QDR in Perspective: Meeting AmericaÅfs National Security Needs In the 21st Century (QDR Final Report) ]||Government Report ||3.3.1.2 Military Networks (.mil),<br>5.3 Government Organizations||No | ||
|- | |- | ||
| RAND||2011-12-21||[http://www.rand.org/content/dam/rand/pubs/occasional_papers/2011/RAND_OP342.pdf A Cyberworm that Knows No Boundaries ]||Independent Report||3. Threats and Actors,<br>5.3 Government Organizations,<br>5.7 Technology||No | | RAND||2011-12-21||[http://www.rand.org/content/dam/rand/pubs/occasional_papers/2011/RAND_OP342.pdf A Cyberworm that Knows No Boundaries ]||Independent Report||3. [[Threats and Actors]],<br>5.3 Government Organizations,<br>5.7 Technology||No | ||
|- | |- | ||
| Romanosky et al. ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/Do_Data_Breach_Disclosure_Laws_Reduce_Identity_Theft Do Data Breach Disclosure Laws Reduce Identity Theft ]||Conf. Paper ||4.2.2 Incentives,<br>4.6 Information Sharing/Disclosure,<br>5.1 Regulation/Liability||Yes | | Romanosky et al. ||1909-07-01||[http://cyber.law.harvard.edu/cybersecurity/Do_Data_Breach_Disclosure_Laws_Reduce_Identity_Theft Do Data Breach Disclosure Laws Reduce Identity Theft ]||Conf. Paper ||4.2.2 Incentives,<br>4.6 Information Sharing/Disclosure,<br>5.1 Regulation/Liability||Yes | ||
|- | |- | ||
| Rotenberg et. al. ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/The_Cyber_War_Threat_Has_Been_Grossly_Exaggerated The Cyber War Threat Has Been Grossly Exaggerated ]||Debate ||3. | | Rotenberg et. al. ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/The_Cyber_War_Threat_Has_Been_Grossly_Exaggerated The Cyber War Threat Has Been Grossly Exaggerated ]||Debate ||3. [[The Threat and Skeptics]],<br>3.2.1 States,<br>4.12 Cyberwar||Yes | ||
|- | |- | ||
| Schmitt Michael N ||2002||[http://www.icrc.org/eng/assets/files/other/365_400_schmitt.pdf Wired warfare: Computer network attack and jus in bello]||Journal Article||3.2.1 States,<br>4.12 Cyberwar,<br>5.5 International Law (including Laws of War)||Yes | | Schmitt Michael N ||2002||[http://www.icrc.org/eng/assets/files/other/365_400_schmitt.pdf Wired warfare: Computer network attack and jus in bello]||Journal Article||3.2.1 States,<br>4.12 Cyberwar,<br>5.5 International Law (including Laws of War)||Yes | ||
Line 411: | Line 410: | ||
| Swire, Peter P. ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/A_Theory_of_Disclosure_for_Security_and_Competitive_Reasons A Theory of Disclosure for Security and Competitive Reasons ]||Law Review ||4.2 Economics of Cybersecurity,<br>4.6 Information Sharing/Disclosure,<br>5.1 Regulation/Liability||Yes | | Swire, Peter P. ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/A_Theory_of_Disclosure_for_Security_and_Competitive_Reasons A Theory of Disclosure for Security and Competitive Reasons ]||Law Review ||4.2 Economics of Cybersecurity,<br>4.6 Information Sharing/Disclosure,<br>5.1 Regulation/Liability||Yes | ||
|- | |- | ||
| Symantec||2011-10-24||[http://www.symantec.com/connect/w32_duqu_precursor_next_stuxnet W32.Duqu: The Precursor to the Next Stuxnet ]||Industry Report||3. Threats and Actors,<br>5.7 Technology||No | | Symantec||2011-10-24||[http://www.symantec.com/connect/w32_duqu_precursor_next_stuxnet W32.Duqu: The Precursor to the Next Stuxnet ]||Industry Report||3. [[Threats and Actors]],<br>5.7 Technology||No | ||
|- | |- | ||
| Symantec Corporation ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/Symantec_Global_Internet_Security_Threat_Report Symantec Global Internet Security Threat Report ]||Industry Report ||3.3.2.2 Financial Institutions and Networks,<br>4.2 Economics of Cybersecurity,<br>4.11 Cybercrime||Yes | | Symantec Corporation ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/Symantec_Global_Internet_Security_Threat_Report Symantec Global Internet Security Threat Report ]||Industry Report ||3.3.2.2 Financial Institutions and Networks,<br>4.2 Economics of Cybersecurity,<br>4.11 Cybercrime||Yes | ||
Line 421: | Line 420: | ||
| Thomas, Rob ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/The_Underground_Economy The Underground Economy ]||Journal Article ||3.2.5 Criminals and Criminl Organizations,<br>3.3.2.2 Financial Institutions and Networks,<br>4.11 Cybercrime||Yes | | Thomas, Rob ||1909-06-29||[http://cyber.law.harvard.edu/cybersecurity/The_Underground_Economy The Underground Economy ]||Journal Article ||3.2.5 Criminals and Criminl Organizations,<br>3.3.2.2 Financial Institutions and Networks,<br>4.11 Cybercrime||Yes | ||
|- | |- | ||
| Threat Level Blog (Wired) ||2010-12-27||[http://www.wired.com/threatlevel/2010/12/a-four-day-dive-into-stuxnets-heart/ A Four-Day Dive Into Stuxnet’s Heart ]||Independent Report||3. Threats and Actors,<br>5.7 Technology||No | | Threat Level Blog (Wired) ||2010-12-27||[http://www.wired.com/threatlevel/2010/12/a-four-day-dive-into-stuxnets-heart/ A Four-Day Dive Into Stuxnet’s Heart ]||Independent Report||3. [[Threats and Actors]],<br>5.7 Technology||No | ||
|- | |- | ||
| Todd, Graham H. ||1909-07-02||[http://cyber.law.harvard.edu/cybersecurity/Armed_Attack_in_Cyberspace Armed Attack in Cyberspace ]||Law Review ||3.2.1 States,<br>4.8 Attribution,<br>5.5 Internaitonal Law (including Laws of War)||Yes | | Todd, Graham H. ||1909-07-02||[http://cyber.law.harvard.edu/cybersecurity/Armed_Attack_in_Cyberspace Armed Attack in Cyberspace ]||Law Review ||3.2.1 States,<br>4.8 Attribution,<br>5.5 Internaitonal Law (including Laws of War)||Yes | ||
Line 439: | Line 438: | ||
| U.S. House Committee on Appropriations (closed/classified) (Subcommittee on Energy and Power)||2011-03-31||[http://www.dhs.gov/ynews/testimony/testimony_1301595025263.shtm Budget Hearing - National Protection and Programs Directorate, Cybersecurity and Infrastructure Protection Programs ]||U.S. Government Hearing||4.2 Economics of Cybersecurity,<br>5.3 Government Organizations||No | | U.S. House Committee on Appropriations (closed/classified) (Subcommittee on Energy and Power)||2011-03-31||[http://www.dhs.gov/ynews/testimony/testimony_1301595025263.shtm Budget Hearing - National Protection and Programs Directorate, Cybersecurity and Infrastructure Protection Programs ]||U.S. Government Hearing||4.2 Economics of Cybersecurity,<br>5.3 Government Organizations||No | ||
|- | |- | ||
| U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities)||2011-02-11||[http://armedservices.house.gov/index.cfm/hearings-display?ContentRecord_id=90d8a16a-23b7-4b9c-a732-cb10ab20e579&ContentType_id=14f995b9-dfa5-407a-9d35-56cc7152a7ed&Group_id=64562e79-731a-4ac6-aab0-7bd8d1b7e890&MonthDisplay=2&YearDisplay=2011 What Should the Department of Defense’s Role in Cyber Be?]||U.S. Government Hearing||3. | | U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities)||2011-02-11||[http://armedservices.house.gov/index.cfm/hearings-display?ContentRecord_id=90d8a16a-23b7-4b9c-a732-cb10ab20e579&ContentType_id=14f995b9-dfa5-407a-9d35-56cc7152a7ed&Group_id=64562e79-731a-4ac6-aab0-7bd8d1b7e890&MonthDisplay=2&YearDisplay=2011 What Should the Department of Defense’s Role in Cyber Be?]||U.S. Government Hearing||3. [[The Threat and Skeptics]],<br>4.12 Cyberwar,<br>5.3 Government Organizations||No | ||
|- | |- | ||
| U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities)||2011-03-16||[http://armedservices.house.gov/index.cfm/hearings-display?ContentRecord_id=79ce7b4c-f88b-40bf-9540-efdb3a2d26b2&ContentType_id=14f995b9-dfa5-407a-9d35-56cc7152a7ed&Group_id=64562e79-731a-4ac6-aab0-7bd8d1b7e890&MonthDisplay=3&YearDisplay=2011 2012 Budget Request from U.S. Cyber Command]||U.S. Government Hearing||3.3.1.2 Military Networks (.mil),<br>4.2 Economics of Cybersecurity||No | | U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities)||2011-03-16||[http://armedservices.house.gov/index.cfm/hearings-display?ContentRecord_id=79ce7b4c-f88b-40bf-9540-efdb3a2d26b2&ContentType_id=14f995b9-dfa5-407a-9d35-56cc7152a7ed&Group_id=64562e79-731a-4ac6-aab0-7bd8d1b7e890&MonthDisplay=3&YearDisplay=2011 2012 Budget Request from U.S. Cyber Command]||U.S. Government Hearing||3.3.1.2 Military Networks (.mil),<br>4.2 Economics of Cybersecurity||No | ||
Line 475: | Line 474: | ||
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-02-11||[http://homeland.house.gov/hearing/subcommittee-hearing-%E2%80%9Cpreventing-chemical-terrorism-building-foundation-security-our-nation Preventing Chemical Terrorism: Building a Foundation of Security at Our Nation’s Chemical Facilities]||U.S. Government Hearing||3.3.2 Private Critical Infrastructure,<br>5.1 Regulation/Liability,<br>5.7 Technology||No | | U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-02-11||[http://homeland.house.gov/hearing/subcommittee-hearing-%E2%80%9Cpreventing-chemical-terrorism-building-foundation-security-our-nation Preventing Chemical Terrorism: Building a Foundation of Security at Our Nation’s Chemical Facilities]||U.S. Government Hearing||3.3.2 Private Critical Infrastructure,<br>5.1 Regulation/Liability,<br>5.7 Technology||No | ||
|- | |- | ||
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-03-16||[http://homeland.house.gov/hearing/subcommittee-hearing-examining-cyber-threat-critical-infrastructure-and-american-economy Examining the Cyber Threat to Critical Infrastructure and the American Economy]||U.S. Government Hearing||3. | | U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-03-16||[http://homeland.house.gov/hearing/subcommittee-hearing-examining-cyber-threat-critical-infrastructure-and-american-economy Examining the Cyber Threat to Critical Infrastructure and the American Economy]||U.S. Government Hearing||3. [[The Threat and Skeptics]],<br>3.3 Security Targets,<br>4.2 Economics of Cybersecurity||No | ||
|- | |- | ||
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-04-15||[http://homeland.house.gov/hearing/subcommittee-hearing-%E2%80%9C-dhs-cybersecurity-mission-promoting-innovation-and-securing-critical DHS Cybersecurity Mission: Promoting Innovation and Securing Critical Infrastructure]||U.S. Government Hearing||3.3.2 Private Critical Infrastructure,<br>4.7 Public-Private Cooperation,<br>5.1 Regulation/Liability||No | | U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-04-15||[http://homeland.house.gov/hearing/subcommittee-hearing-%E2%80%9C-dhs-cybersecurity-mission-promoting-innovation-and-securing-critical DHS Cybersecurity Mission: Promoting Innovation and Securing Critical Infrastructure]||U.S. Government Hearing||3.3.2 Private Critical Infrastructure,<br>4.7 Public-Private Cooperation,<br>5.1 Regulation/Liability||No | ||
Line 481: | Line 480: | ||
