Difference between revisions of "Government Reports and Documents"

From Cybersecurity Wiki
Jump to navigation Jump to search
(New page: First page)
 
Line 1: Line 1:
First [[page]]
+
DHS S&T ''(2009)'' [[A Roadmap for Cybersecurity Research]]
 +
 
 +
White House ''(2010)'' [[The Comprehensive National Cybersecurity Initiative]]
 +
 
 +
NCDI ''(2009)'' [[National Cyber Defense Financial Services Workshop Report]]
 +
 
 +
NITRD ''(2009)'' [[National Cyber Leap Year Summit 2009, Co-Chairs' Report]]
 +
 
 +
White House ''(2009)'' [[White House Cyberspace Policy Review]]
 +
 
 +
CSIS  ''(2008)'' [[Securing Cyberspace for the 44th Presidency]]
 +
 
 +
FSSCC ''(2008)'' [[Research Agenda for the Banking and Finance Sector]]
 +
 
 +
DHS S&T ''(2009)'' [[A Roadmap for Cybersecurity Research]]
 +
 
 +
White House ''(2010)'' [[The Comprehensive National Cybersecurity Initiative]]
 +
 
 +
NCDI ''(2009)'' [[National Cyber Defense Financial Services Workshop Report]]
 +
 
 +
NITRD ''(2009)'' [[National Cyber Leap Year Summit 2009, Co-Chairs' Report]]
 +
 
 +
White House ''(2009)'' [[White House Cyberspace Policy Review]]
 +
 
 +
CSIS ''(2008)'' [[Securing Cyberspace for the 44th Presidency]]
 +
 
 +
FSSCC ''(2008)'' [[Research Agenda for the Banking and Finance Sector]]
 +
 
 +
DoD ''(2007)'' [[Report of the Defense Science Board Task Force on Mission Impact of Foreign Influence on DoD Software]]
 +
 
 +
NRC ''(2007)'' [[Toward a Safer and More Secure Cyberspace]]
 +
 
 +
NIST ''(2006)'' [[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]
 +
 
 +
NSTC ''(2006)'' [[Federal Plan for Cyber Security and Information Assurance Research and Development]]
 +
 
 +
DOE ''(2006)'' [[Roadmap to Secure Control Systems in the Energy Sector]]
 +
 
 +
IRC ''(2005)'' [[Hard Problem List]]
 +
 
 +
PITAC ''(2005)'' [[Cyber Security: A Crisis of Prioritization]]
 +
 
 +
USSS ''(2004)'' [[Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector]]
 +
 
 +
NIAC ''(2004)'' [[Hardening The Internet]]
 +
 
 +
Empty ''(2004)'' [[Information Security Governance: A Call to Action]]
 +
 
 +
CRA ''(2003)'' [[Four Grand Challenges in Trustworthy Computing]]
 +
 
 +
White House ''(2003)'' [[The National Strategy to Secure Cyberspace]]
 +
 
 +
I3P ''(2003)'' [[Cyber Security Research and Development Agenda]]
 +
 
 +
NRC ''(1999)'' [[Trust in Cyberspace]]
 +
 
 +
PCCIP ''(1997)'' [[Critical Foundations: Protecting America's Infrastructures]]

Revision as of 19:35, 27 May 2010

DHS S&T (2009) A Roadmap for Cybersecurity Research

White House (2010) The Comprehensive National Cybersecurity Initiative

NCDI (2009) National Cyber Defense Financial Services Workshop Report

NITRD (2009) National Cyber Leap Year Summit 2009, Co-Chairs' Report

White House (2009) White House Cyberspace Policy Review

CSIS (2008) Securing Cyberspace for the 44th Presidency

FSSCC (2008) Research Agenda for the Banking and Finance Sector

DHS S&T (2009) A Roadmap for Cybersecurity Research

White House (2010) The Comprehensive National Cybersecurity Initiative

NCDI (2009) National Cyber Defense Financial Services Workshop Report

NITRD (2009) National Cyber Leap Year Summit 2009, Co-Chairs' Report

White House (2009) White House Cyberspace Policy Review

CSIS (2008) Securing Cyberspace for the 44th Presidency

FSSCC (2008) Research Agenda for the Banking and Finance Sector

DoD (2007) Report of the Defense Science Board Task Force on Mission Impact of Foreign Influence on DoD Software

NRC (2007) Toward a Safer and More Secure Cyberspace

NIST (2006) SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security

NSTC (2006) Federal Plan for Cyber Security and Information Assurance Research and Development

DOE (2006) Roadmap to Secure Control Systems in the Energy Sector

IRC (2005) Hard Problem List

PITAC (2005) Cyber Security: A Crisis of Prioritization

USSS (2004) Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector

NIAC (2004) Hardening The Internet

Empty (2004) Information Security Governance: A Call to Action

CRA (2003) Four Grand Challenges in Trustworthy Computing

White House (2003) The National Strategy to Secure Cyberspace

I3P (2003) Cyber Security Research and Development Agenda

NRC (1999) Trust in Cyberspace

PCCIP (1997) Critical Foundations: Protecting America's Infrastructures