|
|
|
|
Cyber Reference Library
-
ICS-CERT Incident Response Summary Report; Industrial Control Systems Cyber Emergency Response Team; July 2012
-
Cloud Computing Strategy; Department of Defense; July 2012
-
Report: World Cyber Security Technology Research Summit; Centre for Secure Information Technologies; July 2012
-
The Threat from Flamer; European Network and Information Security Agency; June 2012
-
Department of Defense Mobile Device Strategy; Department of Defense; June 8, 2012
-
Smart Grid Security; European Network and Information Security Agency; July 1, 2012
-
Letter from top security guys to Senators Reid and McConnell; June 6, 2012
-
National Cyber Security Strategies; European Network and Information Security Agency; May 2012
-
McAfee Threats Report: First Quarter 2012; McAfee; May 2012
-
The Impact of Cybercrime on Business; Ponemon Institute; May 2012
-
2011 Internet Crime Report; Internet Crime Complaint Center; May 2012
-
Electricity Subsector: Cybersecurity Capability Maturity Model; Department of Energy; May 31, 2012
-
Industry Affirms Commitment to Collaborative Effort to Combat Botnets; Industry Botnet Group; May 30, 2012
-
Attack Surface: Healthcare and Public Health Sector; National Cybersecurity and Communications Integration Center; May 4, 2012
-
2012 Data Breach Investigations Report; Verizon; April 2012
-
Enabling Distributed Security in Cyberspace; Department of Homeland Security; March 23, 2012
-
Cybersecurity and U.S.-China Relations; Brookings, February 2012
-
NATO’s Cyber Capabilities: Yesterday, Today, and Tomorrow; Atlantic Council, February 2012
-
2012 Threats Predictions; ; McAfee; January 2012
-
Cyber-security: The vexed question of global rules; McAfee, January 2012
-
Network Information Security in Education; European Network and Information Security Agency, January 2012
-
National Strategy for Global Supply Chain Security; Executive Office of the President, January 2012
-
Network Information Security in Education; ; European Network and Information Security Agency; December 2011
-
Trustworty Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program; Executive Office of the President, National Science and Technology Council, December 2011
-
Cyber Security Aspects in the Maritime Sector; European Network and Information Security Agency, November 2011
-
Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise; Department of Homeland Security, November 2011
-
Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program; National Science and Technology Council, December 2011
-
Joint Targeting in Cyberspace; Maj Steven J. Smart, USAF; Air and Space Power Journal, Winter 2011
-
CYBERSECURITY HUMAN CAPITAL: Initiatives Need Better Planning and Coordination; GAO; November 2011
-
The UK Cyber Security Strategy; Cabinet Office; November 25, 2011
-
The Chinese People’s Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructure; Project 2049 Institute: Mark A. Stokes, Jenny Lin and L.C. Russell Hsiao; November 11, 2011
-
Cyber Science and Technology Priority Steering Council Research Roadmap; Steven E. King; November 8, 2011
-
Department of Defense Cyberspace Policy Report; Department of Defense; November 2011
-
Foreign pies Stealing U.S. Economic Secrets in Cyberspace; United States Office of the Counterintelligence Executive, October 2011
-
Internet Trends 2011; Mary Meeker; KPCB; October 18, 2011
-
Recommendations of the House Republican Cybersecurity Task Force; October 2011
-
Information Security: Weaknesses Continue Amid New Federal Efforts to Implement Requirements; GAO; October 2011
-
Cyber Intelligence...setting the landscape for an emerging discipline; Intelligence and National Security Alliance; September 2011
-
Defending the networks: The NATO Policy on Cyber Defence; ; NATO; September 2011
-
Cyber Events Since 2006; Center for Strategic and International Studies (CSIS); James Andrew Lewis; Updated September 9, 2011
-
A Briefing on DOD’s Cyber Organization and Challenges, GAO-11-75; GAO; August 30, 2011
-
National Initiative for Cybersecurity Education Strategic Plan: Building a Digital Nation (DRAFT); NIST; August 11, 2011