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-06-24||[http://homeland.house.gov/hearing/subcommittee-hearing-examining-homeland-security-impact-obamaadministrations-cybersecurity Examining the Homeland Security Impact of the Obama Administration’s Cybersecurity Proposal]||U.S. Government Hearing||3.3.1.1 Government Networks (.gov),<br>4.9 Identity Management,<br>5.3 Government Organizations||No | | U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-06-24||[http://homeland.house.gov/hearing/subcommittee-hearing-examining-homeland-security-impact-obamaadministrations-cybersecurity Examining the Homeland Security Impact of the Obama Administration’s Cybersecurity Proposal]||U.S. Government Hearing||3.3.1.1 Government Networks (.gov),<br>4.9 Identity Management,<br>5.3 Government Organizations||No | ||
|- | |- | ||
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-12-06||[http://homeland.house.gov/hearing/subcommittee-hearing-hearing-draft-legislative-proposal-cybersecurity Hearing on Draft Legislative Proposal on Cybersecurity]||U.S. Government Hearing||3. | | U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2011-12-06||[http://homeland.house.gov/hearing/subcommittee-hearing-hearing-draft-legislative-proposal-cybersecurity Hearing on Draft Legislative Proposal on Cybersecurity]||U.S. Government Hearing||3. [[The Threat and Skeptics]],<br>4.7 Public-Private Cooperation,<br>5.1 Regulation/Liability||No | ||
|- | |- | ||
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2012-02-01||[http://homeland.house.gov/markup/subcommittee-markup-hr-3674 Consideration and Markup of H.R. 3674]||U.S. Government Hearing||4.6 Information Sharing,<br>4.7 Public-Private Cooperation,<br>5.1 Regulation/Liability||No | | U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies)||2012-02-01||[http://homeland.house.gov/markup/subcommittee-markup-hr-3674 Consideration and Markup of H.R. 3674]||U.S. Government Hearing||4.6 Information Sharing,<br>4.7 Public-Private Cooperation,<br>5.1 Regulation/Liability||No | ||
Line 489: | Line 488: | ||
| U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies)||2011-05-26||[http://homeland.house.gov/hearing/subcommittee-hearing-%E2%80%9Cunlocking-safety-act%E2%80%99s-potential-promote-technology-and-combat Unlocking the SAFETY Act’s [Support Anti-terrorism by Fostering Effective Technologies - P.L. 107-296] Potential to Promote Technology and Combat Terrorism]||U.S. Government Hearing||4.11 Cybercrime,<br>5.1 Regulation/Liability,<br>5.7 Technology||No | | U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies)||2011-05-26||[http://homeland.house.gov/hearing/subcommittee-hearing-%E2%80%9Cunlocking-safety-act%E2%80%99s-potential-promote-technology-and-combat Unlocking the SAFETY Act’s [Support Anti-terrorism by Fostering Effective Technologies - P.L. 107-296] Potential to Promote Technology and Combat Terrorism]||U.S. Government Hearing||4.11 Cybercrime,<br>5.1 Regulation/Liability,<br>5.7 Technology||No | ||
|- | |- | ||
| U.S. House Committee on Homeland Security (Subcommittee on Oversight, Investigations and Management)||2012-04-24||[http://homeland.house.gov/hearing/subcommittee-hearing-america-under-cyber-attack-why-urgent-action-needed America is Under Cyber Attack: Why Urgent Action is Needed]||U.S. Government Hearing||3. | | U.S. House Committee on Homeland Security (Subcommittee on Oversight, Investigations and Management)||2012-04-24||[http://homeland.house.gov/hearing/subcommittee-hearing-america-under-cyber-attack-why-urgent-action-needed America is Under Cyber Attack: Why Urgent Action is Needed]||U.S. Government Hearing||3. [[The Threat and Skeptics]],<br>3.2 Actors and Incentives||No | ||
|- | |- | ||
| U.S. House Committee on Oversight and Government Reform||2011-07-07||[http://oversight.house.gov/hearing/cybersecurity-assessing-the-nations-ability-to-address-the-growing-cyber-threat/ Cybersecurity: Assessing the Nation’s Ability to Address the Growing Cyber Threat]||U.S. Government Hearing||3.3 Security Targets,<br>4.7 Public-Private Cooperation,<br>5.3 Government Organizations||No | | U.S. House Committee on Oversight and Government Reform||2011-07-07||[http://oversight.house.gov/hearing/cybersecurity-assessing-the-nations-ability-to-address-the-growing-cyber-threat/ Cybersecurity: Assessing the Nation’s Ability to Address the Growing Cyber Threat]||U.S. Government Hearing||3.3 Security Targets,<br>4.7 Public-Private Cooperation,<br>5.3 Government Organizations||No | ||
|- | |- | ||
| U.S. House Committee on Oversight and Government Reform (Subcommittee on National Security, Homeland Defense and Foreign Operations)||2011-05-25||[http://oversight.house.gov/hearing/cybersecurity-assessing-the-immediate-threat-to-the-united-states/ Cybersecurity: Assessing the Immediate Threat to the United States]||U.S. Government Hearing||3. | | U.S. House Committee on Oversight and Government Reform (Subcommittee on National Security, Homeland Defense and Foreign Operations)||2011-05-25||[http://oversight.house.gov/hearing/cybersecurity-assessing-the-immediate-threat-to-the-united-states/ Cybersecurity: Assessing the Immediate Threat to the United States]||U.S. Government Hearing||3. [[The Threat and Skeptics]],<br>3.3.1 Public Critical Infrastructure,<br>4.7 Public-Private Cooperation||No | ||
|- | |- | ||
| U.S. House Committee on Science, Space and Technology||2011-07-21||[http://science.house.gov/markup/full-committee-%E2%80%93-markup Markup on H.R. 2096, Cybersecurity Enhancement Act of 2011]||U.S. Government Hearing||4.2.1 Risk Management and Investment,<br>5.1 Regulation/Liability,<br>5.7 Technology||No | | U.S. House Committee on Science, Space and Technology||2011-07-21||[http://science.house.gov/markup/full-committee-%E2%80%93-markup Markup on H.R. 2096, Cybersecurity Enhancement Act of 2011]||U.S. Government Hearing||4.2.1 Risk Management and Investment,<br>5.1 Regulation/Liability,<br>5.7 Technology||No | ||
Line 511: | Line 510: | ||
| U.S. House Committee on the Judiciary (Subcommittee on Intellectual Property, Competition and the Internet)||2011-05-25||[http://judiciary.house.gov/hearings/hear_05252011.html Cybersecurity: Problems Innovative Solutions to Challenging]||U.S. Government Hearing||4.7 Public-Private Cooperation,<br>4.11 Cybercrime,<br>5.2 Private Efforts/Organizations||No | | U.S. House Committee on the Judiciary (Subcommittee on Intellectual Property, Competition and the Internet)||2011-05-25||[http://judiciary.house.gov/hearings/hear_05252011.html Cybersecurity: Problems Innovative Solutions to Challenging]||U.S. Government Hearing||4.7 Public-Private Cooperation,<br>4.11 Cybercrime,<br>5.2 Private Efforts/Organizations||No | ||
|- | |- | ||
| U.S. House Permenant Select Committee on Intelligence||2011-02-10||[https://intelligence.house.gov/hearing/full-committee-world-wide-threats-hearing World Wide Threats]||U.S. Government Hearing||3. | | U.S. House Permenant Select Committee on Intelligence||2011-02-10||[https://intelligence.house.gov/hearing/full-committee-world-wide-threats-hearing World Wide Threats]||U.S. Government Hearing||3. [[The Threat and Skeptics]],<br>5.1 Regulation/Liability,<br>5.3 Government Organizations||No | ||
|- | |- | ||
| U.S. House Permenant Select Committee on Intelligence||2011-10-04||[https://intelligence.house.gov/hearing/cyber-threats-and-ongoing-efforts-protect-nation Cyber Threats and Ongoing Efforts to Protect the Nation]||U.S. Government Hearing||4.7 Public-Private Cooperation,<br>4.13.2 Industrial Espionage,<br>5.4 International Cooperation||No | | U.S. House Permenant Select Committee on Intelligence||2011-10-04||[https://intelligence.house.gov/hearing/cyber-threats-and-ongoing-efforts-protect-nation Cyber Threats and Ongoing Efforts to Protect the Nation]||U.S. Government Hearing||4.7 Public-Private Cooperation,<br>4.13.2 Industrial Espionage,<br>5.4 International Cooperation||No | ||
Line 541: | Line 540: | ||
| U.S. Senate Committee on Homeland Security and Governmental Affairs||2012-02-16||[http://www.hsgac.senate.gov/hearings/securing-americas-future-the-cybersecurity-act-of-2012 Securing America’s Future: The Cybersecurity Act of 2012]||U.S. Government Hearing||3.3.2 Private Critical Infrastructure,<br>4.6 Information Sharing/Disclosure,<br>5.1 Regulation/Liability||No | | U.S. Senate Committee on Homeland Security and Governmental Affairs||2012-02-16||[http://www.hsgac.senate.gov/hearings/securing-americas-future-the-cybersecurity-act-of-2012 Securing America’s Future: The Cybersecurity Act of 2012]||U.S. Government Hearing||3.3.2 Private Critical Infrastructure,<br>4.6 Information Sharing/Disclosure,<br>5.1 Regulation/Liability||No | ||
|- | |- | ||
| U.S. Senate Committee on Judiciary||2011-03-30||[http://www.judiciary.senate.gov/hearings/hearing.cfm?id=e655f9e2809e5476862f735da1697f72 Oversight of the Federal Bureau of Investigation]||U.S. Government Hearing||3. Threats and Actors,<br>4.6 Information Sharing/Disclosure,<br>5.3 Government Organizations||No | | U.S. Senate Committee on Judiciary||2011-03-30||[http://www.judiciary.senate.gov/hearings/hearing.cfm?id=e655f9e2809e5476862f735da1697f72 Oversight of the Federal Bureau of Investigation]||U.S. Government Hearing||3. [[Threats and Actors]],<br>4.6 Information Sharing/Disclosure,<br>5.3 Government Organizations||No | ||
|- | |- | ||
| U.S. Senate Committee on Judiciary||2011-09-07||[http://www.judiciary.senate.gov/hearings/hearing.cfm?id=3d9031b47812de2592c3baeba629084b Cybercrime: Updating the Computer Fraud and Abuse Act to Protect Cyberspace and Combat Emerging Threats]||U.S. Government Hearing||3.11 Cybercrime,<br>4.13.2 Industrial Espionage,<br>5.1 Regulation/Liability||No | | U.S. Senate Committee on Judiciary||2011-09-07||[http://www.judiciary.senate.gov/hearings/hearing.cfm?id=3d9031b47812de2592c3baeba629084b Cybercrime: Updating the Computer Fraud and Abuse Act to Protect Cyberspace and Combat Emerging Threats]||U.S. Government Hearing||3.11 Cybercrime,<br>4.13.2 Industrial Espionage,<br>5.1 Regulation/Liability||No | ||
Line 549: | Line 548: | ||
| U.S. Senate Committee on Judiciary (Subcommittee on Crime and Terrorism)||2011-04-12||[http://www.judiciary.senate.gov/hearings/hearing.cfm?id=e655f9e2809e5476862f735da16a9959 Cyber Security: Responding to the Threat of Cyber Crime and Terrorism]||U.S. Government Hearing||4.11 Cybercrime,<br>5.1 Regulation/Liability||No | | U.S. Senate Committee on Judiciary (Subcommittee on Crime and Terrorism)||2011-04-12||[http://www.judiciary.senate.gov/hearings/hearing.cfm?id=e655f9e2809e5476862f735da16a9959 Cyber Security: Responding to the Threat of Cyber Crime and Terrorism]||U.S. Government Hearing||4.11 Cybercrime,<br>5.1 Regulation/Liability||No | ||
|- | |- | ||
| U.S. Senate Committee on Judiciary (Subcommittee on Crime and Terrorism)||2011-06-21||[http://www.judiciary.senate.gov/hearings/hearing.cfm?id=e655f9e2809e5476862f735da16e1bbe Cybersecurity: Evaluating the Administration’s Proposals]||U.S. Government Hearing||1. Overview,<br>5.1 Regulation/Liability,<br>5.3 Government Organizations||No | | U.S. Senate Committee on Judiciary (Subcommittee on Crime and Terrorism)||2011-06-21||[http://www.judiciary.senate.gov/hearings/hearing.cfm?id=e655f9e2809e5476862f735da16e1bbe Cybersecurity: Evaluating the Administration’s Proposals]||U.S. Government Hearing||1. [[Overview]],<br>5.1 Regulation/Liability,<br>5.3 Government Organizations||No | ||
