Cyber-security regulation

Results: 835



#Item
231Computer crimes / Computer security / Electronic warfare / Military technology / War / Einstein / Cyber-security regulation / National Cyber Security Division / United States Department of Homeland Security / Cyberwarfare / Security

Middle Class Economics: Cybersecurity

Add to Reading List

Source URL: www.whitehouse.gov

Language: English - Date: 2015-02-02 11:31:10
232Electronic warfare / Crime / Cyberwarfare / Hacking / Computer security / Information security / Computer crime / Organized crime / Cyber-security regulation / Security / National security / Crime prevention

Microsoft Word - CSS_vorlage_EN.doc

Add to Reading List

Source URL: www.securityconference.de

Language: English - Date: 2013-11-25 05:10:32
233Crime prevention / Computer network security / Computer security / Electronic commerce / Public safety / Institute for Information Infrastructure Protection / Cyber-security regulation / Cyberwarfare / Security / National security

Combatting Cyber Security Risks The Cyber Wellness Check CYBER SECURITY: “A SERIOUS NATIONAL THREAT” Risk Control Strategies

Add to Reading List

Source URL: www.alliancesecuritycouncil.com

Language: English - Date: 2013-07-10 14:53:56
234Military technology / Cyberwarfare / Computer crimes / War / Internet-related prefixes / Military science / Crime / Cyber-security regulation / United States Cyber Command / Hacking / Center for a New American Security / Electronic warfare

J U N E[removed]America’s Cyber Future Security and Prosperity in the Information Age volume i

Add to Reading List

Source URL: www.cnas.org

Language: English - Date: 2013-07-17 03:49:34
235Government / National security / Cyber-security regulation / United States Department of Homeland Security / Computer security / Cyberwarfare / Security / Public safety

CYBERSECURITY: EMERGING THREATS, VULNERABILITIES, AND CHALLENGES IN SECURING FEDERAL INFORMATION SYSTEMS HEARING

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2010-10-22 13:27:21
236Computer security / Cyberspace / Contemporary history / Cyberpunk / Cyberwarfare / Security / Cyber-security regulation

From the Editors A Doctrinal Thesis C

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2011-08-07 18:22:10
237Privacy / Internet privacy / Cyber-security regulation / U.S. Department of Defense Strategy for Operating in Cyberspace / Ethics / Identity management / Law

April 15, 2013 Dear Representative: Earlier this year, many of our organizations wrote to state our opposition to H.R. 624, the Cyber Intelligence Sharing and Protection Act of[removed]CISPA). We write today to express our

Add to Reading List

Source URL: www.aclu.org

Language: English - Date: 2014-03-07 03:03:19
238Military science / Cyberwarfare / War / United States Cyber Command / Cyber-security regulation / Military organization / Hacking / Electronic warfare / Military technology

We frequently hear the terms “Cyber 9/11” and “Digital Pearl Harbor,” but we rarely discuss what they actually mean or how to handle the consequences and to manage this kind of crisis situation. The Cyber 9/12 Pr

Add to Reading List

Source URL: www.gcsp.ch

Language: English
239Cyberwarfare / Electronic warfare / Hacking / Military technology / Computer security / Password / Identity theft / Cyber-security regulation / Department of Defense Cyber Crime Center / Crime / Computer crimes / Security

Paul Ash Director National Cyber Policy Office Cyber risk comes in many shapes and sizes Cyber Bullying

Add to Reading List

Source URL: www.icnz.org.nz

Language: English - Date: 2014-11-04 16:32:32
240Prefixes / Cyberpunk / Internet / Alternate reality / Legal aspects of computing / Cyber-security regulation / Cyberspace / Computer law / Internet-related prefixes

international law of contemporary media session 6 (interactive): should and can cyberspace be regulated? mira burri, dr.iur.,

Add to Reading List

Source URL: www.wti.org

Language: English - Date: 2014-03-31 06:28:52
UPDATE