Cyber-security regulation

Results: 835



#Item
191Terrorism / Cyberterrorism / Cyberwarfare / Privacy / International Cybercrime / Cyber-security regulation / Computer crimes / Ethics / Crime

23rd Annual Meeting Asia Pacific Parliamentary Forum Sponsored by: Mexico, Chile, Ecuador, Korea, Indonesia, Canada, Australia RESOLUTION ON CYBER SECURITY AND RIGHT TO PRIVACY

Add to Reading List

Source URL: www.23appf.ec

Language: English - Date: 2015-01-15 18:44:42
192Crime / United Nations / Computing / International Multilateral Partnership Against Cyber Threats / Digital divide / National security / Cyberterrorism / Computer security / Cyber-security regulation / Computer crimes / International Telecommunication Union / Cyberwarfare

SPECIAL EVENT ON CYBERSECURITY AND DEVELOPMENT 9 December 2011, 10:00 a.m. – 1:00 p.m., ECOSOC Chamber ISSUES NOTE Chair

Add to Reading List

Source URL: www.un.org

Language: English - Date: 2011-12-01 10:27:30
193Public safety / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Computer security / Cyber-security regulation / United States Department of Homeland Security / National Cyber Security Division / Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Cyberwarfare / Security

Cyber Initiative Memo THE WILLIAM AND FLORA HEWLETT FOUNDATION Memorandum Date: March 27, 2014

Add to Reading List

Source URL: hewlett.org

Language: English - Date: 2014-04-07 17:49:07
194Public safety / National security / Government / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Cyber-security regulation / Computer security / Information Technology Industry Council / United States Department of Homeland Security / Cyberwarfare / Security / Computer crimes

Written Testimony of Dean C. Garfield President & CEO, Information Technology Industry Council (ITI)

Add to Reading List

Source URL: www.itic.org

Language: English - Date: 2015-01-27 14:57:36
195National security / Hacking / Crime / Military technology / Computer security / Cyber spying / Internet privacy / Cyber-security regulation / National Strategy to Secure Cyberspace / Security / Cyberwarfare / Computer crimes

CYBER SECURITY STRATEGY │AN OVERVIEW © Commonwealth of Australia 2009 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without prior writ

Add to Reading List

Source URL: www.ag.gov.au

Language: English - Date: 2015-03-01 23:47:46
196Contemporary history / Cyber-security regulation / Information warfare / Stuxnet / Internet-related prefixes / Cyberspace / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Military science / War

Correspondence: A Cyber Disagreement

Add to Reading List

Source URL: deterrence.ucsd.edu

Language: English - Date: 2014-12-15 14:23:24
197Electronic warfare / Hacking / Military technology / Computer crimes / Military science / Computer emergency response team / Cyber security and countermeasure / Cyber-security regulation / Cyberwarfare / Computer security / Security

FOI document 2 1 AG interview with 4 Corners- CERT Australia briefing Whole of Government talking points (PM&C) •

Add to Reading List

Source URL: delimiter.com.au

Language: English - Date: 2013-12-01 08:32:38
198Cyberwarfare / Crime prevention / Computer network security / Information security / Legal aspects of computing / Attack / Cyber-security regulation / Cyber security standards / Security / Computer security / National security

POLICY ADVISORY May 11, 2011 Comments on “Discussion Draft on National Cyber Security Policy” Rohan Joshi & Srijith K Nair

Add to Reading List

Source URL: takshashila.org.in

Language: English - Date: 2011-05-15 22:28:17
199National security / United States Department of Homeland Security / Terrorism / Military technology / Cyberterrorism / Computer security / Critical infrastructure / Cyber-security regulation / United States Cyber Command / Cyberwarfare / Computer crimes / Security

Department Of Information Technology

Add to Reading List

Source URL: deity.gov.in

Language: English - Date: 2011-06-07 03:18:21
200Military science / Electronic warfare / Hacking / Military technology / United States Department of Homeland Security / Cyber-security regulation / United States Computer Emergency Readiness Team / Howard Schmidt / United States Cyber Command / Cyberwarfare / Security / Computer security

The emerging agenda for cybersecurity Who ‘owns’ cyber policy? These measures point to a consolidation of cyber functions, particularly at the operational level, where information technology specialists detect cyb

Add to Reading List

Source URL: www.ncoa.gov.au

Language: English - Date: 2014-03-25 19:39:18
UPDATE