|- | |- | ||
| U.S. Senate Committee on Small Business and Entrepreneurship||2011-07-25||[http://www.sbc.senate.gov/public/index.cfm?p=Hearings&ContentRecord_id=6b4d51de-dd67-434b-869f-a717b315e6c2&ContentType_id=14f995b9-dfa5-407a-9d35-56cc7152a7ed&Group_id=43eb5e02-e987-4077-b9a7-1e5a9cf28964&MonthDisplay=7&YearDisplay=2011 Role of Small Business in Strengthening Cybersecurity Efforts in the United States]||U.S. Government Hearing||4.2.2 Incentives,<br>4.7 public-Private Cooperation||No | | U.S. Senate Committee on Small Business and Entrepreneurship||2011-07-25||[http://www.sbc.senate.gov/public/index.cfm?p=Hearings&ContentRecord_id=6b4d51de-dd67-434b-869f-a717b315e6c2&ContentType_id=14f995b9-dfa5-407a-9d35-56cc7152a7ed&Group_id=43eb5e02-e987-4077-b9a7-1e5a9cf28964&MonthDisplay=7&YearDisplay=2011 Role of Small Business in Strengthening Cybersecurity Efforts in the United States]||U.S. Government Hearing||4.2.2 Incentives,<br>4.7 public-Private Cooperation||No | ||
Line 567: | Line 566: | ||
| Watts, Sean ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Combatant Status and Computer Network Attack ]||Law Review ||3.2.1 States,<br>4.12 Cyberwar,<br>5.5 International Law (including Laws of War)||Yes | | Watts, Sean ||1909-07-03||[http://cyber.law.harvard.edu/cybersecurity/Combatant_Status_and_Computer_Network_Attack Combatant Status and Computer Network Attack ]||Law Review ||3.2.1 States,<br>4.12 Cyberwar,<br>5.5 International Law (including Laws of War)||Yes | ||
|- | |- | ||
| White House||2009||[http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure]||Government Report||1. Overview,<br>4.7 Public-Private Cooperation||No | | White House||2009||[http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure]||Government Report||1. [[Overview]],<br>4.7 Public-Private Cooperation||No | ||
|- | |- | ||
| White House||2011-04||[http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy]||Government Report||4.7 Public-Private Cooperation,<br>4.9 Identity Management||No | | White House||2011-04||[http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy]||Government Report||4.7 Public-Private Cooperation,<br>4.9 Identity Management||No | ||
|- | |- | ||
| White House||2011-05||[http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World]||Government Report||1. Overview||No | | White House||2011-05||[http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World]||Government Report||1. [[Overview]]||No | ||
|- | |- | ||
| White House||2012-01||[http://www.whitehouse.gov/sites/default/files/national_strategy_for_global_supply_chain_security.pdf National Strategy for Global Supply Chain Security]||Government Report||4.3 Supply Chain Issues||No | | White House||2012-01||[http://www.whitehouse.gov/sites/default/files/national_strategy_for_global_supply_chain_security.pdf National Strategy for Global Supply Chain Security]||Government Report||4.3 Supply Chain Issues||No |
Revision as of 10:55, 31 July 2012
Filtering for type: All Types
Author/Agency | Date | Title | Type | Category | Synopsis |
---|---|---|---|---|---|
Anderson, Ross | 1909-06-24 | Why Information Security is Hard | Conf. Paper | 4.2.1 Risk Management and Investment, 4.2.2 Incentives, 5.1 Regulation/Liability |
Yes |
Anderson, Ross | 1909-06-29 | The Economics of Information Security | Journal Article | 4.2 Economics of Cybersecurity, 5.1 Regulation/Liability, 5.7 Technology |
Yes |
Anderson, Ross J. | 1909-07-01 | Security Engineering | Book | 3.2 Security Targets, 4.2 Economics of Cyber Security, 5.1 Regulation/Liability |
Yes |
Anderson, Ross, et. al | 1909-07-01 | Security Economics and the Internal Market | Study | 4.2 Economics of Cybersecurity, 4.11 Cybercrime, 5.6 Deterrence |
Yes |
Arora et al. | 1909-06-29 | Does Information Security Attack Frequency Increase With Vulnerability Disclosure | Journal Article | 4.2.1 Risk Management and Investment, 4.6 Information Sharing/Disclosure |
Yes |
Aviram, Amitai | 1909-06-27 | Overcoming Impediments to Information Sharing | Law Review | 4.2.1 Risk Management and Investment, 4.6 Information Sharing/Disclosure, 4.7 Public-Private Cooperation |
Yes |
Barkham, Jason | 1909-06-24 | Information Warfare and International Law on the Use of Force | Law Review | 3.2.1 States, 4.12 Cyberwar, 5.5 International Law (including Laws of War) |
Yes |
Beard, Jack M. | 1909-07-02 | Law and War in the Virtual Era | Law Review | 4.12 Cyberwar, 5.5 International Law (including Laws of War) |
Yes |
Bohme, Rainer | 1909-06-28 | Cyber-Insurance Revisited | Conf. Paper | 4.2.2 Incentives, 4.2.3 Insurance, ,4.2.5 Market Failure |
Yes |
Bohme, Rainer | 1909-06-29 | Models and Measures for Correlation in Cyber-Insurance | Conf. Paper | 4.2.3 Insurance, 5.2 Private Efforts/Organizations |
Yes |
Bohme, Rainer | 1909-07-03 | Modeling Cyber-Insurance | Conf. Paper | 4.2.2 Incentives, 4.2.3 Insurance, ,5.2 Private Efforts/Organizations |
Yes |
Booz Allen Hamilton and the Economist Intelligence Unit | 2012-01-15 | Cyber Power Index | Industry Report | 4. Issues, 4.1 Metrics, 5. Approaches |
No |
Brown, Davis | 1909-06-29 | A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict | Law Review | 3.3.2.1 Military networks (.gov), 4.12 Cyberwar, 5.5 International Law (including Laws of War) |
Yes |
Business Roundtable | 2012-10-11 | Mission Critical: A Public-Private Strategy for Effective Cybersecurity | Independent Report | No | |
Business Software Alliance | 2012-02-02 | Global Cloud Computing Scorecard a Blueprint for Economic Opportunity | Industry Report | 3.3.3.3 Cloud Computing | No |
Business Software Alliance, Center for Democracy & Technology, U.S. Chamber of Commerce, Internet Security Alliance, Tech America | 2011-03-08 | Improving our Nation’s Cybersecurity through the Public-Private Partnership: a White Paper | Industry Report | 4.6 Information Sharing/Disclosure, 4.7 Public-Private Cooperation, 5. Approaches |
No |
Cabinet Office (United Kingdom) | 2012-11-11 | The UK Cyber Security Strategy: Protecting and promoting the UK in a digital world | Non-US Government Report | 3. Threats and Actors, 4.7 Public-Private Cooperation, 5.3 Government Organizations |
No |
Camp, L. Jean | 1909-06-27 | Economics of Information Security | Book | 4.2 Economics of Cybersecurity, 5.1 Regulation/Liability |
Yes |
Camp, L. Jean | 1909-06-27 | Pricing Security | Book Chapter | 4.2.1 Risk Management and Investment, 4.2.2 Incentives |
Yes |
Center for a New American Security | 2012-06-11 | America’s Cyber Future: Security and Prosperity in the Information Age | Independent Report | 1. Overview, 4. Issues, 5. Approaches |
No |
Center for Strategic and International Studies | 1909-07-01 | Securing Cyberspace for the 44th Presidency | Independent Report | 4.7 Public-Private Cooperation, 5.1 Regulation/Liability, 5.4 International Cooperation |
Yes |
Centre for Secure Information Technologies | 2012-09-11 | World Cybersecurity Technology Research Summit (Belfast 2011) | Independent Report | No | |
Clarke, Richard A. | 1909-07-03 | Cyber War | Book | 3. The Threat and Skeptics, 3.2.1 States, 4.12 Cyberwar |
Yes |
Clinton, Larry | Undated | Cyber-Insurance Metrics and Impact on Cyber-Security | Online Paper | 4.2.3 Insurance, 5.2 Private Efforts/Organizations |
Yes |
Cloud Security Alliance | 2012-12-09 | Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 | Independent Report | 3.3.3.3 Cloud Computing, 4. Issues, 5.2 Private Efforts/Organizations |
No |
Computer Economics, Inc. | 1909-06-30 | 2007 Malware Report | Industry Report | 4.2 Economics of Cybersecurity | Yes |
Computing Research Association | 1909-06-26 | Four Grand Challenges in Trustworthy Computing | Independent Report | 4.4 Usability/Human Factors, 4.6 Information Sharing/Disclosure, 4.9 Identity Management |
Yes |
Council on Foreign Relations | 2010-07-15 | Untangling Attribution: Moving to Accountability in Cyberspace [Testimony ] | Independent Report | 3.2 Actors and Incentives, 4.8 Attribution, 5. Approaches |
No |
CSIS Commission on Cybersecurity for the 44th Presidency, Center for Strategic and International Studies | 2011-01 | Cybersecurity Two Years Later | Independent Report | 3. Threats and Actors, 5. Approaches, 5.3 Government Organizations |
No |
Cyber Security Forum Initiative | 2011-05-09 | Cyber Dawn: Libya | Industry Report | 3. Threats and Actors, 4. Issues, 5. Approaches |
No |
Department of Commerce | 1909-07-03 | Defense Industrial Base Assessment | Government Report | 3.2.5 Criminals and Criminal Organizations, 3.3.1 Public Critical Infrastructure, 4.7 Public-Private Cooperation |
Yes |
Department of Commerce | 2011-06-14 | Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace | Government Report | 4.7 Public-Private Cooperation, 4.9 Identity Management, 5.3 Government Organizations |
No |
Department of Commerce, Internet Policy Task Force | 2011-06 | Cybersecurity, Innovation and the Internet Economy | Government Report | 4.2 Economics of Cybersecurity, 4.7 Public-Private Cooperation |
No |
Department of Defense | 1909-06-22 | An Assessment of International Legal Issues in Information Operations | Government Report | 3.2.1 States, 4.12 Cyberwar, 5.5 International Law (including Laws of War) |
Yes |
Department of Defense | 1909-06-28 | Strategy for Homeland Defense and Civil Support | Government Report | 3.2.4 Terrorists, 3.3.1 Public Critical Infrastructure, 5.3 Government Organizations |
Yes |
Department of Defense | 1909-06-30 | Mission Impact of Foreign Influence on DoD Software | Government Report | 3.2.4 Terrorists, 3.3.1 Public Critical Infrastructure, 5.3 Government Organizations |
Yes |
Department of Defense | 2012-04-11 | Cyber Operations Personnel Report (DoD) | Government Report | No | |
Department of Energy | 2012-04 | The Department's Management of the Smart Grid Investment Grant Program | Government Report | 3.3.2.1 Electricity, Oil and Natural Gas, 4.2.1 Risk Management and Investment |
No |
Department of Energy (DOE) Inspector General | 2012-01-01 | The Department’s Management of the Smart Grid Investment Grant Program | Government Report | 3.3.2.1 Electricity, Oil and Natural Gas, 5.3 Government Organizations |
No |
Department of Energy, Idaho National Laboratory | 2010-05-01 | NSTB Assessments Summary Report: Common Industrial Control System Cyber Security Weaknesses | Government Report | 3.3.2 Private Critical Infrastructure, 5.7 Technology |
No |
Department of Energy, Office of Electricity Delivery & Energy Reliability | 1899-12-30 | Cybersecurity for Energy Delivery Systems Program | Government Report | 3.3.2.1 Electricity, Oil and Natural Gas, 4.2.1 Risk Management and Investment, 5.3 Government Organizations |
No |
Department of Homeland Security | 1909-06-26 | The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets | Government Report | 3.3.1 Public Critical Infrastructure, 3.3.2 Private Critical Infrastructure, 5.3 Government Organizations |
Yes |
