Cyberwarfare in the United States

Results: 459



#Item
241United States Department of Homeland Security / Computer security / Security engineering / Military technology / Critical infrastructure protection / Comprehensive National Cybersecurity Initiative / United States Cyber Command / National Cyber Security Division / Department of Defense Strategy for Operating in Cyberspace / National security / Cyberwarfare / Security

Managing cyber risk in the face of sophisticated adversaries A Microsoft U.S. Government white paper October 2010 This document is provided “as-is.” Information and views expressed in this document, including URL a

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2010-10-14 02:52:46
242Cyberwarfare / Joshua Bolten / Gordon Johndroe / Television in the United States / War / Military science / Braver / Place of birth missing / CBS News

Interview of Dr. Joel Brenner National Counterintelligence Executive With Rita Braver – CBS News Sunday Morning January 18, 2009 Transcript – As Aired MR. CHARLES OSGOOD (CBS NEWS): As most of Washington prepares to

Add to Reading List

Source URL: www.dni.gov

Language: English - Date: 2012-07-27 11:31:18
243Infrastructure / Technology / Cyberwarfare / Hacking / Critical infrastructure protection / Computer security / Idaho National Laboratory / United States Computer Emergency Readiness Team / Smart grid / National security / Security / United States Department of Homeland Security

NGA PAPER State Roles in Enhancing the Cybersecurity of Energy Systems and Infrastructure Executive Summary Protecting the nation’s energy system and infrastructure

Add to Reading List

Source URL: nga.org

Language: English - Date: 2014-08-20 13:32:40
244Public safety / United States Department of Homeland Security / Critical infrastructure protection / Infrastructure / Security engineering / Computer security / Department of Defense Cyber Crime Center / Cyberwarfare in the United States / National security / Security / Cyberwarfare

    Cyber Security Jobs Report Release Date

Add to Reading List

Source URL: www.ctic-baltimore.com

Language: English - Date: 2014-08-05 11:04:28
245Cyberwarfare / Federal Information Security Management Act / Information security / Security controls / Security management / Asset / Vulnerability / Certification and Accreditation / Security Content Automation Protocol / Computer security / Data security / Security

Report In Brief U.S. Department of Commerce, Office of Inspector General November 2009 Why We Did This Review United States Patent and Trademark Office (USPTO) The Federal Information

Add to Reading List

Source URL: www.oig.doc.gov

Language: English - Date: 2014-11-03 12:43:17
246Cyberwarfare / Computer law / Federal Information Security Management Act / Information Risk Management / Risk analysis / Asset / Information security / Vulnerability / United States Patent and Trademark Office / Computer security / Security / Data security

Report In Brief U.S. Department of Commerce, Office of Inspector General November 2009 Why We Did This Review United States Patent and Trademark Office (USPTO) The Federal Information

Add to Reading List

Source URL: www.oig.doc.gov

Language: English - Date: 2014-11-03 12:43:17
247Education in the United States / United States / Americans with Disabilities Act / Threat / Oxford /  Cambridge and RSA Examinations / Law / Self-harm / Office for Civil Rights / Cyberwarfare / Special education in the United States / Computer security / Section 504 of the Rehabilitation Act

New Title II Regulations Regarding Direct Threat: Do They Change How Colleges and Universities Should Treat Students Who Are Threats to Themselves?

Add to Reading List

Source URL: www.okhighered.org

Language: English - Date: 2012-06-18 15:25:11
248Military technology / Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Nuclear strategies / Air Force Space Command / Cyberspace / First strike / Cyberwarfare in the United States / U.S. Department of Defense Strategy for Operating in Cyberspace / Military science / Hacking / Electronic warfare

December[removed]Strategic Forum National Defense University Vincent Manzo is a Research Analyst

Add to Reading List

Source URL: ndupress.ndu.edu

Language: English - Date: 2014-08-21 14:02:23
249Military science / War / Electronic warfare / Military technology / United States Department of Homeland Security / United States Cyber Command / Department of Defense Strategy for Operating in Cyberspace / Cyberterrorism / National Cyber Security Division / Cyberwarfare / Hacking / Computer security

Section 5 Trends Concerning Cyberspace 1 Cyberspace and Security Owing to the Information and Communications Technology (ICT) advancement in recent years, information and communication networks such as the Internet have

Add to Reading List

Source URL: www.mod.go.jp

Language: English - Date: 2014-08-04 21:38:07
250Hacking / Military technology / Cyberwarfare / Military science / Jus ad bellum / Military / International humanitarian law / Cyberwarfare in the United States / United States Cyber Command / Laws of war / War / Electronic warfare

A Note on the Laws of War in Cyberspace James A. Lewis April 2010 There is some disagreement as to whether we can apply the existing legal framework for warfare to cyber conflict or whether a new legal framework is neede

Add to Reading List

Source URL: csis.org

Language: English - Date: 2010-05-21 10:18:02
UPDATE