Difference between revisions of "Template:Filtered Table"

From Cybersecurity Wiki
Jump to: navigation, search
Line 8: Line 8:
 
| align="center" style="background:#f0f0f0;"|'''Category'''
 
| align="center" style="background:#f0f0f0;"|'''Category'''
 
|-
 
|-
| McAfee and the Security Defense Agenda||2012-02-12||[http://www.mcafee.com/us/resources/reports/rp-sda-cyber-security.pdf ""Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World""]||||
+
<noinclude>| McAfee and the Security Defense Agenda||2012-02-12||[http://www.mcafee.com/us/resources/reports/rp-sda-cyber-security.pdf ""Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World""]||||
 
|-
 
|-
 
| Business Roundtable||2012-10-11||[http://businessroundtable.org/uploads/studies-reports/downloads/2011_10_Mission_Critical_A_Public-Private_Strategy_for_Effective_Cybersecurity.pdf ""Mission Critical: A Public-Private Strategy for Effective Cybersecurity ""]||||
 
| Business Roundtable||2012-10-11||[http://businessroundtable.org/uploads/studies-reports/downloads/2011_10_Mission_Critical_A_Public-Private_Strategy_for_Effective_Cybersecurity.pdf ""Mission Critical: A Public-Private Strategy for Effective Cybersecurity ""]||||
Line 27: Line 27:
 
|-
 
|-
 
| Joint Workshop of the National Security Threats in Cyberspace and the National Strategy Forum ||2009-09-15||[http://nationalstrategy.com/Portals/0/National%20Security%20Threats%20in%20Cyberspace%20FINAL%2009-15-09.pdf  ""National Security Threats in Cyberspace ""]||||
 
| Joint Workshop of the National Security Threats in Cyberspace and the National Strategy Forum ||2009-09-15||[http://nationalstrategy.com/Portals/0/National%20Security%20Threats%20in%20Cyberspace%20FINAL%2009-15-09.pdf  ""National Security Threats in Cyberspace ""]||||
|-
+
|-</noinclude>
 
| GAO||2012-02-28||[http://www.csit.qub.ac.uk/media/pdf/Filetoupload,252359,en.pdf ""Cybersecurity: Challenges to Securing the Modernized Electricity Grid ""]||Government Report ||
 
| GAO||2012-02-28||[http://www.csit.qub.ac.uk/media/pdf/Filetoupload,252359,en.pdf ""Cybersecurity: Challenges to Securing the Modernized Electricity Grid ""]||Government Report ||
 
|-
 
|-
Line 162: Line 162:
 
| Massachusetts Institute of Technology (MIT) ||2011-12-05||[http://web.mit.edu/mitei/research/studies/the-electric-grid-2011.shtml ""The Future of the Electric Grid ""]||Independent Report||
 
| Massachusetts Institute of Technology (MIT) ||2011-12-05||[http://web.mit.edu/mitei/research/studies/the-electric-grid-2011.shtml ""The Future of the Electric Grid ""]||Independent Report||
 
|-
 
|-
| Federal Communications Commission (FCC) ||2011-06-03||[ftp://ftp.fcc.gov/pub/Daily_Releases/Daily_Business/2011/ db0610/DOC-307454A1.txt  ""FCC's Plan for Ensuring the Security of Telecommunications Networks""]||||
+
<noinclude>| Federal Communications Commission (FCC) ||2011-06-03||[ftp://ftp.fcc.gov/pub/Daily_Releases/Daily_Business/2011/ db0610/DOC-307454A1.txt  ""FCC's Plan for Ensuring the Security of Telecommunications Networks""]||||
 
|-
 
|-
 
| U.S. Army War College ||2011-05-09||[http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?pubid=10670 ""Cyber Infrastructure Protection ""]||||
 
| U.S. Army War College ||2011-05-09||[http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?pubid=10670 ""Cyber Infrastructure Protection ""]||||
Line 263: Line 263:
 
|-
 
|-
 
| National Security Initiative ||2010-10-18||[http://www.americansecuritychallenge.com/ ""American Security Challenge ""]||||
 
| National Security Initiative ||2010-10-18||[http://www.americansecuritychallenge.com/ ""American Security Challenge ""]||||
 
