Cyber-security regulation

Results: 835



#Item
801Security / National security / National Cyber Security Division / United States Computer Emergency Readiness Team / Einstein / International Multilateral Partnership Against Cyber Threats / National Strategy to Secure Cyberspace / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / United States Department of Homeland Security / Cyberwarfare / Computer security

National Cyber Security Division Resilient Accord Read Ahead Introduction The Department of Homeland Security (DHS) is responsible for protecting our Nation’s critical infrastructure and key resources (CIKR) from physi

Add to Reading List

Source URL: www.fbiic.gov

Language: English - Date: 2010-09-22 12:57:09
802Crime / Electronic warfare / Military technology / Military science / Cyberwarfare / International Multilateral Partnership Against Cyber Threats / Computer security / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Hacking / Security

National Cyber Security Strategy 2 From awareness to capability Ministerie van Volksgezondheid, Welzijn en Sport

Add to Reading List

Source URL: www.enisa.europa.eu

Language: English
803Electronic warfare / Hacking / Military technology / Military science / War / International Multilateral Partnership Against Cyber Threats / Computer security / National Strategy to Secure Cyberspace / Cyber-security regulation / Cyberwarfare / Security / Computer crimes

NATIONAL CYBER SECURITY STRATEGY 2013

Add to Reading List

Source URL: www.enisa.europa.eu

Language: English
804National security / United States Department of Homeland Security / Computer security / Military technology / Cyberterrorism / International Multilateral Partnership Against Cyber Threats / Critical infrastructure / National Strategy to Secure Cyberspace / Cyber-security regulation / Cyberwarfare / Computer crimes / Security

Cyber Security Strategy Cyber Security Strategy Committee Ministry of Defence ESTONIA

Add to Reading List

Source URL: www.enisa.europa.eu

Language: English
805Hacking / Computer security / War / Electronic warfare / Military technology / Cyber security standards / International Multilateral Partnership Against Cyber Threats / Cyber-security regulation / International Cybercrime / Cyberwarfare / Security / Computer crimes

Strategie_pro_oblast_KB_EN

Add to Reading List

Source URL: www.enisa.europa.eu

Language: English
806Computer security / Electronic warfare / Hacking / Military technology / War / International Multilateral Partnership Against Cyber Threats / Computer emergency response team / Cyber-security regulation / Cyber security and countermeasure / Cyberwarfare / Computer crimes / Security

The heart of European cyber security. enisa.europa.eu Securing Europe’s Information Society

Add to Reading List

Source URL: www.enisa.europa.eu

Language: English
807Cyberwarfare / Crime / Electronic warfare / Hacking / Military technology / International Multilateral Partnership Against Cyber Threats / Computer security / Critical infrastructure protection / Cyber-security regulation / Computer crimes / National security / Security

bundeskanzleramt_JobboerseDesBundes

Add to Reading List

Source URL: www.enisa.europa.eu

Language: English
808Electronic warfare / Military technology / Military science / Security / Crime / International Multilateral Partnership Against Cyber Threats / Computer security / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Hacking / Cyberwarfare

The National Cyber Security Strategy Our Forward Plans – December 2013 1

Add to Reading List

Source URL: www.gov.uk

Language: English - Date: 2013-12-12 04:26:24
809Government / Internet privacy / Freedom of information legislation / Public safety / Cyber-security regulation / Ethics / United States Department of Homeland Security / Privacy

27 Privacy Improvements: The Cyber Information Sharing and Protection Act (CISPA) Fall 2011 HPSCI meetings and discussions with several privacy and civil liberties groups to hear their concerns, discuss cyber security le

Add to Reading List

Source URL: intelligence.house.gov

Language: English - Date: 2013-04-25 14:40:28
810Electronic warfare / Hacking / Military technology / Data security / IT risk / Business continuity planning / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / Security / Computer security / Cyberwarfare

PDF Document

Add to Reading List

Source URL: lazarusalliance.com

Language: English - Date: 2013-09-23 12:03:06
UPDATE