Independent Reports: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
 
(22 intermediate revisions by the same user not shown)
Line 1: Line 1:
''[[Table of Contents | TOC->]][[Overview | Overview->]][[Independent Reports]]''
''[[Table of Contents | TOC->]][[Resource by Type | Resource by Type->]][[Independent Reports]]''


Center for Strategic and International Studies (2008) [[Securing Cyberspace for the 44th Presidency]]
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
|-
! style="background-color: #efefef;" | Organization
! style="background-color: #efefef;" | Year
! style="background-color: #efefef;" | Title
! style="background-color: #efefef;" | Source
! style="background-color: #efefef;" | Expertise
! style="background-color: #efefef;" class="unsortable" | Full Text 
|-
|Center for Strategic and International Studies||2008||[[Securing Cyberspace for the 44th Presidency]]||Independent Report||Low:Policy||[http://www.cyber.st.dhs.gov/docs/081208_securingcyberspace_44.pdf ''Pdf'']
|-
|Computing Research Association||2003||[[Four Grand Challenges in Trustworthy Computing]]||Independent Report||None||[http://www.cyber.st.dhs.gov/docs/CRA%20Grand%20Challenges%202003.pdf ''Pdf'']
|-
|Dörmann, Knut||2004||[[Applicability of the Additional Protocols to Computer Network Attacks]]||Independent Report||Low:Law||[http://www.icrc.org/Web/eng/siteeng0.nsf/htmlall/68LG92/$File/ApplicabilityofIHLtoCNA.pdf ''Pdf'']
|-
|Energetics Inc.||2006||[[Roadmap to Secure Control Systems in the Energy Sector]]||Independent Report||None||[http://www.cyber.st.dhs.gov/docs/DOE%20Roadmap%202006.pdf ''Pdf'']
|-
|Financial Services Sector Coordinating Council for Critical Infrastructure Protection||2008||[[Research Agenda for the Banking and Finance Sector]]||Independent Report||None||[http://www.cyber.st.dhs.gov/docs/RD_Agenda-FINAL.pdf ''Pdf'']
|-
|Institute for Information Infrastructure Protection||2003||[[Cyber Security Research and Development Agenda]]||Independent Report||Low/None:Technology||[http://www.cyber.st.dhs.gov/docs/I3P%20Research%20Agenda%202003.pdf ''Pdf'']
|-
|National Cyber Defense Initiative||2009||[[National Cyber Defense Financial Services Workshop Report]]||Independent Report||Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance||[http://www.cyber.st.dhs.gov/docs/NCDI_FI_Workshop_Report.pdf ''Pdf'']
|-
|National Research Council||2007||[[Toward a Safer and More Secure Cyberspace]]||Independent Report||Low:Research Processes; Low:Technology||[http://www.cyber.st.dhs.gov/docs/Toward_a_Safer_and_More_Secure_Cyberspace-Full_report.pdf ''Pdf'']
|-
|National Research Council||1999||[[Trust in Cyberspace]]||Independent Report||Moderate:Technology||[http://www.cyber.st.dhs.gov/docs/Trust%20in%20Cyberspace%20Report%201999.pdf ''Pdf'']
|}


Committee on Improving Cybersecurity Research in the United States, National Research Council ''(2007)'' [[Toward a Safer and More Secure Cyberspace]]
*'''''Subcategories:''''' ''None''


Committee on Information Systems Trustworthiness, National Research Council ''(1999)'' [[Trust in Cyberspace]]
''[[Table of Contents | Jump to Table of Contents]]''
 
Computing Research Association ''(2003)'' [[Four Grand Challenges in Trustworthy Computing]]
 
Energetics Inc., ''(2006)'' [[Roadmap to Secure Control Systems in the Energy Sector]]
 
Financial Services Sector Coordinating Council for Critical Infrastructure Protection ''(2008)'' [[Research Agenda for the Banking and Finance Sector]]
 
INFOSEC Research Council ''(2005)'' [[Hard Problem List]]
 
Institute for Information Infrastructure Protection ''(2003)'' [[Cyber Security Research and Development Agenda]]

Latest revision as of 16:31, 20 August 2010

TOC-> Resource by Type->Independent Reports

Organization Year Title Source Expertise Full Text
Center for Strategic and International Studies 2008 Securing Cyberspace for the 44th Presidency Independent Report Low:Policy Pdf
Computing Research Association 2003 Four Grand Challenges in Trustworthy Computing Independent Report None Pdf
Dörmann, Knut 2004 Applicability of the Additional Protocols to Computer Network Attacks Independent Report Low:Law Pdf
Energetics Inc. 2006 Roadmap to Secure Control Systems in the Energy Sector Independent Report None Pdf
Financial Services Sector Coordinating Council for Critical Infrastructure Protection 2008 Research Agenda for the Banking and Finance Sector Independent Report None Pdf
Institute for Information Infrastructure Protection 2003 Cyber Security Research and Development Agenda Independent Report Low/None:Technology Pdf
National Cyber Defense Initiative 2009 National Cyber Defense Financial Services Workshop Report Independent Report Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance Pdf
National Research Council 2007 Toward a Safer and More Secure Cyberspace Independent Report Low:Research Processes; Low:Technology Pdf
National Research Council 1999 Trust in Cyberspace Independent Report Moderate:Technology Pdf
  • Subcategories: None

Jump to Table of Contents