+
</noinclude>
 
|}
 
|}
 
<includeonly>[[Template:Filtered Table|Filtered Table Template]]</includeonly>
 
<includeonly>[[Template:Filtered Table|Filtered Table Template]]</includeonly>

Revision as of 16:13, 8 June 2012

Filtering for type: All Types

Author/Agency Date Title Type Category
McAfee and the Security Defense Agenda 2012-02-12 ""Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World""
Business Roundtable 2012-10-11 ""Mission Critical: A Public-Private Strategy for Effective Cybersecurity ""
Centre for Secure Information Technologies 2012-09-11 ""World Cybersecurity Technology Research Summit (Belfast 2011) ""
National Security Cyberspace Institute 2012-07-11 Analogies Whitepaper-K McKee.pdf ""A Review of Frequently Used Cyber Analogies ""
Center for a New American Security 2012-06-11 ""America’s Cyber Future: Security and Prosperity in the Information Age ""
European Network and Information Security Agency (ENISA) 2011-04-11 ""Resilience of the Internet Interconnection Ecosystem, at: ""
Business Software Alliance, Center for Democracy & Technology, U.S. Chamber of Commerce, Internet Security Alliance, Tech America 2011-03-08 ""Improving our Nation’s Cybersecurity through the Public-Private Partnership: a White Paper ""
CSIS Commission on Cybersecurity for the 44th Presidency, Center for Strategic and International Studies 2011-01 ""Cybersecurity Two Years Later ""
National Research Council 2010-09-21 ""Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop ""
Joint Workshop of the National Security Threats in Cyberspace and the National Strategy Forum 2009-09-15 ""National Security Threats in Cyberspace ""
GAO 2012-02-28 ""Cybersecurity: Challenges to Securing the Modernized Electricity Grid "" Government Report
GAO 2011-12-09 ""Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use "" Government Report
GAO 2011-11-29 ""Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination, at: "" Government Report
GAO 2011-10-17 ""Federal Chief Information Officers: Opportunities Exist to Improve Role in Information Technology Management "" Government Report
GAO 2011-10-05 ""Information Security: Additional Guidance Needed to Address Cloud Computing Concerns "" Government Report
GAO 2011-10-03 ""Information Security: Weaknesses Continue Amid New Federal Efforts to Implement Requirements "" Government Report
GAO 2011-10-17 ""Federal Chief Information Officers: Opportunities Exist to Improve Role in Information Technology Management "" Government Report
GAO 2011-07-29 ""Defense Department Cyber Efforts: Definitions, Focal Point, and Methodology Needed for DoD to Develop Full-Spectrum Cyberspace Budget Estimates "" Government Report
GAO 2011-07-26 ""Continued Attention Needed to Protect Our Nation’s Critical Infrastructure "" Government Report
GAO 2011-07-25 ""Defense Department Cyber Efforts: DoD Faces Challenges in Its Cyber Activities "" Government Report
GAO 2010-08-16 ""Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed "" Government Report
GAO 2011-07-08 ""Information Security: State Has Taken Steps to Implement a Continuous Monitoring Application, but Key Challenges Remain "" Government Report
GAO 2011-03-16 ""Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure and Federal Information Systems "" Government Report
GAO 2011-01-12 ""Electricity Grid Modernization: Progress Being Made on Cybersecurity Guidelines, but Key Challenges Remain to be Addressed "" Government Report
GAO 2010-11-30 ""Information Security: Federal Agencies Have Taken Steps to Secure Wireless Networks, but Further Actions Can Mitigate Risk "" Government Report
GAO 2010-10-06 ""Cyberspace Policy: Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed "" Government Report
GAO 2010-09-23 ""DHS Efforts to Assess and Promote Resiliency Are Evolving but Program Management Could Be Strengthened "" Government Report
GAO 2010-09-15 ""Information Security: Progress Made on Harmonizing Policies and Guidance for National Security and Non-National Security Systems "" Government Report
GAO 2010-08-02 ""United States Faces Challenges in Addressing Global Cybersecurity and Governance "" Government Report