Department of Homeland Security | 1909-07-02 | A Roadmap for Cybersecurity Research | Government Report | 3.3 Security Targets, 5.3 Government Organizations |
Yes |
Department of Justice | 2011-04 | The Federal Bureau of Investigation's Ability to Address the National Security Cyber Intrusion Threat | Government Report | 4.6 Information Sharing/Disclosure, 4.11 Cybercrime, 5.3 Government Organizations |
No |
Deputy Chief of Staff for Intelligence | 1909-06-29 | Critical Infrastructure Threats and Terrorism | Government Report | 3.3 Security Targets, 4.11 Cybercrime, 4.12 Cyberwar |
Yes |
DHS | 2009-09-16 | National Cyber Leap Year Summit 2009: Co-Chairs' Report | Government Report | 3.3 Security Targets, 4.2 Economics of Cybersecurity, 4.8 Attribution |
No |
DHS | 2007-06 | Challenges Remain in Securing the Nation’s Cyber Infrastructure | Government Report | 4.6 Information Sharing, 4.7 Public-Private Cooperation, 5.3 Government Organizations |
No |
DHS | 2009-11 | A Roadmap for Cybersecurity Research | Government Report | 1. Overview, 4.2.1 Risk management and Investment |
No |
DHS | 2010-08 | DHS Needs to Improve the Security Posture of Its Cybersecurity Program Systems | Government Report | 3.3.1.1 Government Networks (.gov), 5.3 Government Organizations |
No |
DHS | 2010-09 | National Cyber Incident Response Plan | Government Report | 3. Threats and Actors, 5.3 Government Organizations |
No |
DHS | 2011-11 | Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise | Government Report | 3.3 Security Targets, 5.3 Government Organizations |
No |
DOD | 2011-07-14 | Department of Defense Strategy for Operating in Cyberspace | Government Report | 3.3.1.2 Military Networks (.mil), 5.3 Government Organizations |
No |
DOD | 2011-11-15 | Department of Defense Cyberspace Policy Report : A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934 | Government Report | 4.12 Cyberwar, 5.3 Government Organizations, 5.7 Technology |
No |
DOD | 2012-02-16 | DOD Information Security Program: Overview, Classification, and Declassification | Government Report | 4.6 Information Sharing/Disclosure, 5.3 Government Organizations |
No |
DOD | 2011-04 | Cyber Operations Personnel Report (DOD) | Government Report | No | |
Dörmann, Knut | 1909-06-27 | Applicability of the Additional Protocols to Computer Network Attacks | Independent Report | 3.2.1 States, 4.12 Cyberwar, 5.5 International Law (including Laws of War) |
Yes |
Dunlap Charles J, Jr | 2011 | Perspectives for Cyber Strategists on Law for Cyberwar | Journal Article | 4.12 Cyberwar, 5.3 Government Organizations, 5.5 International Law (including Laws of War) |
Yes |
Dunlap, Charles J. Jr. | 1909-07-02 | Towards a Cyberspace Legal Regime in the Twenty-First Century | Speech | 4.5 Psychology and Politics, 4.12 Cyberwar, 5.5 International Law (including Laws of War) |
Yes |
EastWest Institute | 2011-02-03 | Working Towards Rules for Governing Cyber Conflict: Rendering the Geneva and Hague Conventions in Cyberspace | Independent Report | 3.2.1 States, 5.4 International Cooperation, 5.5 International Law (including Laws of War) |
No |
Energetics Inc. | 1909-06-29 | Roadmap to Secure Control Systems in the Energy Sector | Independent Report | 3.3.1 Public Critical Infrastructure, 4.7 Public-Private Cooperation |
Yes |
Energy Sector Control Systems Working Group | 2011-09 | Roadmap to Achieve Energy Delivery Systems Cybersecurity | Government Report | 3.3.2.1 Electricity, Oil and Natural Gas, 4.7 Public-Private Cooperation |
No |
Epstein, Richard A. | 1909-07-01 | Cybersecurity in the Payment Card Industry | Law Review | 3.2.5 Criminals and Criminal Organizations, 4.11 Cybercrime, 5.1 Regulation/Liability |
Yes |
European Network and Information Security Agency | 2010-10-07 | Stuxnet Analysis | Non-US Government Report | 3. Threats and Actors, 5.7 Technology |
No |
European Network and Information Security Agency (ENISA) | 2011-04-11 | Resilience of the Internet Interconnection Ecosystem, at: | Non-US Government Report | 3. Threats and Actors, 4. Issues, 5. Approaches |
No |
Federal CIO Council | 2012-01-04 | Federal Risk and Authorization Management Program (FedRAMP) | Government Report | 3.3.3.3 Cloud Computing, 5.3 Government Organizations |
No |
Federal Communications Commission (FCC) | 2010-04-21 | Explore the reliability and resiliency of commercial broadband communications networks | Government Report | 3.3.3 Communications, 5.1 Regulation/Liability, 5.3 Government Organizations |
No |
Federal Communications Commission (FCC) | 2011-06-03 | [ FCC's Plan for Ensuring the Security of Telecommunications Networks ftp://ftp.fcc.gov/pub/Daily_Releases/Daily_Business/2011/ db0610/DOC-307454A1.txt ] | Government Report | No | |
Financial Services Sector Coordinating Council for Critical Infrastructure Protection | 1909-07-01 | Research Agenda for the Banking and Finance Sector | Independent Report | 3.3.2.2 Financial Institutions and Networks, 4.1 Metrics, 4.2.1 Risk Management and Investment |
Yes |
Fischer, Eric A. CRS |
2012-04-23 | Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions | Government Report | 3.3 Security Targets, 5.1 Regulation/Liability |
No |
Franklin, Jason, et. al | 1909-06-30 | An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants | Conf. Paper | 3.2.5 Criminals and Criminal Organizations, 4.2 Economics of Cybersecurity, 4.11 Cybercrime |
Yes |
Gandal, Neil | 1909-07-01 | An Introduction to Key Themes in the Economics of Cyber Security | Book Chapter | 4.2 Economics of Cybersecurity, 4.2.2 Incentives, 5.7 Technology |
Yes |
GAO | 2003-08-27 | Efforts to Improve Information sharing Need to Be Strengthened | Government Report | 4.6 Information Sharing/Disclosure, 5.3 Government Organizations |
No |
GAO | 2004-05-28 | Technology Assessment: Cybersecurity for Critical Infrastructure Protection | Government Report | 3.3 Security Targets, 4.7 Public-Private Cooperation, 5.7 Technology |
No |
GAO | 2008-07-31 | Cyber Analysis And Warning: DHS Faces Challenges in Establishing a Comprehensive National Capability | Government Report | 5.3 Government Organizations | No |
GAO | 2009-09-24 | Critical Infrastructure Protection: Current Cyber Sector-Specific Planning Approach Needs Reassessment | Government Report | 3.3.1 Public Critical Infrastructure, 5.3 Government Organizations |
No |
GAO | 2009-11-17 | Continued Efforts Are Needed to Protect Information Systems from Evolving Threats | Government Report | 3.2 Actors and Incentives, 3.3.1 Public Critical Infrastructure, 5.3 Government Organizations |
No |
GAO | 2010-03-05 | Cybersecurity: Progress Made But Challenges Remain in Defining and Coordinating the Comprehensive National Initiative | Government Report | 3.3.1 Public Critical Infrastructure, 5.3 Government Organizations |
No |
GAO | 2010-03-16 | Cybersecurity: Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats | Government Report | 3.3.1 Public Critical Infrastructure, 5.3 Government Organizations |
No |
GAO | 2010-03-24 | Information Security: Concerted Response Needed to Resolve Persistent Weaknesses, at: | Government Report | 3.3.1 Public Critical Infrastructure, 5.3 Government Organizations |
No |
GAO | 2010-04-12 | Concerted Effort Needed to Consolidate and Secure Internet Connections at Federal Agencies | Government Report | 3.3.1 Public Critical Infrastructure, 5.3 Government Organizations, 5.7 Technology |
No |
GAO | 2010-06-03 | Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development | Government Report | 4.7 Public-Private Cooperation, 5.3 Government Organizations |
No |
GAO | 2010-06-16 | Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats | Government Report | 3.3.1 Public Critical Infrastructure, 5.3 Government Organizations |
No |
GAO | 2010-07-01 | Federal Guidance Needed to Address Control Issues With Implementing Cloud Computing | Government Report | 3.3.3.3 Cloud Computing, 5.3 Government Organizations |
No |
GAO | 2010-07-15 | Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed | Government Report | 4.6 Information Sharing/Disclosure, 4.7 Public-Private Cooperation, 5.3 Government Organizations |
No |
GAO | 2010-08-02 | United States Faces Challenges in Addressing Global Cybersecurity and Governance | Government Report | 4.7 Public-Private Cooperation, 5.3 Government Organizations, 5.4 International Cooperation |
No |
GAO | 2010-09-15 | Information Security: Progress Made on Harmonizing Policies and Guidance for National Security and Non-National Security Systems | Government Report | 3.3.1 Public Critical Infrastructure, 5.3 Government Organizations |
No |
GAO | 2010-09-23 | DHS Efforts to Assess and Promote Resiliency Are Evolving but Program Management Could Be Strengthened | Government Report | 3.3 Security Targets, 5.3 Government Organizations |
No |
GAO | 2010-10-06 | Cyberspace Policy: Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed | Government Report | 5.1 Regulation/Liability, 5.3 Government Organizations |
No |
GAO | 2010-11-30 | Information Security: Federal Agencies Have Taken Steps to Secure Wireless Networks, but Further Actions Can Mitigate Risk | Government Report | 3.3.3 Communications, 5.3 Government Organizations, 5.7 Technology |
No |
GAO | 2011-01-12 | Electricity Grid Modernization: Progress Being Made on Cybersecurity Guidelines, but Key Challenges Remain to be Addressed | Government Report | 3.3.2.1 Electricity, Oil and Natural Gas, 5.1 Regulation/Liability, 5.3 Government Organizations |
No |
GAO | 2011-03-16 | Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure and Federal Information Systems | Government Report | 3.3 Security Targets, 5.1 Regulation/Liability, 5.3 Government Organizations |
No |
GAO | 2011-07-08 | Information Security: State Has Taken Steps to Implement a Continuous Monitoring Application, but Key Challenges Remain | Government Report | 3.3.1.1 Government Networks (.gov), 5.3 Government Organizations, 5.7 Technology |
No |
GAO | 2011-07-25 | Defense Department Cyber Efforts: DoD Faces Challenges in Its Cyber Activities | Government Report | 3.3.1.2 Military Networks (.mil), 5.3 Government Organizations |
No |
GAO | 2011-07-26 | Continued Attention Needed to Protect Our Nation’s Critical Infrastructure | Government Report | 3.3 Security Targets, 5.1 Regulation/Liability, 5.3 Government Organizations |
No |
GAO | 2011-07-29 | Defense Department Cyber Efforts: Definitions, Focal Point, and Methodology Needed for DoD to Develop Full-Spectrum Cyberspace Budget Estimates | Government Report | 3.3.1.2 Military Networks (.mil), 4.2 Economics of Cybersecurity, 5.3 Government Organizations |
No |
GAO | 2011-10-03 | Information Security: Weaknesses Continue Amid New Federal Efforts to Implement Requirements | Government Report | 3.3.1 Public Critical Infrastructure, 4.4 Usability/Human Factors, 5.3 Government Organizations |
No |
GAO | 2011-10-05 | Information Security: Additional Guidance Needed to Address Cloud Computing Concerns | Government Report | 3.3.1 Public Critical Infrastructure, 3.3.3.3 Cloud Computing, 5.3 Government Organizations |