-
On Cyber Peace; Atlantic Council; Les Bloom and John Savage; August 8, 2011
-
Cyber Security Strategy of the Czech Republic for the 2011 - 2015 Period; August 2011
-
Mobilizing for International Action; EastWest Institute; August 3, 2011
-
Defense Department Cyber Efforts: Definitions, Focal Point, and Methodology Needed for DOD to Develop Full-Spectrum Cyberspace Budget Estimates; Government Accounting Office; July 29, 2011
-
State Has Taken Steps to Implement a Continuous Monitoring Application, but Key Challenges Remain; Government Accounting Office; July 2011
-
Defense Department Cyber Efforts: DOD Faces Challenges In Its Cyber Activities; GAO; July 25, 2011
-
Department of Defense Strategy for Operating in Cyberspace ;Department of Defense; July 2011
-
The Underground Economy of Fake Antivirus Software ; Stone-Gross, Ryan Abman Richard A. Kemmerer, Christopher Kruegel, Douglas G. Steigerwald, and Giovanni Vigna; University of California at Santa Barbara; July 2011
-
Cybersecurity, Innovation, and the Internet Economy ;Department of Commerce Internet Policy Task Force; June 2011
-
Cybersecurity Proposed Legislation; The White House; May 12, 2011
-
International Strategy for Cyberspace; The White House; May, 2011
-
Defense Department Cyber Efforts: More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities; United States Government Accountability Office; May, 2011
-
2011 State of Cyberethics, Cybersafety and Cybersecurity Curriculum in the U.S. Survey; National Cyber Security Alliance; May, 2011
-
Retaliatory Deterrence in Cyberspace; Strategic Studies Quarterly; Eric Sterner; Spring 2011
-
Offensive Threat Modeling for Attackers: Turning Threat Modeling on its Head; ; Rafal Los and Shane MacDougall; May 2011
-
Computer Network Incident Response and Reporting; Air Force Audit Agency; April 20, 2011
-
DoD Cyber Operations Personnel Report ;Department of Defense; April, 2011
-
Russia-U.S. Bi-lateral on Cybersecurity: Critical Terminology Foundations ; EastWest Institute; April, 2011
-
National Strategy for Trusted Identities in Cyberspace; The White House; April, 2011
-
Enabling Distributed Security in Cyberspace: Building a Healthy and Resilient Cyber Ecosystem with Automated Collective Action; Department of Homeland Security; March 23, 2011
-
PRINCIPLES OF WAR FOR CYBERSPACE; Steven E. Cahanin, Lt Col, USAF; January 15, 2011
-
Cybersecurity Two Years Later; Center for Strategic & International Studies; January, 2011
-
Assessing Cyber Supply Chain Security Vulnerabilities Within the U.S. Critical Infrastructure; Enterprise Strategy Group; November, 2010
-
2010 Report to Congress of the US-China Economic and Security Review Commission ; November, 2010
-
Joint Terminology for Cyberspace Operations ; Joint Staff; November, 2010
-
On Cyber Warfare ; A Chatham House Report: Paul Cornish, David Livingstone, Dave Clemente and Claire York; November, 2010
-
Memorandum of Agreement Between the Department of Homeland Security and Department of Defense Regarding Cybersecurity ; Janet Napolitano and Robert Gates; October 13, 2010
-
Cyberspace Policy: Executive Branch Is Making Progress Implementing 2009 Policy Recommendations, but Sustained Leadership Is Needed ; October 6, 2010
-
Cyber Deterrence: Tougher in Theory than in Practice? ; Will Goodman; Strategic Studies Quarterly; Fall 2010
-
Cyberwarfare and Its Damaging Effects on Citizens ; Stefano Mele; September, 2010
-
Made in China: Waking Up to U.S. National Security Cyberthreats; The Asymmetric Net; September, 2010
-
Vice Admiral Bernard J. McCullough, III, USN (Commander, U.S. Fleet Cyber Command, U.S. 10th Fleet); Testimony to The Terrorism, Unconventional Threats, and Capabilities Subcommittee on Operating in the Digital Domain: Organizing the Military Departments for Cyber Operations; September 23, 2010
-
Lieutenant General George J. Flynn, USMC (Deputy Commandant for Combat Development and Integration) ; Testimony to The Terrorism, Unconventional Threats, and Capabilities Subcommittee on Operating in the Digital Domain: Organizing the Military Departments for Cyber Operations; September 23, 2010
