User contributions for Shane
Jump to navigation
Jump to search
4 June 2010
- 11:1811:18, 4 June 2010 diff hist −533 Trust in Cyberspace No edit summary
- 11:1711:17, 4 June 2010 diff hist −9 Trust in Cyberspace No edit summary
- 11:1711:17, 4 June 2010 diff hist +1,805 Trust in Cyberspace No edit summary
- 11:1411:14, 4 June 2010 diff hist +466 N Trust in Cyberspace New page: ==Trust in Cyberspace== ==Full Citation== Fred B. Schneider (Ed.) 1999: Washington, DC: National Academy Press. [http://www.cyber.st.dhs.gov/docs/Trust%20in%20Cyberspace%20Report%201999....
- 11:0411:04, 4 June 2010 diff hist +544 N Cyber Security Research and Development Agenda New page: ==Cyber Security Research and Development Agenda== ==Full Citation== Institute for Information Infrastructure Protection (2003): Cyber Security Research and Development Agenda. U.S. Gove...
- 11:0111:01, 4 June 2010 diff hist +536 N The National Strategy to Secure Cyberspace New page: ==The National Strategy to Secure Cyberspace== ==Full Citation== Executive Office of the President of the United States (2003): The National Strategy to Secure Cyberspace. U.S. Governmen...
- 10:5710:57, 4 June 2010 diff hist −98 Four Grand Challenges in Trustworthy Computing No edit summary
- 10:5610:56, 4 June 2010 diff hist +736 N Four Grand Challenges in Trustworthy Computing New page: ==Four Grand Challenges in Trustworthy Computing: Second in a Series of Conferences on Grand Research Challenges in Computer Science and Engineering== ==Full Citation== National Cyber Se...
- 10:5410:54, 4 June 2010 diff hist −56 Hardening The Internet No edit summary
- 10:5310:53, 4 June 2010 diff hist +583 N Information Security Governance New page: ==Information Security Governance: A Call to Action== ==Full Citation== National Cyber Security Summit Task Force (2004): Information Security Governance. A Call to Action. U.S. Governme...
- 10:5010:50, 4 June 2010 diff hist +539 N Hardening The Internet New page: ==Hardening The Internet== ==Full Citation== National Infrastructure Advisory Council (2004): Hardening The Internet. U.S. Government. Online Paper. [http://cyber.law.harvard.edu/cyberse...
- 10:4510:45, 4 June 2010 diff hist +607 N Insider Threat Study New page: ==Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector== ==Full Citation== United States Secret Service, Computer Emergency Response Team (2004): Insider Threat...
- 10:4210:42, 4 June 2010 diff hist −76 Government Reports and Documents No edit summary
- 10:4110:41, 4 June 2010 diff hist +529 N Cyber Security: A Crisis of Prioritization New page: ==Cyber Security: A Crisis of Prioritization== ==Full Citation== President's Information Technology Advisory Council (2005): Cyber Security. A Crisis of Prioritization. U.S. Government. ...
3 June 2010
- 13:3213:32, 3 June 2010 diff hist +458 N Hard Problem List New page: ==Hard Problem List== ==Full Citation== INFOSEC Research Council (2005): Hard Problem List. U.S. Government. Online Paper. [http://www.cyber.st.dhs.gov/docs/IRC_Hard_Problem_List.pdf '...
- 13:2813:28, 3 June 2010 diff hist +512 N Roadmap to Secure Control Systems in the Energy Sector New page: ==Roadmap to Secure Control Systems in the Energy Sector== ==Full Citation== Department of Energy (2006): Roadmap to Secure Control Systems in the Energy Sector. U.S. Government. Online ...
2 June 2010
- 14:5614:56, 2 June 2010 diff hist +1,727 N Federal Plan for Cyber Security and Information Assurance Research and Development New page: ==Federal Plan for Cyber Security and Information Assurance Research and Development== ==Full Citation== National Science, Technology Council: Federal Plan for Cyber Security and Informa...
- 14:2814:28, 2 June 2010 diff hist −1 SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security No edit summary
- 14:2614:26, 2 June 2010 diff hist +1 SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security No edit summary
- 14:2614:26, 2 June 2010 diff hist −161 SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security No edit summary
- 14:2514:25, 2 June 2010 diff hist +1,071 N SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security New page: http://www.cyber.st.dhs.gov/docs/NIST%20Guide%20to%20Supervisory%20and%20Data%20Acquisition-SCADA%20and%20Industrial%20Control%20Systems%20Security%20(2007).pdf ==SP 800-82: Guide to Supe...
- 11:4911:49, 2 June 2010 diff hist −20 The Economics of Online Crime No edit summary
- 11:4911:49, 2 June 2010 diff hist −1 Economics of Cybersecurity No edit summary
- 11:4711:47, 2 June 2010 diff hist +723 N Is Cybersecurity a Public Good New page: ==Is Cybersecurity a Public Good? Evidence from the Financial Services Industry== ==Full Citation== Benjamin Powell, ''Is Cybersecurity a Public Good? Evidence from the Financial Service...
