Cyber-attack

Results: 386



#Item
261Crime / Computer security / Industrial espionage / International Multilateral Partnership Against Cyber Threats / Attack / Stuxnet / Computer insecurity / Malware / International Cybercrime / Cyberwarfare / Computer crimes / Security

IFP/WKP/FGS[removed]MULTI-DISCIPLINARY ISSUES INTERNATIONAL FUTURES PROGRAMME OECD/IFP Project on

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-07-04 15:05:51
262Computer security / Crime prevention / Electronic commerce / National security / Secure communication / Attack / Computer network security / Security / Cyberwarfare

2013 DHS S&T/DoD ASD (R&E) CYBER SECURITY SBIR WORKSHOP Toward Agile and Informed Security Solutions

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2013-08-05 12:49:24
263Privacy law / FBI Buffalo Field Office / U.S. Air Force Office of Special Investigations / Spies / Federal Bureau of Investigation / Robert Hanssen

The FBI-Priorities Protect the United States from terrorist attack Protect the United States against foreign intelligence operations and espionage Protect the United States against cyber-based

Add to Reading List

Source URL: youth202.org

Language: English - Date: 2014-03-14 12:03:24
264Security / Data security / Hacking / Vulnerability / Threat / Malware / IT risk / Attack / Network security / Computer network security / Cyberwarfare / Computer security

OPEN SUBJECT AREAS: COMPUTER SCIENCE A genetic epidemiology approach to cyber-security

Add to Reading List

Source URL: www.barabasilab.com

Language: English - Date: 2014-07-18 12:44:26
265Idaho National Laboratory / United States Department of Energy National Laboratories / International Multilateral Partnership Against Cyber Threats / Research / Computer security / Carnegie Mellon University / Geography of the United States / Security / Battelle Memorial Institute / Idaho

agile research for cybersecurity A New Approach Securing information systems from attack and compromise is a global problem of massive scope and scale. Cybersecurity can benefit from fundamental research that extends our

Add to Reading List

Source URL: www.thei3p.org

Language: English - Date: 2014-05-06 12:26:43
266Electric power transmission systems / Electrical engineering / Electric power distribution / Electrical grid / Electric power transmission / Power outage / Scale-free network / Cyberwarfare / SCADA / Electromagnetism / Technology / Electric power

Chapter 5 Cyberspace and Infrastructure William D. O’Neil THIS CHAPTER addresses two related subjects: protecting cyber, electrical, pipeline, and other infrastructures against cyber attack, and protecting cyber infras

Add to Reading List

Source URL: ctnsp.dodlive.mil

Language: English - Date: 2014-03-31 15:04:33
267Security / Hacking / National security / Vulnerability / Zero-day attack / Computer insecurity / Denial-of-service attack / Information security / Password / Cyberwarfare / Computer network security / Computer security

TrendLabsSM 2Q 2014 Security Roundup Turning the Tables on Cyber Attacks Responding to Evolving Tactics

Add to Reading List

Source URL: free.antivirus.com

Language: English - Date: 2014-08-15 01:56:21
268Hacking / Military technology / Cyberwarfare / Public safety / Emergency management / Incident response team / International Multilateral Partnership Against Cyber Threats / Crisis management / Attack / Incident management / Computer crimes / Electronic warfare

A report from The Economist Intelligence Unit Cyber incident response Are business leaders ready? Contents

Add to Reading List

Source URL: www.economistinsights.com

Language: English - Date: 2014-03-12 13:43:32
269Security / Department of Defense Information Assurance Certification and Accreditation Process / Kratos / Information assurance / Security information and event management / Attack / Computer security / Kratos Defense & Security Solutions / Cyberwarfare

Photo Release -- Kratos RT Logic Introduces the First Cyber Security Event Manager Designed for Satellite Networks CyberC4™:Alert Monitors Threats Across Satellite Networks for Situational Awareness Product Introductio

Add to Reading List

Source URL: www.rtlogic.com

Language: English - Date: 2013-09-06 12:14:42
270Computer network security / Crime prevention / National security / SCADA / Idaho National Laboratory / National Cyber Security Division / Information security / Vulnerability / Attack / Computer security / Security / Cyberwarfare

Microsoft Word - 4March08_SCADA_Procurement.doc

Add to Reading List

Source URL: energy.gov

Language: English - Date: 2011-07-28 13:35:58
UPDATE