Cyber-security regulation

Results: 835



#Item
551Computer network security / Crime prevention / National security / Secure communication / Cyber-security regulation / International Cybercrime / U.S. Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Security / Computer security

Cyber-paradise Lost An examination of Obstacles in the Cybersecurity Policy-Making Process by Alexander Mirowski

Add to Reading List

Source URL: polisci.indiana.edu

Language: English - Date: 2013-06-21 16:09:30
552Cyberwarfare / Computer security / Computer crimes / Secure communication / Cyber-security regulation / Identity theft / Data breach / ChoicePoint / Phishing / Security / Cybercrime / Computer network security

Microsoft Word - Dos and Donts WHITE PAPER.doc

Add to Reading List

Source URL: www.huntonfiles.com

Language: English - Date: 2009-03-11 15:57:10
553Public safety / Critical infrastructure protection / Homeland Security Act / Cyberwarfare / Computer security / Homeland Security Grant Program / National Cyber Security Division / Cyber-security regulation / United States Department of Homeland Security / National security / Security

State Governments at Risk: Secure Citizen Data and State Infrastructure As states are experiencing the worst economic crisis since the Great Depression, funding for vital services and programs like cybersecurity are bein

Add to Reading List

Source URL: www.nascio.org

Language: English - Date: 2011-05-25 13:45:47
554Public safety / Computer network security / Crime prevention / Electronic commerce / Critical infrastructure protection / Computer security / Homeland Security Act / Personal Data Privacy and Security Act / Cyber-security regulation / National security / United States Department of Homeland Security / Security

Law Enforcement Provisions Related to Computer Security

Add to Reading List

Source URL: m.whitehouse.gov

Language: English - Date: 2011-10-18 14:53:16
555Security / Computer security / Institute for Information Infrastructure Protection / National Cyber Security Division / Cyber security standards / Critical infrastructure protection / Cyber-security regulation / United States Cyber Command / United States Department of Homeland Security / National security / Cyberwarfare

I3P Workshop Report Workforce Development: Understanding the Demand Sponsored by

Add to Reading List

Source URL: www.thei3p.org

Language: English - Date: 2014-04-17 14:54:00
556Military / United States Cyber Command / Cyber-security regulation / Information warfare / Cyberwarfare in the United States / Proactive Cyber Defence / Cyberwarfare / Military science / War

UNIDIR RESOURCES Cybersecurity and Cyberwarfare[removed]Cybersecurity and Cyberwarfare

Add to Reading List

Source URL: kms1.isn.ethz.ch

Language: English
557Public safety / Cyberwarfare / Security engineering / Computer crimes / Critical infrastructure protection / International Multilateral Partnership Against Cyber Threats / Computer security / Cyber-security regulation / National Cyber Security Division / National security / Security / United States Department of Homeland Security

THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013

Add to Reading List

Source URL: www.tsa.gov

Language: English - Date: 2013-04-26 17:04:02
558War / Criminology / Cyberterrorism / July 2009 cyber attacks / Department of Defense Cyber Crime Center / Cyber-security regulation / Computer crimes / Cyberwarfare / Crime

Data Protection and the Proper Response to the Cyber Crime : The Two Common Goals Jaeyoung LEE Prosecutor, National Security Department

Add to Reading List

Source URL: www.iap-association.org

Language: English - Date: 2013-12-19 12:36:49
559Electronic warfare / Hacking / Military technology / FireEye /  Inc. / Advanced persistent threat / International Multilateral Partnership Against Cyber Threats / Cooperative Cyber Defence Centre of Excellence / Canadian government hackings / Cyber-security regulation / Cybercrime / Computer crimes / Cyberwarfare

Government Top Target for APT Attacks With a constant barrage of news about high-profile cyber attacks, 2013 was one of the most interesting years ever in the security arena. Headlines seemed ripped from a Tom Clancy no

Add to Reading List

Source URL: www.fireeye.com

Language: English - Date: 2014-08-11 22:30:03
560Computer network security / Hacking / National security / Vulnerability / Information security / Attack / Computer insecurity / Cyber-security regulation / Stuxnet / Security / Cyberwarfare / Computer security

The US-CCU Cyber-Security Check List By John Bumgarner and Scott Borg FINAL VERSION 2007

Add to Reading List

Source URL: www.usccu.us

Language: English - Date: 2007-09-09 21:33:02
UPDATE