No |
GAO | 2011-10-17 | Federal Chief Information Officers: Opportunities Exist to Improve Role in Information Technology Management | Government Report | 5.1 Regulation/Liability, 5.3 Government Organizations |
No |
GAO | 2011-11-29 | Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination, at: | Government Report | 4.2 Economics of Cybersecurity, 4.4 Usability/Human Factors, 5.3 Government Organizations |
No |
GAO | 2011-12-09 | Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use | Government Report | 3.3 Security Targets, 5.1 Regulation/Liability, 5.3 Government Organizations |
No |
GAO | 2012-01-13 | Defense Contracting: Improved Policies and Tools Could Help Increase Competition on DOD's National Security Exception Procurements | Government Report | 3.3.1.2 Military Networks (.mil), 4.7 Public-Private Cooperation |
No |
GAO | 2012-02-28 | Cybersecurity: Challenges to Securing the Modernized Electricity Grid | Government Report | No | |
GAO | 2009-07 | Information Security: Agencies Continue to Report Progress, but Need to. Mitigate Persistent Weaknesses | Government Report | 3.3.1.1 Government Networks (.gov), 5.3 Government Organizations |
No |
GAO | 2009-09 | Information Security: Concerted Effort Needed to Improve Federal Performance Measures | Government Report | 3.3.1 Public Critical Infrastructure, 5.3 Government Organizations |
No |
GAO | 2011-10-05 | Information Security: Additional Guidance Needed to Address Cloud Computing Concerns | Government Report | 3.3.3.3 Cloud Computing, 5.3 Government Organizations |
No |
General Accountability Office (GAO) | 2010-07-15 | Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed | Government Report | 3.3 Security Targets, 4.6 Information Sharing/Disclosure, 4.7 Public-Private Cooperation |
No |
General Accountability Office (GAO) | 2011-01-12 | Electricity Grid Modernization: Progress Being Made on Cybersecurity Guidelines, but Key Challenges Remain to be Addressed | Government Report | 3.3.2.1 Electricity, Oil and Natural Gas, 5.1 Regulation/Liability, 5.3 Government Organizations |
No |
General Accountability Office (GAO) | 2011-03-16 | Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure and Federal Information Systems | Government Report | 3. Threats and Actors, 3.3.1 Public Critical Infrastructure, 5.3 Government Organizations |
No |
General Accountability Office (GAO) | 2011-07-29 | Defense Department Cyber Efforts: Definitions, Focal Point, and Methodology Needed for DOD to Develop Full-Spectrum Cyberspace Budget Estimates | Government Report | 4.2 Economics of Cybersecurity, 5.3 Government Organizations |
No |
General Accountability Office (GAO) | 2011-11-29 | Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination | Government Report | 3.3.1 Public Critical Infrastructure, 4.4 Usability/Human Factors, 5.3 Government Organizations |
No |
General Accountability Office (GAO) | 2011-12-09 | Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use | Government Report | No | |
General Services Administration (GSA) | 2012-02-07 | Concept of Operations: FedRAMP | Government Report | 3.3.3.3 Cloud Computing, 5.3 Government Organizations |
No |
Grady, Mark F. | 1909-06-29 | The Law and Economics of Cybersecurity | Book | 4.2 Economics of Cybersecurity, 5.1 Regulation/Liability |
Yes |
Graham David E | 2010 | Cyber Threats and the Law of War | Journal Article | 3.2.1 States, 4.12 Cyberwar, 5.5 International Law (including Laws of War) |
Yes |
Granick, Jennifer Stisa | 1909-06-28 | The Price of Restricting Vulnerability Publications | Law Review | 4.2 Economics of Cybersecurity, 4.6 Information Sharing/Disclosure, 5.1 Regulation/Liability |
Yes |
Hollis, Duncan B. | 1909-06-30 | Why States Need an International Law for Information Operations | Law Review | 4.12 Cyberwar, 4.13.1 Government to Government Espionage, 5.5 International Law (including Laws of War) |
Yes |
HP TippingPoint DVLabs | 1909-07-03 | 2010 Top Cyber Security Risks Report | Industry report | 4.11 Cybercrime, 5.7 Technology |
Yes |
IEEE/EastWest Institute | 2010-05-26 | The Reliability of Global Undersea Communications Cable Infrastructure (The Rogucci Report) | Independent Report | 3.3.3 Communications, 4.7 Public-Private Cooperation, 5.4 International Cooperation |
No |
Institute for Information Infrastructure Protection | 1909-06-26 | Cyber Security Research and Development Agenda | Independent Report | 4.1 Metrics, 4.2.1 Risk Management and Investment, 5.1 Regulation/Liability |
Yes |
Institute for Science and International Security | 2010-12-22 | Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant? Preliminary Assessment | Independent Report | 3. Threats and Actors, 3.3 Security Targets, 5.7 Technology |
No |
International Instrument Users Association (WIB) | 2010-11-10 | WIB Security Standard Released | Industry Report | 3.3 Security Targets, 5.4 International Cooperation |
No |
International Telecommunications Union | 2012-02-10 | ITU Toolkit for Cybercrime Legislation | ndependent Report | No | |
James Clapper, Director of National Intelligence | 2011-02-10 | Worldwide Threat Assessment of the U.S. Intelligence Community (Testimony) | Government Report | 3. The Threat and Skeptics, 3.2 Actors and Incentives |
No |
Johnson, Eric M. | 1909-07-01 | Managing Information Risk and the Economics of Security | Book | 4.2 Economics of Cybersecurity, 4.2.1 Risk Management and Investment, 5.1 Regulation/Liability |
Yes |
Johnson, Vincent R. | 1909-06-28 | Cybersecurity, Identity Theft, and the Limits of Tort Liability | Law Review | 4.9 Identity Management, 4.10 Privacy, 5.1 Regulation/Liability |
Yes |
Joint Workshop of the National Security Threats in Cyberspace and the National Strategy Forum | 2009-09-15 | National Security Threats in Cyberspace | Independent Report | No | |
Journal of Strategic Studies | 2011-10-05 | Cyber War Will Not Take Place | Journal Article | No | |
Kerr, Paul K. et al. CRS |
2010-12-09 | The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability | Government Report | 3.3 Security Targets, 4.12 Cyberwar, 5.4 International Law (including Laws of War) |
No |
Kobayashi, Bruce H. | 1909-06-29 | An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods | Journal Article | 4.2 Economics of Cybersecurity, 4.2.2 Incentives, 5.6 Deterrence |
Yes |
Korns, Stephen W. | 1909-07-02 | Cyber Operations | Journal Article | 4.8 Attribution, 4.12 Cyberwar, 5.6 Deterrence |
Yes |
Kramer, Franklin D., et. al | 1909-07-02 | Cyberpower and National Security | Book | 1. Overview | Yes |
Kundra, Vivek | 2010-12-09 | 25 Point Implementation Plan to Reform Federal Information Technology Management | Government Report | 3.3.1.1 Government Networks (.gov), 3.3.3.3 Cloud Computing, 5.3 Government Organizations |
No |
Kundra, Vivek | 2011-02-08 | Federal Cloud Computing Strategy | Government Report | 3.3.1.1 Government Networks (.gov), 3.3.3.3 Cloud Computing, 5.3 Government Organizations |
No |
Lernard, Thomas M. | 1909-06-28 | An Economic Analysis of Notification Requirements for Data Security Breaches | Online Paper | 4.2 Economics of Cybersecurity, 4.6 Information Sharing/Disclosure, 5.1 Regulation/Liability |
Yes |
Lernard, Thomas M. | 1909-06-29 | Much Ado About Notification | Journal Article | 4.6 Information Sharing/Disclosure, 5.1 Regulaiton/Liability |
Yes |
Massachusetts Institute of Technology (MIT) | 2011-12-05 | The Future of the Electric Grid | Independent Report | 3.3.2.1 Electricity, Oil and Natural Gas, 4. Issues, 5.1 Regulation/Liability |
No |
McAfee | 2011-08-02 | Revealed: Operation Shady RAT: an Investigation Of Targeted Intrusions Into 70+ Global Companies, Governments, and Non-Profit Organizations During the Last 5 Years | Industry Report | 3.2.1 States, 3.3 Security Targets, 4.13 Espionage |
No |
McAfee | 2012-02-01 | Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World | Industry Report | 3. Threats and Actors, 4. Issues, 5. Approaches |
No |
McAfee and Center for Strategic and International Studies (CSIS) | 2011-04-21 | In the Dark: Crucial Industries Confront Cyberattacks | Industry Report | 3. Threats and Actors, 3.3.2 Private Critical Infrastructure, 4.7 Public-Private Cooperation |
No |
McAfee and the Security Defense Agenda | 2012-02-12 | Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World | Industry Report | 1. Overview, 4. Issues, 5. Approaches |
No |
McAfee, Inc. | 1909-07-03 | McAfee Threats Report | Industry Report | 3.2.3 Hacktivists, 3.2.5 Criminals and Criminal Organizations, 4.11 Cybercrime |
Yes |
Microsoft | 2012-11-10 | Information Security Management System for Microsoft Cloud Infrastructure | Industry Report | 3.3.3.3 Cloud Computing, 5.2 Private Efforts/Organizations |
No |
Mitre Corp (JASON Program Office) | 2012-11-10 | Science of Cyber-Security | Independent Report | 1. Overview, 4. Issues |
No |
Moore, Tyler | 1909-06-30 | Examining the Impact of Website Take-down on Phishing | Conf. Paper | 4.2 Economics of Cybersecurity, 4.11 Cybercrime, 5.7 Technology |
Yes |
Moore, Tyler | 1909-07-01 | The Consequence of Non-Cooperation in the Fight Against Phishing | Conf. Paper | 3.3.2.2 Financial Institutions and Networks, 4.2 Economics of Cybersecurity, 4.6 Information Sharing/Disclosure |
Yes |
Moore, Tyler | 1909-07-02 | The Impact of Incentives on Notice and Take-down | Book Chapter | 4.2.2 Incentives, 4.11 Cybercrime, 5.4 International Cooperation |
Yes |
Moore, Tyler, et. al | 1909-07-02 | The Economics of Online Crime | Journal Article | 3.2.5 Criminals and Criminal Organizations, 3.3.2.2 Financial Institutions and Networks, 4.2 Economics of Cybersecurity |
Yes |
National Association of Secretaries of State | 2012-01-12 | Developing State Solutions to Business Identity Theft: Assistance, Prevention and Detection Efforts by Secretary of State Offices | Independent Report | 4.7 Public-Private Cooperation, 4.9 Identity Management, 5.3 Government Organizations |
No |
National Cyber Defense Initiative | 1909-07-02 | National Cyber Defense Financial Services Workshop Report | Independent Report | 3.3.2.2 Financial Institutions and Networks, 4.2.1 Risk Management and Investment, 5.3 Government Organizations |
Yes |
National Cyber Security Alliance and Microsoft | 2011-05-13 | 2011 State of Cyberethics, Cybersafety and Cybersecurity Curriculum in the U.S. Survey | Industry Report | 4.4 Usability/Human Factors | No |
National Cyber Security Summit Task Force | 1909-06-27 | Information Security Governance | Government Report | 4.7 Public-Private Cooperation, 5.2 Private Efforts/Organizations, 5.3 government Organizations |
Yes |
National Infrastructure Advisory Council | 1909-06-27 | Hardening The Internet | Government Report | 3.3 Security Targets, 4.7 Public-Private Cooperation, 5.3 Government Organizations |
Yes |
National Initiative for Cybersecurity Education | 2011-08-11 | National Initiative for Cybersecurity Education Strategic Plan: Building a Digital Nation | Government Report | 1. Overview, 5.3 Government Organizations |
