Cyberwarfare in the United States

Results: 459



#Item
271Government / Cyberwarfare / National security / National Cyber Security Division / Center for Infrastructure Assurance and Security / United States Department of Homeland Security / Public safety

The Center for Infrastructure Assurance and Security The CIAS, founded in 2001, is the operational division of the UTSA Institute for Cyber Security. Focusing on three major areas, the Center works to improve the overall

Add to Reading List

Source URL: cias.utsa.edu

Language: English - Date: 2014-02-26 09:50:58
272Cyberwarfare / Military science / War / Canadian Security Intelligence Service / Electronics / Cyberwarfare in the United States / Department of Defense Strategy for Operating in Cyberspace / Electronic warfare / Hacking / Military technology

CICIR - CSIS Talks on Cybersecurity December 4-5, [removed]K St. NW Washington, DC[removed]December 4, 2012 Session I: 9:00am – 12:00 pm

Add to Reading List

Source URL: csis.org

Language: English - Date: 2012-12-10 15:58:38
273Electronic warfare / Hacking / Military technology / United States Cyber Command / United States Air Force / United States Department of Defense / Air University / Cyberwarfare / LeMay Center for Doctrine Development and Education / Military organization / United States / Military

September–October 2012 Volume 26, No. 5 AFRP 10-1 Senior Leader Perspective Driving towards Success in the Air Force Cyber Mission ❙ 4

Add to Reading List

Source URL: www.au.af.mil

Language: English - Date: 2012-10-15 14:45:12
274Command and control / Military strategy / Military terminology / Electronic warfare / Military technology / United States Cyber Command / Cyberwarfare in the United States / Military science / Military / Battlespace

JOINT OPERATIONAL ACCESS CONCEPT (JOAC) VERSION[removed]January 2012

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2014-01-09 11:48:18
275Cyberwarfare / Computer security / Assistant Secretary of Defense for Networks and Information Integration / Network management / Science and technology in the United States / Communications security / Defense Information Systems Agency / Global Information Grid / Office of the Secretary of Defense / Military communications / Security / National security

Department of Defense INSTRUCTION NUMBER[removed]October 9, 2007 ASD(NII)/DoD CIO

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2007-10-15 11:39:42
276Hacking / Military technology / Department of Defense Cyber Crime Center / Military science / War / Computer security / Wicked Rose / National Collegiate Cyber Defense Competition / Cyberwarfare in the United States / Computer crimes / Cyberwarfare / Electronic warfare

The United States Cyber Challenge

Add to Reading List

Source URL: www.whitehouse.gov

Language: English - Date: 2009-05-28 16:36:24
277United States Department of Homeland Security / War / Hacking / Electronic warfare / Military technology / National Strategy to Secure Cyberspace / Cyberspace / Information warfare / Internet-related prefixes / Cyberwarfare / Military science / National security

CHAPTER 10 An Environmental Approach to Understanding Cyberpower Gregory J. Rattray CYBERSPACE has increasingly become an environment in which the United States and actors around the globe act, cooperate, and compete. Ac

Add to Reading List

Source URL: ctnsp.dodlive.mil

Language: English - Date: 2014-03-31 15:04:45
278Cyberwarfare / Data security / Crime prevention / National security / Information security / Threat / Data center / Government procurement in the United States / Vulnerability / Computer security / Security / Computing

Privacy and Security Agreement This Privacy and Security Agreement (“Agreement”), made as of ___________, 2011 (“Effective Date”) by and between the Trustees of Columbia University in the City of New York, a New

Add to Reading List

Source URL: cumc.columbia.edu

Language: English - Date: 2013-01-08 12:22:15
279Cyberwarfare / Data security / Crime prevention / National security / Information security / Threat / Data center / Government procurement in the United States / Vulnerability / Computer security / Security / Computing

Privacy and Security Agreement This Privacy and Security Agreement (“Agreement”), made as of ___________, 2011 (“Effective Date”) by and between the Trustees of Columbia University in the City of New York, a New

Add to Reading List

Source URL: www.columbia.edu

Language: English - Date: 2012-01-25 16:43:41
280Cyberwarfare / Electronic warfare / Hacking / Military technology / Internet in the United States / United States Department of Homeland Security / Managed Trusted Internet Protocol Service / Incident management / Computer security / Public safety / Security / Computer network security

OFFICE OF THE SECRETARY Inadequate Practice and Management Hinder Incident Detection and Response

Add to Reading List

Source URL: www.oig.doc.gov

Language: English - Date: 2014-06-05 15:28:20
UPDATE