- 11:4211:42, 2 June 2010 diff hist +67 Economics of Cybersecurity No edit summary
- 10:5510:55, 2 June 2010 diff hist +2 Toward a Safer and More Secure Cyberspace No edit summary
- 10:5210:52, 2 June 2010 diff hist +1,204 N Mission Impact of Foreign Influence on DoD Software New page: ==Report of the Defense Science Board Task Force on Mission Impact of Foreign Influence on DoD Software== ==Full Citation== Defense Science Board Task force Department of Defense (2007):...
- 10:5110:51, 2 June 2010 diff hist −50 Government Reports and Documents No edit summary
- 10:4710:47, 2 June 2010 diff hist +1,204 N Report of the Defense Science Board Task Force on Mission Impact of Foreign Influence on DoD Software New page: ==Report of the Defense Science Board Task Force on Mission Impact of Foreign Influence on DoD Software== ==Full Citation== Defense Science Board Task force Department of Defense (2007):... current
- 10:3710:37, 2 June 2010 diff hist +1,786 N Toward a Safer and More Secure Cyberspace New page: ==Toward a Safer and More Secure Cyberspace== ==Full Citation== Financial Services Sector Coordinating Council for Critical Infrastructure Protection, Homeland Security Research, Develop...
1 June 2010
- 08:4308:43, 1 June 2010 diff hist +1,832 N Research Agenda for the Banking and Finance Sector New page: ==Research Agenda for the Banking and Finance Sector== ==Full Citation== Financial Services Sector Coordinating Council for Critical Infrastructure Protection, Homeland Security Research...
29 May 2010
- 12:2912:29, 29 May 2010 diff hist +1,281 N Securing Cyberspace for the 44th Presidency New page: ==Securing Cyberspace for the 44th Presidency== ==Full Citation== Center for Strategic, International Studies (2008): Securing Cyberspace for the 44th Presidency. U.S. Government. Online...
- 12:1312:13, 29 May 2010 diff hist +2,121 N Cyberspace Policy Review New page: ==National Cyber Defense Financial Services Workshop Report== ==Full Citation== Executive Office of the President of The United States (2009): Cyberspace Policy Review. Assuring a Truste...
- 11:5611:56, 29 May 2010 diff hist −12 Government Reports and Documents No edit summary
- 11:5211:52, 29 May 2010 diff hist +3,258 N National Cyber Leap Year Summit 2009, Co-Chairs' Report New page: ==National Cyber Leap Year Summit 2009, Co-Chairs' Report== ==Full Citation== Networking and Information Technology Research and Development (2009): National Cyber Leap Year Summit 2009....
- 11:1211:12, 29 May 2010 diff hist +1,841 N National Cyber Defense Financial Services Workshop Report New page: ==National Cyber Defense Financial Services Workshop Report== ==Full Citation== O. Sami Saydjari, Salvatore J. Stolfo, Dan Schutzer (Ed.) (2009): National Cyber Defense Financial Service...
27 May 2010
- 16:0416:04, 27 May 2010 diff hist +950 N The Comprehensive National Cybersecurity Initiative New page: ==The Comprehensive National Cybersecurity Initiative== ==Full Citation== Executive Office of the President of The United States (2010): The Comprehensive National Cybersecurity Initiati...
- 15:4015:40, 27 May 2010 diff hist −64 A Roadmap for Cybersecurity Research No edit summary
- 15:3915:39, 27 May 2010 diff hist +12 A Roadmap for Cybersecurity Research No edit summary
- 15:3815:38, 27 May 2010 diff hist 0 A Roadmap for Cybersecurity Research No edit summary
- 15:3815:38, 27 May 2010 diff hist +911 A Roadmap for Cybersecurity Research No edit summary
- 15:1515:15, 27 May 2010 diff hist −507 Government Reports and Documents No edit summary
- 15:1515:15, 27 May 2010 diff hist +12 A Roadmap for Cybersecurity Research No edit summary
- 15:1315:13, 27 May 2010 diff hist 0 A Roadmap for Cybersecurity Research No edit summary
- 15:1315:13, 27 May 2010 diff hist +7 A Roadmap for Cybersecurity Research No edit summary
- 15:1215:12, 27 May 2010 diff hist +194 A Roadmap for Cybersecurity Research No edit summary
- 14:4914:49, 27 May 2010 diff hist +525 N A Roadmap for Cybersecurity Research New page: ==A Roadmap for Cybersecurity Research== ==Full Citation== ''Bluebook Style'' Article in Journal: John Maynard Smith, ''The Origin of Altruism,'' 639 Nature 393 (1998). [URL_of_Article...
- 14:3514:35, 27 May 2010 diff hist +2,130 Government Reports and Documents No edit summary
- 13:3013:30, 27 May 2010 diff hist +14 N Government Reports and Documents New page: First page
- 09:2509:25, 27 May 2010 diff hist +1 Main Page No edit summary