-
Major General Rhett Hernandez, USA (Assistant Deputy Chief of Staff) ; Testimony to The Terrorism, Unconventional Threats, and Capabilities Subcommittee on Operating in the Digital Domain: Organizing the Military Departments for Cyber Operations; September 23, 2010
-
Major General Richard Webber, USAF (Commander, 24th Air Force and Air Force Network Operations) ; Testimony to The Terrorism, Unconventional Threats, and Capabilities Subcommittee on Operating in the Digital Domain: Organizing the Military Departments for Cyber Operations; September 23, 2010
-
General Keith B. Alexander, USA (Commander, U.S. Cyber Command) ; Testimony to the House Armed Services Committee on U.S. Cyber Command: Organizing for Cyberspace Operations; September 23, 2010
-
Cyberspace Operations: Air Force Doctrine Document 3-12; United States Air Force (July 15, 2010)
-
United States Faces Challenges in Addressing Global Cybersecurity and Governance ; GAO (July 2010)
-
A Human Capital Crisis in Cybersecurity ; CSIS (July 2010)
-
Executive Cyberspace Authorities Act of 2010 (HR 5247 IH) (May 6, 2010)
-
Advance Questions (and answers) for Lt Gen Alexander (Nominee for Commander, USCYBERCOM) (May 2010)
-
Navy Vision for Information Dominance (May 2010)
-
Net Generation: Preparing for Change in the Federal Information Technology Workforce; IT Workforce Committee (April 13, 2010)
-
Cyber Vision and Cyber Force Development; Dr. Kamal Jabbour (March 2010)
-
Cybersecurity: Preventing Terrorist Attacks and Protecting Privacy in Cyberspace; Testimony to Senate Judiciary Committee Subcommittee on Terrorism and Homeland Security (November 17, 2009)
-
The United States Air Force Blueprint for Cyberspace; Air Force Space Command (November 2, 2009)
-
A Roadmap for Cybersecurity Research; Department of Homeland Security (November 2009)
-
More Security, Less Waste: What Makes Sense For Our Federal Cyber Defense?; Testimony to Senate Committee on Homeland Security & Governmental Affairs: Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security (October 29, 2009)
-
Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation; Prepared by Northrop Grumman Corporation for US-China Economic and Security Review Commission (October 9, 2009)
-
Integrating Disciplines: Cyber Security, Law, & Policy; Georgetown University (October 1, 2009)
-
Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress; Congressional Research Service: Catherine A. Theohary, John Rollins (September 30, 2009)
-
Cyber Attacks: Protecting Industry Against Growing Threats; Testimony to Senate Committee on Homeland Security & Governmental Affairs (September 14, 2009)
-
Air Force Cyberspace Mission Alignment; Secretary of the Air Force (August 20, 2009)
-
Information Warfare: Assuring Digital Intelligence Collection; William G. Perry (July, 2009)
-
Establishment of a Subordinate Unified U.S. Cyber Command Under U.S. Strategic Command for Military Cyberspace Operations; Secretary of Defense (June 23, 2009)
-
Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure; Melissa Hathaway (May 2009)
-
Cyber Security: Developing a National Strategy; Testimony to Senate Committee on Homeland Security & Governmental Affairs (April 28, 2009)
-
2009 Data Breach Investigations Report; Verizon Business RISK Team (April 21, 2009)
-
Critical Issues for Cyber Assurance Policy Reform: An Industry Assessment; Intelligence and National Security Alliance (April 2009)
-
Cybersecurity - Assessing Our Vulnerabilities and Developing an Effective Response; Testimony to Senate Committee on Homeland Security & Governmental Affairs (March 19, 2009)
-
Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations; Congressional Research Service: John Rollins, Anna C. Henning (March 10, 2009)
-
Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities; National Academies Press: National Research Council of the National Academies; William A. Owens, Kenneth W. Dam, and Herbert S. Lin (2009)
-
Securing Cyberspace for the 44th Presidency; CSIS Commission on Cybersecurity for the 44th Presidency (December 2008)
-
HPSCI White Paper on Cyber Security (December 2008)
