Difference between revisions of "Public Critical Infrastructure"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 6: Line 6:
  
 
Department of Defense (2007) [[Mission Impact of Foreign Influence on DoD Software]]
 
Department of Defense (2007) [[Mission Impact of Foreign Influence on DoD Software]]
 
Department of Homeland Security (2003) [[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]
 
  
 
Deputy Chief of Staff for Intelligence (2006) [[Critical Infrastructure Threats and Terrorism]]
 
Deputy Chief of Staff for Intelligence (2006) [[Critical Infrastructure Threats and Terrorism]]
Line 30: Line 28:
 
|-
 
|-
 
|Department of Homeland Security||||2009||[[A Roadmap for Cybersecurity Research]]||Government Report||Low:Technology||[http://www.cyber.st.dhs.gov/docs/DHS-Cybersecurity-Roadmap.pdf ''Pdf'']
 
|Department of Homeland Security||||2009||[[A Roadmap for Cybersecurity Research]]||Government Report||Low:Technology||[http://www.cyber.st.dhs.gov/docs/DHS-Cybersecurity-Roadmap.pdf ''Pdf'']
 +
|-
 +
|Department of Homeland Security||||2003||[[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]||Government Report||None||[http://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf  ''Pdf'']
 
|}
 
|}
  

Revision as of 15:21, 11 August 2010