No |
National Initiative for Cybersecurity Education (NICE) | 2011-11-21 | NICE Cybersecurity Workforce Framework | Government Report | 4.4 Usability/Human Factors, 5.3 Government Organizations |
No |
National Institute of Standards and Technology | 1909-06-29 | SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security | Government Report | 3.3.1 Public Critical Infrastructure, .2.1 Risk Management and Investment, 5.2 Private Efforts/Organizations |
Yes |
National Institute of Standards and Technology (NIST) | 2010-09-02 | NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines | Government Report | 3.3.2.1 Electricity, Oil and Natural Gas, 5.1 Regulation/Liability, 5.3 Government Organizations |
No |
National Research Council | 1909-06-22 | Trust in Cyberspace | Independent Report | 3.3.3.2 Public Data Networks, 4.2.2 Incentives, 4.7 Public-Private Cooperation |
Yes |
National Research Council | 1909-06-30 | Toward a Safer and More Secure Cyberspace | Independent Report | 1. Overview, 4.8 Attribution, 5.6 Deterrence |
Yes |
National Research Council | 2010-09-21 | Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop | Independent Report | 4.2 Economics of Cybersecurity, 4.4 Usability/Human Factors, 4.10 Privacy |
No |
National Research Council | 2010-10-05 | Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy | Independent Report | 3. Threats and Actors, 4. Issues, 5. Approaches |
No |
National Research Council, Committee for Advancing Software-Intensive Systems Producibility | 2010-10-20 | Critical Code: Software Producibility for Defense | Government Report | 3.3.1.2 Military Networks (.mil), 5.3 Government Organizations, 5.7 Technology |
No |
National Science and Technology Council | 1909-06-29 | Federal Plan for Cyber Security and Information Assurance Research and Development | Government Report | 4.1 Metrics, 4.7 Attribution, 4.8 Public-Private Cooperation |
Yes |
National Science Foundation | 2011-08-11 | At the Forefront of Cyber Security Research | Government Report | 5.7 Technology | No |
National Science Foundation | 2012-01-17 | Information Security Risk Taking | Government Report | 4.1 Metrics, 4.6 Information Sharing/Disclosure, 5.3 Government Organizations |
No |
National Security Cyberspace Institute | 2012-07-11 | Analogies Whitepaper-K McKee.pdf A Review of Frequently Used Cyber Analogies | Independent Report | No | |
National Security Initiative | 2010-10-18 | American Security Challenge | Independent Report | No | |
Networking and Information Technology Research and Development | 1909-07-02 | National Cyber Leap Year Summit 2009, Co-Chairs' Report | Government Report | 4.6 Information Sharing/Disclosure, 4.9 Identity Management, 5.7 Technology |
Yes |
NIST | 2011-09-01 | Cloud Computing Reference Architecture | Government Report | 3.3.3.3 Cloud Computing | No |
NIST | 2011-12-01 | U.S. Government Cloud Computing Technology Roadmap, Release 1.0 (Draft), Volume II Useful Information for Cloud Adopters | Government Report | 3.3.3.3 Cloud Computing, 5.3 Government Organizations |
No |
NIST | 2012-02-17 | Recommendations for Establishing an Identity Ecosystem Governance Structure for the National Strategy for Trusted Identities in Cyberspace | Government Report | 4.7 Public-Private Cooperation, 4.9 Identity Management, 5.3 Government Organizations |
No |
North American Electric Reliability Corp. (NERC) | 2011-01-26 | Federal Energy Regulatory Commission's Monitoring of Power Grid Cyber Security | Government Report | 3.3.2.1 Electricity, Oil and Natural Gas, 4.7 Public-Private Cooperation, 5.1 Regulation/Liability |
No |
NSTC | 2011-12 | Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program | Government Report | 5.3 Government Organizations | No |
Nye, Joseph | 1909-07-03 | Cyber Power | Book Chapter | 4.12 Cyberwar, 4.13 Espionage, 5.5 International Law (including Laws of War) |
Yes |
Office of the National Counterintelligence Executive | 2011-11-03 | Foreign Spies Stealing US Economic Secrets in Cyberspace | Government Report | 3. Threats and Actors, 3.2 Actors and Incentives, 4.13 Espionage |
No |
Organisation for Economic Co-operation and Development (OECD) | 2010-11-12 | The Role of Internet Service Providers in Botnet Mitigation: an Empirical Analysis Bases on Spam Data | Independent Report | 3. Threats and Actors, 5.7 Technology |
No |
Organization for Economic Co-operation and Development (OECD) | 2012-01-10 | ICT Applications for the Smart Grid: Opportunities and Policy Implications | Government Report | No | |
PCAST | 2010-12 | Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technology | Government Report | 4.3 Supply Chain Issues, 4.10 Privacy, 5.3 Government Organizations |
No |
PCAST | 2011-06 | Report to the President on Ensuring American Leadership in Advanced Manufacturing | Government Report | 4.2.1 Risk Management and Investment, 5.3 Government Organizations |
No |
Pew Research Center’s Internet & American Life Project | 2010-06-11 | The future of cloud computing | Independent Report | 3.3.3.3 Cloud Computing | No |
Powell, Benjamin | 1909-06-28 | Is Cybersecurity a Public Good | Law Review | 4.2 Economics of Cybersecurity, 4.2.5 Market Failure, 5.1 Regulation/Liability |
Yes |
President's Commission on Critical Infrastructure Protection | 1909-06-20 | Critical Foundations | Government Report | 3.3.2 Private Critical Infrastructure, 3.3.3 Communications, 5.3 Government Organizations |
Yes |
President's Information Technology Advisory Council | 1909-06-28 | Cyber Security: A Crisis of Prioritization | Government Report | 4.2.2 Incentives, 4.7 Public-Private Cooperation, 5.3 Government Organizations |
Yes |
Project on National Security Reform (PNSR) | 2012-11-10 | The Power of People: Building an Integrated National Security Professional System for the 21st Century | Government Report | 4.4 Usability/Human Factors, 5.3 Government Organizations |
No |
Quadrennial Defense Review | 2010-07-30 | The QDR in Perspective: Meeting AmericaÅfs National Security Needs In the 21st Century (QDR Final Report) | Government Report | 3.3.1.2 Military Networks (.mil), 5.3 Government Organizations |
No |
RAND | 2011-12-21 | A Cyberworm that Knows No Boundaries | Independent Report | 3. Threats and Actors, 5.3 Government Organizations, 5.7 Technology |
No |
Romanosky et al. | 1909-07-01 | Do Data Breach Disclosure Laws Reduce Identity Theft | Conf. Paper | 4.2.2 Incentives, 4.6 Information Sharing/Disclosure, 5.1 Regulation/Liability |
Yes |
Rotenberg et. al. | 1909-07-03 | The Cyber War Threat Has Been Grossly Exaggerated | Debate | 3. The Threat and Skeptics, 3.2.1 States, 4.12 Cyberwar |
Yes |
Schmitt Michael N | 2002 | Wired warfare: Computer network attack and jus in bello | Journal Article | 3.2.1 States, 4.12 Cyberwar, 5.5 International Law (including Laws of War) |
Yes |
Schmitt Michael N | 2004 | Direct Participation in Hostilities and 21st Century Armed Conflict | Journal Article | 3.2.1 States, 4.12 Cyberwar, 5.5 International Law (including Laws of War) |
Yes |
Schmitt, Michael N. | 1909-06-22 | Computer Network Attack and the Use of Force in International Law | Law Review | 3.2.1 States, 4.12 Cyberwar, 5.5 International Law (including Laws of War) |
Yes |
Schmitt, Michael N., et. al | 1909-06-27 | Computers and War | Conf. Paper | 3.2.1 States, 4.12 Cyberwar, 5.5 International Law (including Laws of War) |
Yes |
Schneier, Bruce | 1909-06-26 | Beyond Fear | Book | 3.2 Actors and Incentives, 4.5 Psychology and Politics, 5.6 Deterrence |
Yes |
Schneier, Bruce | 1909-07-01 | Schneier on Security | Book | 3.2 Actors and Incentives, 4.4 Usability/Human Factors, 5.1 Regulation/Liability |
Yes |
Schwartz, Paul | 1909-06-30 | Notification of Data Security Breaches | Law Review | 4.2.2 Incentives, 4.6 Information Sharing/Disclosure, 5.1 Regulation/Liability |
Yes |
Secretary of the Air Force | 2011-07-27 | Legal Reviews of Weapons and Cyber Capabilities | Government Report | 4.12 Cyberwar, 5.3 Government Organizations, 5.5 International Law (including Laws of War) |
No |
Sklerov, Matthew J. | 1909-07-02 | Solving the Dilemma of State Responses to Cyberattacks | Law Review | 3.2.1 States, 4.8 Attribution, 5.5 Internaitonal Law (including Laws of War) |
Yes |
Software and Information Industry Association (SAII) | 2011-07-26 | Guide to Cloud Computing for Policy Makers | Government Report | 3.3.3.3 Cloud Computing, 5.1 Regulation/Liability, 5.7 Technology |
No |
Stohl, Michael | 1909-06-29 | Cyber Terrorism | Journal Article | 3.2.3 Hacktivists, 3.2.4 Terrorists, 4.5 Psychology and Politics |
Yes |
Swire, Peter P. | 1909-06-27 | A Model for When Disclosure Helps Security | Law Review | 4.2.2 Incentives, 4.6 Information Sharing/Disclosure, 5.1 Regulation/Liability |
Yes |
Swire, Peter P. | 1909-06-29 | A Theory of Disclosure for Security and Competitive Reasons | Law Review | 4.2 Economics of Cybersecurity, 4.6 Information Sharing/Disclosure, 5.1 Regulation/Liability |
Yes |
Symantec | 2011-10-24 | W32.Duqu: The Precursor to the Next Stuxnet | Industry Report | 3. Threats and Actors, 5.7 Technology |
No |
Symantec Corporation | 1909-07-03 | Symantec Global Internet Security Threat Report | Industry Report | 3.3.2.2 Financial Institutions and Networks, 4.2 Economics of Cybersecurity, 4.11 Cybercrime |
Yes |
Telang, Rahul | 1909-06-30 | Impact of Software Vulnerability Announcements on the Market Value of Software Vendors | Journal Article | 4.1 Metrics, 4.2 Economics of Cybersecurity, 4.6 Information Sharing/Disclosure |
Yes |
Thom, Maxie | 2006 | Information Warfare Arms Control: Risks and Costs | Government Report | 3.2.1 States, 4.12 Cyberwar, 5. Approaches |
Yes |
Thomas, Rob | 1909-06-29 | The Underground Economy | Journal Article | 3.2.5 Criminals and Criminl Organizations, 3.3.2.2 Financial Institutions and Networks, 4.11 Cybercrime |
Yes |
Threat Level Blog (Wired) | 2010-12-27 | A Four-Day Dive Into Stuxnet’s Heart | Independent Report | 3. Threats and Actors, 5.7 Technology |
No |
Todd, Graham H. | 1909-07-02 | Armed Attack in Cyberspace | Law Review | 3.2.1 States, 4.8 Attribution, 5.5 Internaitonal Law (including Laws of War) |
Yes |
Trend Micro Incorporated | 1909-07-03 | Trend Micro Annual Report | Industry Report | 4.11 Cybercrime | Yes |
U.S. Air Force | 2010-07-15 | Cyberspace Operations: Air Force Doctrine Document 3-12 | Government Report | 3.3.1.2 Military Networks (.mil), 4.12 Cyberwar, 5.3 Government Organizations |
No |
U.S. Army War College | 2011-05-09 | Cyber Infrastructure Protection | Government Report | No | |
U.S. Army War College, Strategy Research Project | 2011-03-24 | China’s Cyber Power and America’s National Security | Government Report | 3.2.1 States, 4.13 Espionage, 5.3 Government Organizations |
No |
U.S. Department of Energy, Infrastructure Security and Energy Restoration | 2007-01-01 | 21 Steps to Improve Cyber Security of SCADA Networks | Government Report | 3.3 Security Targets, 5.3 Government Organizations, 5.7 Technology |
