Cyberwarfare in the United States

Results: 459



#Item
251Quality assurance / Software assurance / Software quality / United States Department of Homeland Security / Cyberwarfare / Vulnerability / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Computer security / Security / Public safety

Software Assurance: Enabling Enterprise Resilience through Security Automation and Software Supply Chain Risk Management Abstract: The DHS Software Assurance (SwA) program works collaboratively with federal government an

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-10-11 17:53:19
252Security / Hacking / United States Computer Emergency Readiness Team / Stuxnet / Vulnerability / Control system security / Zero-day attack / Information security management system / Threat / Computer security / Cyberwarfare / Computer network security

ICS-CERT[removed]YEAR IN REVIEW January 2011 A LOOK BACK The past year has been a busy and unprecedented year for both the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) and the control systems commun

Add to Reading List

Source URL: www.chemicalcybersecurity.org

Language: English
253Washington metropolitan area / Baltimore / Chesapeake Bay / Electronic warfare / Hacking / Military technology / Cyberwarfare / National Security Agency / Maryland / Baltimore–Washington metropolitan area / Geography of the United States

Cyber Security in Greater Baltimore a State of the Market Report

Add to Reading List

Source URL: www.fbcinc.com

Language: English - Date: 2013-07-25 14:03:55
254Infrastructure / Technology / Security engineering / Critical infrastructure protection / Energy economics / Critical infrastructure / Cyberwarfare / Energy industry / Computer security / United States Department of Homeland Security / National security / Security

SECURING OIL AND NATURAL GAS INFRASTRUCTURES IN THE NEW ECONOMY NATIONAL PETROLEUM

Add to Reading List

Source URL: www.npc.org

Language: English - Date: 2006-02-28 00:00:00
255Public safety / United States Department of Homeland Security / Critical infrastructure protection / Infrastructure / Security engineering / Computer security / Department of Defense Cyber Crime Center / Cyberwarfare in the United States / National security / Security / Cyberwarfare

    Cyber Security Jobs Report Release Date

Add to Reading List

Source URL: www.fbcinc.com

Language: English - Date: 2013-07-25 14:03:23
256Cyberwarfare / Propaganda techniques / Military science / Crowd psychology / Joint Information Operations Warfare Center / Psychological Operations / Computer network operations / Counter-terrorism / Electronic warfare / Information operations / Propaganda in the United States / Psychological warfare

■ Marine relaying information to USS Wasp.

Add to Reading List

Source URL: www.au.af.mil

Language: English - Date: 2012-01-04 10:20:26
257Cyberwarfare / Public safety / National Cyber Security Division / Year of birth missing / International Multilateral Partnership Against Cyber Threats / United States Computer Emergency Readiness Team / Critical infrastructure protection / National Protection and Programs Directorate / Computer security / National security / United States Department of Homeland Security / Security

Bridging ridging to the Future – Emerging Trends in Cybersecurity Bios/Abstracts Conference presentations will be posted to the FISSEA website, www.fissea.org

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-03-14 01:00:00
258Electronic warfare / War / Computer network security / Hacking / Military technology / United States Cyber Command / Cyberspace / Internet security / SCADA / Cyberwarfare / Military science / Technology

Preface and Acknowledgements This compilation of answers to 50 selected cyber questions addresses the scientific and technical angle of flying, fighting and winning in cyberspace. We did not intend this book as a glossa

Add to Reading List

Source URL: www.au.af.mil

Language: English - Date: 2012-01-04 10:28:36
259Electronic warfare / Military technology / Military science / War / Military / Cooperative Cyber Defence Centre of Excellence / National Cybersecurity Center / Cyberwarfare in the United States / Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Computer crimes / Hacking

Concordiam per VOLUME 5, ISSUE 2, 2014 Journal of European Security and Defense Issues

Add to Reading List

Source URL: www.marshallcenter.org

Language: English - Date: 2014-06-05 04:50:06
260Security / Cyberwarfare / Attack / Password / Incident management / Firefighting in the United States / National security / Computer security incident management / Information security / Computer security / Computer network security / Public safety

Sample Intrusion Detection Incident Response Plan Incident Response Plan Example This document discusses the steps taken during an incident response plan. To create the plan, the steps in the following example should

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2013-06-28 15:18:55
UPDATE