GAO 2010-07-01 ""Federal Guidance Needed to Address Control Issues With Implementing Cloud Computing "" Government Report
GAO 2010-06-16 ""Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats "" Government Report
GAO 2010-03-24 ""Information Security: Concerted Response Needed to Resolve Persistent Weaknesses, at: "" Government Report
GAO 2010-03-16 ""Cybersecurity: Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats "" Government Report
GAO 2010-04-12 ""Concerted Effort Needed to Consolidate and Secure Internet Connections at Federal Agencies "" Government Report
GAO 2010-03-05 ""Cybersecurity: Progress Made But Challenges Remain in Defining and Coordinating the Comprehensive National Initiative "" Government Report
GAO 2009-11-17 ""Continued Efforts Are Needed to Protect Information Systems from Evolving Threats "" Government Report
GAO 2003-08-27 ""Efforts to Improve Information sharing Need to Be Strengthened "" Government Report
White House/OMB 2011-12-06 ""Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program "" Government Report
White House/OMB 2011-10-07 ""Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information "" Government Report
White House/OMB 2011-09-14 ""FY 2012 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Managementa "" Government Report
White House/OMB 2011-05-16 ""International Strategy for Cyberspace "" Government Report
White House/OMB 2011-05-12 ""Cybersecurity Legislative Proposal (Fact Sheet) "" Government Report
White House/OMB 2011-02-13 ""Federal Cloud Computing Strategy "" Government Report
White House/OMB 2010-12-09 ""25 Point Implementation Plan to Reform Federal Information Technology Management "" Government Report
White House/OMB 2010-07-06 ""Clarifying Cybersecurity Responsibilities "" Government Report
White House/OMB 2010-06-25 ""The National Strategy for Trusted Identities in Cyberspace: Creating Options for Enhanced Online Security and Privacy "" Government Report
White House/OMB 2010-03-02 ""Comprehensive National Cybersecurity Initiative (CNCI) "" Government Report
White House/OMB 2009-05-29 ""Cyberspace Policy Review: Assuring a Trusted and Resilient Communications Infrastructure "" Government Report
DOD 2012-02-16 ""DOD Information Security Program: Overview, Classification, and Declassification "" Government Report
General Accountability Office (GAO) 2011-07-29 ""Defense Department Cyber Efforts: Definitions, Focal Point, and Methodology Needed for DOD to Develop Full-Spectrum Cyberspace Budget Estimates "" Government Report
Secretary of the Air Force 2011-07-27 ""Legal Reviews of Weapons and Cyber Capabilities "" Government Report
DOD 2011-07-14 ""Department of Defense Strategy for Operating in Cyberspace "" Government Report
DOD 2011-04 ""Cyber Operations Personnel Report (DOD) "" Government Report
National Research Council, Committee for Advancing Software-Intensive Systems Producibility 2010-10-20 ""Critical Code: Software Producibility for Defense "" Government Report
U.S. Deputy Secretary of Defense, William J. Lynn (Foreign Affairs) 2010-009 ""Defending a New Domain "" Government Report
Quadrennial Defense Review 2010-07-30 ""The QDR in Perspective: Meeting AmericaÅfs National Security Needs In the 21st Century (QDR Final Report) "" Government Report
U.S. Air Force 2010-07-15 ""Cyberspace Operations: Air Force Doctrine Document 3-12 "" Government Report
U.S. Navy 2010-06-17 ""DON (Department of the Navy) Cybersecurity/Information Assurance Workforce Management, Oversight and Compliance "" Government Report
NIST 2012-02-17 ""Recommendations for Establishing an Identity Ecosystem Governance Structure for the National Strategy for Trusted Identities in Cyberspace "" Government Report
Department of Commerce 2011-06-14 ""Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace "" Government Report
White House 2011-04-15 ""Administration Releases Strategy to Protect Online Consumers and Support Innovation and Fact Sheet on National Strategy for Trusted Identities in Cyberspace "" Government Report
White House 2011-04-15 ""National Strategy for Trusted Identities in Cyberspace "" Government Report
