Difference between revisions of "Communications"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 10: Line 10:
 
! style="background-color: #efefef;" | Expertise
 
! style="background-color: #efefef;" | Expertise
 
! style="background-color: #efefef;" class="unsortable" | Full Text   
 
! style="background-color: #efefef;" class="unsortable" | Full Text   
 +
|-
 +
|Anderson, Ross J.||||2008||[[Security Engineering]]||Book||Moderate:Technology; Moderate:Cryptography||N/A
 
|-
 
|-
 
|Department of Homeland Security||||2003||[[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]||Government Report||None||[http://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf  ''Pdf'']
 
|Department of Homeland Security||||2003||[[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]||Government Report||None||[http://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf  ''Pdf'']
 
|-
 
|-
 
|Deputy Chief of Staff for Intelligence||||2006||[[Critical Infrastructure Threats and Terrorism]]||Government Report||Low:Organizational Analysis; Low:Risk Management||[http://www.fas.org/irp/threat/terrorism/sup2.pdf  ''Pdf'']
 
|Deputy Chief of Staff for Intelligence||||2006||[[Critical Infrastructure Threats and Terrorism]]||Government Report||Low:Organizational Analysis; Low:Risk Management||[http://www.fas.org/irp/threat/terrorism/sup2.pdf  ''Pdf'']
 +
|-
 +
|Kramer, Franklin D., et. al||||2009||[[Cyberpower and National Security]]||Book||None||N/A
 
|-
 
|-
 
|National Cyber Defense Initiative||||2009||[[National Cyber Defense Financial Services Workshop Report]]||Independent Report||Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance||[http://www.cyber.st.dhs.gov/docs/NCDI_FI_Workshop_Report.pdf ''Pdf'']
 
|National Cyber Defense Initiative||||2009||[[National Cyber Defense Financial Services Workshop Report]]||Independent Report||Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance||[http://www.cyber.st.dhs.gov/docs/NCDI_FI_Workshop_Report.pdf ''Pdf'']
 +
|-
 +
|National Research Council||||1999||[[Trust in Cyberspace]]||Independent Reports||Moderate:Technology||[http://www.cyber.st.dhs.gov/docs/Trust%20in%20Cyberspace%20Report%201999.pdf ''Pdf'']
 +
|-
 +
|Independent Report||Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance||[http://www.cyber.st.dhs.gov/docs/NCDI_FI_Workshop_Report.pdf ''Pdf'']
 
|}
 
|}
  

Revision as of 14:13, 20 August 2010

TOC-> Threats and Actors-> Security Targets->Communications

Author 1 Author 2 Year Title Source Expertise Full Text
Anderson, Ross J. 2008 Security Engineering Book Moderate:Technology; Moderate:Cryptography N/A
Department of Homeland Security 2003 The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets Government Report None Pdf
Deputy Chief of Staff for Intelligence 2006 Critical Infrastructure Threats and Terrorism Government Report Low:Organizational Analysis; Low:Risk Management Pdf
Kramer, Franklin D., et. al 2009 Cyberpower and National Security Book None N/A
National Cyber Defense Initiative 2009 National Cyber Defense Financial Services Workshop Report Independent Report Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance Pdf
National Research Council 1999 Trust in Cyberspace Independent Reports Moderate:Technology Pdf
Independent Report Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance Pdf

Subcategories:

Jump to Table of Contents