-
China's Electronic Long Range Reconnaissance; Timothy L. Thomas (Military Review Nov-Dec 2008)
-
Cyber Attacks Against Georgia: Legal Lessons Identified; Cooperative Cyber Defence Center of Excellence (November 2008)
-
Remarks by the Director of National Intelligence; Mr. Mike McConnel (Nov 2008)
-
Emerging Cyber Threats Report 2009: Data, Mobility and Questions of Responsibility Will Drive Cyber Threats in 2009 and Beyond; Georgia Tech Information Security Center (October 2008)
-
Cyber Threat to Critical Infrastructure 2010 - 2015; Peter D. Gasper (September 2008)
-
Does EW + CNO = Cyber; Lt Col Jesse Bourque (September 2008)
-
Cyber Storm II National Cyber Security Exercise Final Report; Australian Government; August 2008
-
Defense Imperatives for the New Administration; Defense Science Board (August 2008)
-
Cyberspace and the Changing Nature of Warfare; Kenneth Geers, U.S. Representative Cooperative Cyber Defence Centre of Excellence; Tallinn, Estonia
-
CYBER ANALYSIS AND WARNING; GAO (July 2008)
-
CHINA'S PROLIFERATION PRACTICES, AND THE DEVELOPMENT OF ITS CYBER AND SPACE WARFARE CAPABILITIES; HEARING BEFORE THE U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION ONE HUNDRED TENTH CONGRESS SECOND SESSION (May 20, 2008)
-
Statement of Franklin D. Kramer before the House Armed Services Committee Subcommittee on Terrorism and Unconventional Threats (April 1, 2008)
-
CYBERSPACE DOMAIN: A WARFIGHTING SUBSTANTIATED OPERATIONAL ENVIRONMENT IMPERATIVE; COLONEL OLEN L. KELLEY (March 15, 2008)
-
Determining Communication Shortfalls for Homeland Defense; MAJ Kevin P. Wilson; Strategic Insights (December 2007)
-
Information Warfare: An Emerging and Preferred Tool of the People's Republic of China ; Dr. William G. Perry; The Center for Security Policy; October 2010
-
CRS Spyware: Background and Policy Issues for Congress; Updated September 26, 2007
-
Flying and Fighting in Cyberspace; Sebastian M. Convertino II, Lou Anne DeMattei, Tammy M. Knierim (July 2007)
-
CYBERCRIME: Public and Private Entities Face Challenges in Addressing Cyber Threats; GAO (June 2007)
-
Lessons Learned from the Russian-Estonian Cyber-Conflict; Packet Clearing House; June 2007
-
Terrorist Capabilities for Cyberattack: Overview and Policy Issues; Congressional Research (January 22, 2007)
-
National Strategy for Information Sharing (2007)
-
Warfighting in Cyberspace; LTG Keith B. Alexander (2007)
-
Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems; U.S. Department of Energy; September 2006
-
-
National Military Strategy for Cyberspace; Department of Defense (December 2006)
-
Federal Plan for Cyber Security and Information Assurance Research and Development; Interagency Working Group on Cyber Security and Information Assurance (April 2006)
-
Power to the Edge: Command...Control...in the Information Age; DOD Command and Control Research Program (April 2005)
-
Creating a National Framework for Cybersecurity: An Analysis of Issues and Options; Congressional Research Service (February 22, 2005)
-
Developing Situation Awareness Metrics in a Synthetic Battlespace Environment (2005)
-
Critical Infrastructure and Key Assets: Definition and Identification; Congressional Research Service (October 1, 2004)
-
Virtual Threat, Real Terror: Cyberterrorism in the 21st Century; Testimony to Senate Judiciary Committee Subcommittee on Terrorism and Homeland Security (February 24, 2004)
-
Critical Infrastructure: Control Systems and the Terrorist Threat; Congressional Research Service (July 14, 2003)
-
The National Strategy to Secure CYBERSPACE; The White House (February 2003)
-
Building a Deterrence Against Strategic Information Warfare; Geoffrey S. French (June 2002)
-
National Communications System: Ensuring Essential Communications for the Homeland; Office of the Manager, National Communications System (FY 2002)
-
Five Dimensional (Cyber) Warfighting: Can the Army After Next be Defeated Through Complex Concepts and Technologies?; Robert J. Bunker (July 10, 1998)
-
Toward Deterrence in the Cyber Dimension; President's Commission on Critical Infrastructure Protection (1997)
|
|
|
|
|
|