Business Software Alliance 2012-02-02 ""Global Cloud Computing Scorecard a Blueprint for Economic Opportunity ""
General Services Administration (GSA) 2012-02-07 ""Concept of Operations: FedRAMP "" Government Report
Federal CIO Council 2012-01-04 ""Federal Risk and Authorization Management Program (FedRAMP) "" Government Report
White House/Office of Management and Budget (OMB) 2011-12-08 ""Security Authorization of Information Systems in Cloud Computing Environments (FedRAMP) "" Government Report
NIST 2011-12-01 ""U.S. Government Cloud Computing Technology Roadmap, Volume I, Release 1.0 (Draft). High-Priority Requirements to Further USG Agency Cloud Computing Adoption "" Government Report
NIST 2011-12-01 ""U.S. Government Cloud Computing Technology Roadmap, Release 1.0 (Draft), Volume II Useful Information for Cloud Adopters "" Government Report
GAO 2011-10-05 ""Information Security: Additional Guidance Needed to Address Cloud Computing Concerns "" Government Report
NIST 2011-09-01 ""Cloud Computing Reference Architecture "" Government Report
Software and Information Industry Association (SAII) 2011-07-26 ""Guide to Cloud Computing for Policy Makers "" Government Report
White House 2011-02-13 ""Federal Cloud Computing Strategy "" Government Report
Department of Energy, Office of Electricity Delivery & Energy Reliability 1899-12-30 ""Cybersecurity for Energy Delivery Systems Program "" Government Report
Organization for Economic Co-operation and Development (OECD) 2012-01-10 ""ICT Applications for the Smart Grid: Opportunities and Policy Implications "" Government Report
Department of Energy (DOE) Inspector General 2012-01-01 ""The Department’s Management of the Smart Grid Investment Grant Program "" Government Report
General Accountability Office (GAO) 2011-12-09 ""Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use "" Government Report
Massachusetts Institute of Technology (MIT) 2011-12-05 ""The Future of the Electric Grid "" Independent Report
Federal Communications Commission (FCC) 2011-06-03 db0610/DOC-307454A1.txt ""FCC's Plan for Ensuring the Security of Telecommunications Networks""
U.S. Army War College 2011-05-09 ""Cyber Infrastructure Protection ""
McAfee and Center for Strategic and International Studies (CSIS) 2011-04-21 ""In the Dark: Crucial Industries Confront Cyberattacks ""
General Accountability Office (GAO) 2011-03-16 ""Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure and Federal Information Systems ""
North American Electric Reliability Corp. (NERC) 2011-01-26 ""Federal Energy Regulatory Commission's Monitoring of Power Grid Cyber Security ""
General Accountability Office (GAO) 2011-01-12 ""Electricity Grid Modernization: Progress Being Made on Cybersecurity Guidelines, but Key Challenges Remain to be Addressed ""
White House (Office of Science & Technology Policy) 2010-12-06 ""Partnership for Cybersecurity Innovation ""
International Instrument Users Association (WIB) 2010-11-10 ""WIB Security Standard Released ""
Microsoft 2012-11-10 ""Information Security Management System for Microsoft Cloud Infrastructure ""
National Institute of Standards and Technology (NIST) 2010-09-02 ""NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines ""
General Accountability Office (GAO) 2010-07-15 ""Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed ""
Pew Research Center’s Internet & American Life Project 2010-06-11 ""The future of cloud computing ""
IEEE/EastWest Institute 2010-05-26 ""The Reliability of Global Undersea Communications Cable Infrastructure (The ROGUCCI Report) ""
Department of Energy, Idaho National Laboratory 2010-05-01 ""NSTB Assessments Summary Report: Common Industrial Control System Cyber Security Weaknesses ""
Federal Communications Commission (FCC) 2010-04-21 ""Explore the reliability and resiliency of commercial broadband communications networks ""
Cloud Security Alliance 2012-12-09 ""Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 "" Independent Report
U.S. Department of Energy, Infrastructure Security and Energy Restoration 2007-01-01 ""21 Steps to Improve Cyber Security of SCADA Networks ""