No |
U.S. Deputy Secretary of Defense, William J. Lynn (Foreign Affairs) | 2010-009 | Defending a New Domain | Government Report | No | |
U.S. House Committee on Appropriations (closed/classified) (Subcommittee on Energy and Power) | 2011-03-31 | Budget Hearing - National Protection and Programs Directorate, Cybersecurity and Infrastructure Protection Programs | U.S. Government Hearing | 4.2 Economics of Cybersecurity, 5.3 Government Organizations |
No |
U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities) | 2011-02-11 | What Should the Department of Defense’s Role in Cyber Be? | U.S. Government Hearing | 3. The Threat and Skeptics, 4.12 Cyberwar, 5.3 Government Organizations |
No |
U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities) | 2011-03-16 | 2012 Budget Request from U.S. Cyber Command | U.S. Government Hearing | 3.3.1.2 Military Networks (.mil), 4.2 Economics of Cybersecurity |
No |
U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities) | 2011-11-03 | Institutionalizing Irregular Warfare Capabilities | U.S. Government Hearing | 4.12 Cyberwar | No |
U.S. House Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities) | 2012-03-20 | Fiscal 2013 Defense Authorization: IT and Cyber Operations | U.S. Government Hearing | 4.2.1 Risk Management and Investment, Government Organizations |
No |
U.S. House Committee on Energy and Commerce | 2011-05-31 | Protecting the Electric Grid: the Grid Reliability and Infrastructure Defense Act | U.S. Government Hearing | 3.3.2.1 Electricity, Oil and Natural Gas, 4.7 Public-Private Cooperation, 5.1 Regulation/Liability |
No |
U.S. House Committee on Energy and Commerce (Subcommittee on Commerce, Manufacturing, and Trade) | 2011-06-02 | Sony and Epsilon: Lessons for Data Security Legislation | U.S. Government Hearing | 4.9 Identity Management, 5.1 Regulation/Liability, 5.2 Private Efforts/Organizations |
No |
U.S. House Committee on Energy and Commerce (Subcommittee on Commerce,Trade and Manufacturing) | 2011-06-15 | Discussion Draft of H.R. ___, a bill to require greater protection for sensitive consumer data and timely notification in case of breach | U.S. Government Hearing | 4.6 Information Sharing/Disclosure, 4.10 Privacy, 5.1 Regulation/Liability |
No |
U.S. House Committee on Energy and Commerce (Subcommittee on Communications and Technology) | 2012-03-07 | Cybersecurity:Networks The Pivotal Role of Communications | U.S. Government Hearing | 3.3.3 Communications, 5.3 Government Organizations, 5.7 Technology |
No |
U.S. House Committee on Energy and Commerce (Subcommittee on Communications and Technology) | 2012-03-28 | Cybersecurity:Threats to Communications Networks and Public-Sector Responses | U.S. Government Hearing | 3.3.3 Communications, 4.7 Public-Private Cooperation, 5.3 Government Organizations |
No |
U.S. House Committee on Energy and Commerce (Subcommittee on Oversight and Investigations) | 2011-07-26 | Cybersecurity: Infrastructure An Overview of Risks to Critical | U.S. Government Hearing | 3.3.2.1 Electricity, Oil and Natural Gas, 4.7 Public-Private Cooperation, 5.3 Government Organizations |
No |
U.S. House Committee on Energy and Commerce (Subcommittee on Oversight and Investigations) | 2012-02-28 | Critical Infrastructure Cybersecurity: Assessments of Smart Grid Security | U.S. Government Hearing | 3.3.2.1 Electricity, Oil and Natural Gas, 4.2.1 Risk Management and Investment |
No |
U.S. House Committee on Energy and Commerce (Subcommittee on Oversight and Investigations) | 2012-03-27 | IT Supply Chain Security: Review of Government and Industry Efforts | U.S. Government Hearing | 4.3 Supply Chain Issues | No |
U.S. House Committee on Financial Services (field hearing in Hoover, AL) | 2011-06-29 | Field Hearing: Hacked Off: Helping Law Enforcement Protect Private Financial Information | U.S. Government Hearing | 3.3.2.2 Financial Institutions and Networks, 5.1 Regulation/Liability |
No |
U.S. House Committee on Financial Services (Subcommittee on Financial Institutions and Consumer Credit) | 2011-09-14 | Combating Cybercriminals | U.S. Government Hearing | 3.3.1.1 Government Networks (.gov), 3.3.2.2 Financial Institutions and Networks, 5.7 Government Organizations |
No |
U.S. House Committee on Foreign Affairs (Subcommittee on Oversight and Investigations) | 2011-04-15 | Communist Chinese Cyber-Attacks, Cyber-Espionage and Theft of American Technology | U.S. Government Hearing | 3.2.1 Governments, 4.12 Cyberwar, 4.13 Espionage |
No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies and Counterterrorism and Intelligence) | 2012-04-19 | The DHS and DOE National Labs: Finding Efficiencies and Optimizing Outputs in Homeland Security Research and Development | U.S. Government Hearing | 4.2.1 Risk Management and Investment, 5.3 Government Organizations, 5.7 Technology |
No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies and Counterterrorism and Intelligence) | 2012-04-26 | Iranian Cyber Threat to U.S. Homeland | U.S. Government Hearing | 3.2.1 States, 3.3 Security Targets, 4.12 Cyberwar |
No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies) | 2011-02-11 | Preventing Chemical Terrorism: Building a Foundation of Security at Our Nation’s Chemical Facilities | U.S. Government Hearing | 3.3.2 Private Critical Infrastructure, 5.1 Regulation/Liability, 5.7 Technology |
No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies) | 2011-03-16 | Examining the Cyber Threat to Critical Infrastructure and the American Economy | U.S. Government Hearing | 3. The Threat and Skeptics, 3.3 Security Targets, 4.2 Economics of Cybersecurity |
No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies) | 2011-04-15 | DHS Cybersecurity Mission: Promoting Innovation and Securing Critical Infrastructure | U.S. Government Hearing | 3.3.2 Private Critical Infrastructure, 4.7 Public-Private Cooperation, 5.1 Regulation/Liability |
No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies) | 2011-06-24 | Examining the Homeland Security Impact of the Obama Administration’s Cybersecurity Proposal | U.S. Government Hearing | 3.3.1.1 Government Networks (.gov), 4.9 Identity Management, 5.3 Government Organizations |
No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies) | 2011-12-06 | Hearing on Draft Legislative Proposal on Cybersecurity | U.S. Government Hearing | 3. The Threat and Skeptics, 4.7 Public-Private Cooperation, 5.1 Regulation/Liability |
No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies) | 2012-02-01 | Consideration and Markup of H.R. 3674 | U.S. Government Hearing | 4.6 Information Sharing, 4.7 Public-Private Cooperation, 5.1 Regulation/Liability |
No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection and Security Technology) | 2011-10-06 | Cloud Computing: What are the Security Implications? | U.S. Government Hearing | 3.3.3.3 Cloud Computing, 4.13 Espionage, 5.3 Government Organizations |
No |
U.S. House Committee on Homeland Security (Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies) | 2011-05-26 | Unlocking the SAFETY Act’s [Support Anti-terrorism by Fostering Effective Technologies - P.L. 107-296 Potential to Promote Technology and Combat Terrorism] | U.S. Government Hearing | 4.11 Cybercrime, 5.1 Regulation/Liability, 5.7 Technology |
No |
U.S. House Committee on Homeland Security (Subcommittee on Oversight, Investigations and Management) | 2012-04-24 | America is Under Cyber Attack: Why Urgent Action is Needed | U.S. Government Hearing | 3. The Threat and Skeptics, 3.2 Actors and Incentives |
No |
U.S. House Committee on Oversight and Government Reform | 2011-07-07 | Cybersecurity: Assessing the Nation’s Ability to Address the Growing Cyber Threat | U.S. Government Hearing | 3.3 Security Targets, 4.7 Public-Private Cooperation, 5.3 Government Organizations |
No |
U.S. House Committee on Oversight and Government Reform (Subcommittee on National Security, Homeland Defense and Foreign Operations) | 2011-05-25 | Cybersecurity: Assessing the Immediate Threat to the United States | U.S. Government Hearing | 3. The Threat and Skeptics, 3.3.1 Public Critical Infrastructure, 4.7 Public-Private Cooperation |
No |
U.S. House Committee on Science, Space and Technology | 2011-07-21 | Markup on H.R. 2096, Cybersecurity Enhancement Act of 2011 | U.S. Government Hearing | 4.2.1 Risk Management and Investment, 5.1 Regulation/Liability, 5.7 Technology |
No |
U.S. House Committee on Science, Space and Technology (Subcommittee on Research and Science Education) | 2011-05-25 | Protecting Information in the Digital Age: Federal Cybersecurity Research and Development Efforts | U.S. Government Hearing | 3.3.1.1 Government Networks (.gov), 5.3 Government Organizations, 5.7 Technology |
No |
U.S. House Committee on Science, Space, and Technology (Subcommittee on Investigations and Oversight) | 2012-02-29 | NASA Cybersecurity: An Examination of the Agency’s Information Security | U.S. Government Hearing | 3.3.1 Public Critical Infrastructure, 5.3 Government Organizations, 5.7 Technology |
No |
U.S. House Committee on Science, Space, and Technology (Subcommittee on Technology and Innovation) | 2011-09-21 | The Cloud Computing Outlook | U.S. Government Hearing | 3.3.3.3 Cloud Computing, 4.7 Public-Private Cooperation, 5.1 Regulation/Liability |
No |
U.S. House Committee on Small Business (Subcommittee on Healthcare and Technology) | 2011-12-01 | Cyber Security: Protecting Your Small Business | U.S. Government Hearing | 4.2.1 Risk Management and Investment, 5.1 Regulation/Liability |
No |
U.S. House Committee on the Judiciary | 2011-11-16 | Combating Online Piracy (H.R. 3261, Stop the Online Piracy Act) | U.S. Government Hearing | 4.11 Cybercrime, 5.1 Regulation/Liability |
No |
U.S. House Committee on the Judiciary (Subcommittee on Crime, Terrorism and Homeland Security) | 2011-11-15 | Cybersecurity: Protecting America’s New Frontier | U.S. Government Hearing | 4.10 Privacy, 4.11 Cybercrime |
No |
U.S. House Committee on the Judiciary (Subcommittee on Intellectual Property, Competition and the Internet) | 2011-05-25 | Cybersecurity: Problems Innovative Solutions to Challenging | U.S. Government Hearing | 4.7 Public-Private Cooperation, 4.11 Cybercrime, 5.2 Private Efforts/Organizations |
No |
U.S. House Permenant Select Committee on Intelligence | 2011-02-10 | World Wide Threats | U.S. Government Hearing | 3. The Threat and Skeptics, 5.1 Regulation/Liability, 5.3 Government Organizations |
No |
U.S. House Permenant Select Committee on Intelligence | 2011-10-04 | Cyber Threats and Ongoing Efforts to Protect the Nation | U.S. Government Hearing | 4.7 Public-Private Cooperation, 4.13.2 Industrial Espionage, 5.4 International Cooperation |
No |
U.S. House Permenant Select Committee on Intelligence | 2011-12-01 | Markup: Draft Bill: Cyber Intelligence Sharing and Protection Act of 2011 | U.S. Government Hearing | 4.6 Information Sharing, 5.1 Regulation/Liability |
