Cyberwarfare in the United States

Results: 459



#Item
211The Pentagon / United States Air Force / United States Department of Defense / Information warfare / United States Cyber Command / Cyberwarfare in the United States / Military science / Cyberwarfare / Military strategy

Strategic Studies Quarterly - Summer 2008

Add to Reading List

Source URL: www.au.af.mil

Language: English - Date: 2011-07-19 12:46:00
212Information / National security / Freedom of information legislation / Classified information / Freedom of Information Act / Comprehensive National Cybersecurity Initiative / National Security Agency / Tax Analysts / Electronic Privacy Information Center / Freedom of information in the United States / Computer security / Cyberwarfare

November 24, 2009 BY CERTIFIED MAIL NSA/CSS FOIA Appeal Authority (DJP4) National Security Agency 9800 Savage Road STE 6248 Ft. George G. Meade, MD[removed]

Add to Reading List

Source URL: epic.org

Language: English - Date: 2009-11-24 13:23:17
213Cyberwarfare / Infrastructure / Computer security / Security engineering / Computer crimes / Critical infrastructure protection / National Cyber Security Division / National Strategy to Secure Cyberspace / United States Computer Emergency Readiness Team / United States Department of Homeland Security / National security / Security

CHAPTER 23 Cyberpower and Critical Infrastructure Protection: A Critical Assessment of Federal Efforts John A. McCarthy with Chris Burrow, Maeve Dion, and Olivia Pacheco IN THIS CHAPTER, we examine the cyber infrastructu

Add to Reading List

Source URL: ctnsp.dodlive.mil

Language: English - Date: 2014-03-31 15:05:05
214Education in the United States / Cyberwarfare / Personal life / Personally identifiable information / Family Educational Rights and Privacy Act / Data breach / Charter school / Internet privacy / Government procurement in the United States / Security / Computer security / Data security

MODEL STUDENT DATA PRIVACY AND SECURITY POLICY Drafted by the Data Management Council and adopted by the Idaho State Board of Education Effective August 14, 2014 The efficient collection, analysis, and storage of student

Add to Reading List

Source URL: www.kimberly.edu

Language: English - Date: 2014-08-28 10:03:02
215Military technology / War / Military science / Air interdiction / Cyberwarfare in the United States / Cyber electronic warfare / Electronic warfare / Cyberwarfare / Hacking

Chief of warfighting integration and chief information officer for Office of Secretary of Air Force discusses cyber security during seminar at Barksdale Air Force Base (U.S. Air Force/Chad Warren) Cyber Power in 21st-Ce

Add to Reading List

Source URL: ndupress.ndu.edu

Language: English - Date: 2014-08-18 10:43:24
216United States Department of Homeland Security / Cyberwarfare / Critical infrastructure protection / Infrastructure / Security engineering / Richard Kugler / Under Secretary of Defense for Acquisition /  Technology and Logistics / Institute for Defense Analyses / Information warfare / National security / Military science / Security

About the Contributors (as of the Publication Date) EDITORS Franklin D. Kramer is an independent consultant and a former Distinguished Research Fellow in the Center for Technology and National Security Policy, National D

Add to Reading List

Source URL: ctnsp.dodlive.mil

Language: English - Date: 2014-03-31 11:54:44
217Computer security / Cyberwarfare / Information security / Vulnerability / Government Accountability Office / Tax return / IRS Return Preparer Initiative / Customer Account Data Engine / Taxation in the United States / Internal Revenue Service / Security

GAO[removed]Highlights, INFORMATION SECURITY: IRS Needs to Further Enhance Internal Control over Financial Reporting and Taxpayer Data

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2012-03-16 13:37:18
218Information technology audit / Payment systems / United States Department of Agriculture / Electronic Benefit Transfer / Cyberwarfare / National security / Supplemental Nutrition Assistance Program / Vulnerability / Role-based access control / Federal assistance in the United States / Security / Computer security

New Jersey State Legislature Office of Legislative Services Office of the State Auditor Department of Human Services Division of Family Development

Add to Reading List

Source URL: www.njleg.state.nj.us

Language: English - Date: 2000-06-13 09:22:20
219Information / National security / Freedom of information legislation / Classified information / Freedom of Information Act / Comprehensive National Cybersecurity Initiative / National Security Agency / Tax Analysts / Electronic Privacy Information Center / Freedom of information in the United States / Computer security / Cyberwarfare

November 24, 2009 BY CERTIFIED MAIL NSA/CSS FOIA Appeal Authority (DJP4) National Security Agency 9800 Savage Road STE 6248 Ft. George G. Meade, MD[removed]

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2009-11-24 13:23:17
220War / Military intelligence / Hacking / Military technology / Information operations / Information warfare / Cyberterrorism / Military strategy / Air Force Cyber Command / Cyberwarfare / Military science / Electronic warfare

CHAPTER 20 Nation-State Cyber Strategies: Examples from China and Russia Timothy L. Thomas AN EARLY adopter of cyberspace concepts in the United States was the Air Force, which established a cyberspace command in Novembe

Add to Reading List

Source URL: ctnsp.dodlive.mil

Language: English - Date: 2014-03-31 15:05:01
UPDATE