National Association of Secretaries of State 2012-01-12 ""Developing State Solutions to Business Identity Theft: Assistance, Prevention and Detection Efforts by Secretary of State Offices ""
RAND 2011-12-21 ""A Cyberworm that Knows No Boundaries ""
DOD 2011-11-15 ""Department of Defense Cyberspace Policy Report : A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934 ""
Symantec 2011-10-24 ""W32.Duqu: The Precursor to the Next Stuxnet ""
Journal of Strategic Studies 2011-10-05 ""Cyber War Will Not Take Place ""
McAfee 2011-08-02 ""Revealed: Operation Shady RAT: an Investigation Of Targeted Intrusions Into 70+ Global Companies, Governments, and Non-Profit Organizations During the Last 5 Years "" Industry Report
Threat Level Blog (Wired) 2010-12-27 ""A Four-Day Dive Into Stuxnet’s Heart "" Independent Report
Institute for Science and International Security 2010-12-22 ""Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant? Preliminary Assessment ""
Organisation for Economic Co-operation and Development (OECD) 2010-11-12 ""The Role of Internet Service Providers in Botnet Mitigation: an Empirical Analysis Bases on Spam Data ""
European Network and Information Security Agency 2010-10-07 ""Stuxnet Analysis ""
National Research Council 2010-10-05 ""Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy ""
Council on Foreign Relations 2010-07-15 ""Untangling Attribution: Moving to Accountability in Cyberspace [Testimony ""]
McAfee 2012-02-01 ""Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World "" industry Report
Booz Allen Hamilton and the Economist Intelligence Unit 2012-01-15 ""Cyber Power Index "" Industry Report
Office of the National Counterintelligence Executive 2011-11-03 ""Foreign Spies Stealing US Economic Secrets in Cyberspace "" Government Report
Cabinet Office (United Kingdom) 2012-11-11 ""The UK Cyber Security Strategy: Protecting and promoting the UK in a digital world "" Non-US Government Report
Cyber Security Forum Initiative 2011-05-09 ""Cyber Dawn: Libya ""
U.S. Army War College, Strategy Research Project 2011-03-24 ""China’s Cyber Power and America’s National Security "" Government Report
James Clapper, Director of National Intelligence 2011-02-10 ""Worldwide Threat Assessment of the U.S. Intelligence Community (Testimony) "" Government Report
EastWest Institute 2011-02-03 ""Working Towards Rules for Governing Cyber Conflict: Rendering the Geneva and Hague Conventions in Cyberspace ""
IEEE/EastWest Institute 2010-05-26 ""The Reliability of Global Undersea Communications Cable Infrastructure (The Rogucci Report) ""
International Telecommunications Union 2012-02-10 ""ITU Toolkit for Cybercrime Legislation ""
General Accountability Office (GAO) 2011-11-29 ""Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination "" Government Report
National Initiative for Cybersecurity Education (NICE) 2011-11-21 ""NICE Cybersecurity Workforce Framework ""
National Cyber Security Alliance and Microsoft 2011-05-13 ""2011 State of Cyberethics, Cybersafety and Cybersecurity Curriculum in the U.S. Survey ""
Department of Defense 2012-04-11 ""Cyber Operations Personnel Report (DoD) "" Government Report
University of Southern California (USC) Information Sciences Institute, University of California Berkeley (UCB), McAfee Research 2011-01-13 ""Design of the DETER Security Testbed "" Independent Report
Project on National Security Reform (PNSR) 2012-11-10 ""The Power of People: Building an Integrated National Security Professional System for the 21st Century ""
National Science Foundation (NSF) 2012-01-17 ""Information Security Risk Taking ""
NSF 2011-08-11 ""At the Forefront of Cyber Security Research ""
White House 2010-12-16 ""Designing A Digital Future: Federally Funded Research And Development In Networking And Information Technology "" Government Report
White House Office of Science and Technology Policy 2010-12-06 ""Partnership for Cybersecurity Innovation "" Government Report
Mitre Corp (JASON Program Office) 2012-11-10 ""Science of Cyber-Security ""
National Security Initiative 2010-10-18 ""American Security Challenge ""