No |
U.S. Navy | 2010-06-17 | DON (Department of the Navy) Cybersecurity/Information Assurance Workforce Management, Oversight and Compliance | Government Report | 3.3.1.2 Military Networks (.mil), 5.3 Government Organizations |
No |
U.S. Senate Committee on Armed Services | 2012-03-27 | To receive testimony on U.S. Strategic Command and U.S. Cyber Command in review of the Defense Authorization Request for Fiscal Year 2013 and the Future Years Defense Program. | U.S. Government Hearing | 3.2.1 States, 4.2 Economics of Cybersecurity, 4.12 Cyberwar |
No |
U.S. Senate Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities) | 2011-05-03 | To receive testimony on the health and status of the defense industrial base and its science and technology-related elements | U.S. Government Hearing | 3.3.1.2 Military Networks (.mil), 4.3 Supply Chain Issues, 5.3 Government Organizations |
No |
U.S. Senate Committee on Armed Services (Subcommittee on Emerging Threats and Capabilities) | 2012-03-20 | To receive testimony on cybersecurity research and development in review of the Defense Authorization Request for Fiscal Year 2013 and the Future Years Defense Program | U.S. Government Hearing | 4.2.1 Risk Management and Investment, 4.12 Cyberwar, 5.3 Government Organizations |
No |
U.S. Senate Committee on Banking, Housing and Urban Affairs | 2011-06-21 | Cybersecurity and Data Protection in the Financial Sector | U.S. Government Hearing | 3.3.2.2 Financial Institutions and Networks, 4.10 Privacy, 5.1 Regulation/Liability |
No |
U.S. Senate Committee on Commerce, Science and Transportation | 2011-06-29 | Privacy and Data Security: Protecting Consumers in the Modern World | U.S. Government Hearing | 4.9 Identity Management, 4.10 Privacy, 5.1 Regulation/Liability |
No |
U.S. Senate Committee on Energy and Natural Resources | 2011-03-15 | [ Cybersecurity and Critical Electric Infrastructure (closed)] | U.S. Government Hearing | 3.3.2.1 Electricity, Oil and Natural Gas | No |
U.S. Senate Committee on Energy and Natural Resources | 2011-05-05 | Cybersecurity of the Bulk-Power System and Electric Infrastructure | U.S. Government Hearing | 3.3.2.1 Electricity, Oil and Natural Gas, 4.7 Public-Private Cooperation |
No |
U.S. Senate Committee on Homeland Security and Governmental Affairs | 2011-02-17 | Homeland Security Department’s Budget Submission for Fiscal Year 2012 | U.S. Government Hearing | No | |
U.S. Senate Committee on Homeland Security and Governmental Affairs | 2011-03-10 | Information Sharing in the Era of WikiLeaks: Balancing Security and Collaboration | U.S. Government Hearing | 3.3.1 Public Critical Infrastructure, 4.6 Information Sharing/Disclosure, 5.3 Government Organizations |
No |
U.S. Senate Committee on Homeland Security and Governmental Affairs | 2011-05-23 | Protecting Cyberspace: Assessing the White House Proposal | U.S. Government Hearing | 3.3 Security Targets, 5.1 Regulation/Liability |
No |
U.S. Senate Committee on Homeland Security and Governmental Affairs | 2012-02-16 | Securing America’s Future: The Cybersecurity Act of 2012 | U.S. Government Hearing | 3.3.2 Private Critical Infrastructure, 4.6 Information Sharing/Disclosure, 5.1 Regulation/Liability |
No |
U.S. Senate Committee on Judiciary | 2011-03-30 | Oversight of the Federal Bureau of Investigation | U.S. Government Hearing | 3. Threats and Actors, 4.6 Information Sharing/Disclosure, 5.3 Government Organizations |
No |
U.S. Senate Committee on Judiciary | 2011-09-07 | Cybercrime: Updating the Computer Fraud and Abuse Act to Protect Cyberspace and Combat Emerging Threats | U.S. Government Hearing | 3.11 Cybercrime, 4.13.2 Industrial Espionage, 5.1 Regulation/Liability |
No |
U.S. Senate Committee on Judiciary | 2012-03-13 | The Freedom of Information Act: Safeguarding Critical Infrastructure Information and the Public’s Right to Know | U.S. Government Hearing | 3.3.1 Public Critical Infrastructure, 4.6 Information Sharing/Disclosure, 5.1 Regulation/Liability |
No |
U.S. Senate Committee on Judiciary (Subcommittee on Crime and Terrorism) | 2011-04-12 | Cyber Security: Responding to the Threat of Cyber Crime and Terrorism | U.S. Government Hearing | 4.11 Cybercrime, 5.1 Regulation/Liability |
No |
U.S. Senate Committee on Judiciary (Subcommittee on Crime and Terrorism) | 2011-06-21 | Cybersecurity: Evaluating the Administration’s Proposals | U.S. Government Hearing | 1. Overview, 5.1 Regulation/Liability, 5.3 Government Organizations |
No |
U.S. Senate Committee on Small Business and Entrepreneurship | 2011-07-25 | Role of Small Business in Strengthening Cybersecurity Efforts in the United States | U.S. Government Hearing | 4.2.2 Incentives, 4.7 public-Private Cooperation |
No |
United States Secret Service | 1909-06-27 | Insider Threat Study | Government Report | 3.3.2.2 Financial Institutions and Networks, 4.2.2 Incentives, 4.4 Usability/Human Factor |
Yes |
University of Southern California (USC) Information Sciences Institute, University of California Berkeley (UCB), McAfee Research | 2011-01-13 | Design of the DETER Security Testbed | Independent Report | 5.3 Government Organizations, 5.7 Technology |
No |
van Eeten, Michel J. G. | 1909-07-01 | Economics of Malware | Non-US Govt. Report | 4.2 Economics of Cybersecurity | Yes |
Varian, Hal | 1909-06-23 | Managing Online Security Risks | Newspaper Article | 4.2 Economics of Cybersecurity, 4.2.1 Risk Management and Investment |
Yes |
Varian, Hal | 1909-06-27 | System Reliability and Free Riding | Book Chapter | 4.2 Economics of Cybersecurity | Yes |
Verizon | 1909-07-03 | 2010 Data Breach Investigations Report | Industry Report | 3.3.2.2 Financial Institutions and networks, 4.11 Cybercrime, 5.2 Private Efforts/Organizations |
Yes |
Watts, Sean | 1909-07-03 | Combatant Status and Computer Network Attack | Law Review | 3.2.1 States, 4.12 Cyberwar, 5.5 International Law (including Laws of War) |
Yes |
White House | 2009 | Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure | Government Report | 1. Overview, 4.7 Public-Private Cooperation |
No |
White House | 2011-04 | National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy | Government Report | 4.7 Public-Private Cooperation, 4.9 Identity Management |
No |
White House | 2011-05 | International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World | Government Report | 1. Overview | No |
White House | 2012-01 | National Strategy for Global Supply Chain Security | Government Report | 4.3 Supply Chain Issues | No |
White House | 2012-02 | Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy | Government Report | 4.10 Privacy, 5.1 Regulation/Liability |
No |
White House | 1909-06-26 | The National Strategy to Secure Cyberspace | Government Report | 4.7 Public-Private Cooperation, 5.3 Government Organizations, 5.4 International Cooperations |
Yes |
White House | 1909-07-02 | Cyberspace Policy Review | Government Report | 4.7 Public-Private Cooperation, 5.2 Private Efforts/Organizations, 5.3 Government Organizations |
Yes |
White House | 1909-07-03 | The Comprehensive National Cybersecurity Initiative | Government Report | 3.3.1 Public Critical Infrastructure, 3.3.2 Private Critical Infrastructure, 5.3 Government Organizations |
Yes |
White House | 2010-12-16 | Designing A Digital Future: Federally Funded Research And Development In Networking And Information Technology | Government Report | 3.3.1 Public Critical Infrastructure, 4. Issues, 5. Approaches |
No |
White House | 2011-02-13 | Federal Cloud Computing Strategy | Government Report | 3.3.3.3 Cloud Computing, 5.3 Government Organizations, 5.7 Technology |
No |
White House | 2011-04-15 | Administration Releases Strategy to Protect Online Consumers and Support Innovation and Fact Sheet on National Strategy for Trusted Identities in Cyberspace | Government Report | 4.7 Public-Private Cooperation, 4.9 Identity Management, 5.3 Government Organizations |
No |
White House | 2011-04-15 | National Strategy for Trusted Identities in Cyberspace | Government Report | 4.7 Public-Private Cooperation, 4.9 Identity Management, 5.3 Government Organizations |
No |
White House (Office of Science & Technology Policy) | 2010-12-06 | Partnership for Cybersecurity Innovation | Government Report | 3.3.2.2 Financial Institutions and Networks, 4.7 Public-Private Cooperation, 5.3 Government Organizations |
No |
White House/Office of Management and Budget (OMB) | 2011-12-08 | Security Authorization of Information Systems in Cloud Computing Environments (FedRAMP) | Government Report | 3.3.3.3 Cloud Computing, 5.3 Government Organizations |
No |
White House/OMB | 2009-05-29 | Cyberspace Policy Review: Assuring a Trusted and Resilient Communications Infrastructure | Government Report | 4. Issues, 5. Approaches |
No |
White House/OMB | 2010-03-02 | Comprehensive National Cybersecurity Initiative (CNCI) | Government Report | 3.3.1 Public Critical Infrastructure, 5.3 Government Organizations, 5.7 Technology |
No |
White House/OMB | 2010-06-25 | The National Strategy for Trusted Identities in Cyberspace: Creating Options for Enhanced Online Security and Privacy | Government Report | 4.7 Public-Private Cooperation, 4.9 Identity Management, 5.3 Government Organizations |
No |
White House/OMB | 2010-07-06 | Clarifying Cybersecurity Responsibilities | Government Report | 5.3 Government Organizations | No |
White House/OMB | 2010-12-09 | 25 Point Implementation Plan to Reform Federal Information Technology Management | Government Report | 4.2 Economics of Cybersecurity, 5.3 Government Organizations, 5.7 Technology |
No |
White House/OMB | 2011-02-13 | Federal Cloud Computing Strategy | Government Report | 3.3.3.3 Cloud Computing, 5.3 Government Organizations, 5.7 Technology |
No |
White House/OMB | 2011-05-12 | Cybersecurity Legislative Proposal (Fact Sheet) | Government Report | 4. Issues, 5.3 Government Organizations |
No |
White House/OMB | 2011-05-16 | International Strategy for Cyberspace | Government Report | 4.6 Information Sharing/Disclosure, 5.3 Government Organizations, 5.4 International Cooperation |
No |
White House/OMB | 2011-09-14 | FY 2012 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Managementa | Government Report | 4.6 Information Sharing/Disclosure, 5.3 Government Organizations |
No |
White House/OMB | 2011-10-07 | Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information | Government Report | 3.3.1 Public Critical Infrastructure, 4.6 Information Sharing/Disclosure, 5.3 Government Organizations |
No |
White House/OMB | 2011-12-06 | Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program | Government Report | 5.3 Government Organizations, 5.7 Technology |
No |
Wilson, Clay CRS |
2007-03-20 | Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues | Government Report | 3.3 Security Targets, 4.12 Cyberwar |
No |
Zittrain, Jonathan L. | 1909-07-01 | The Future of the Internet and How To Stop It | Book | 4.4 Usability/Human Factors, 5.1 Regulation/Liability |
Yes |