Cyberwarfare in the United States

Results: 459



#Item
381National security / United States Department of Homeland Security / Firefighting in the United States / Computer security / Cyberwarfare / Incident response team / Computer emergency response team / Vulnerability / Computer security incident management / Public safety / Emergency management / Incident management

STATE OF ALABAMA Information Technology Policy POLICY[removed]: CYBER SECURITY INCIDENT RESPONSE An incident, as defined in National Institute of Standards and Technology (NIST) Special Publication[removed], is a violation o

Add to Reading List

Source URL: cybersecurity.alabama.gov

Language: English - Date: 2012-07-19 11:54:48
382Electric power transmission systems / Electric power distribution / Emerging technologies / United States Department of Homeland Security / Smart grid / Cyberwarfare / Electrical grid / Critical infrastructure protection / Computer security / Electric power / Energy / Electromagnetism

GAO-12-926T, Cybersecurity: Challenges in Securing the Electricity Grid

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2012-07-17 10:05:47
383Security / Public safety / Computer network security / National security / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / National Strategy for Trusted Identities in Cyberspace / Comprehensive National Cybersecurity Initiative / Cyberspace / Cyberwarfare / United States Department of Homeland Security / Computer security

Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2011-12-14 07:44:24
384Medicare / Presidency of Lyndon B. Johnson / Civil law / Electronic signature / Recovery Audit Contractor / Digital signature / Government / Cyberwarfare / Cryptography / Pharmaceuticals policy / Healthcare reform in the United States

CMS Manual System Department of Health & Human Services (DHHS) Pub[removed]Medicare Program Integrity

Add to Reading List

Source URL: www.cms.gov

Language: English - Date: 2013-08-07 14:34:02
385Public safety / Computer security / Computer crimes / Federal Information Security Management Act / National Cyber Security Division / Cyber-security regulation / Cyberwarfare / United States Department of Homeland Security / Security

APPENDIX B Appendix B: The following is an overview of the roles of various government agencies in relation to cybersecurity: The White House’s Cybersecurity Coordinator – responsible for setting a national agenda

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-10-04 08:42:53
386Hacking / Cybercrime / Military technology / National security / Industrial espionage / Computer security / United States Department of Homeland Security / Supply chain cyber security / Cyberwarfare in the United States / Cyberwarfare / Electronic warfare / Security

Opening Statement May 21, 2014 Media Contact: Charlotte Sellmyer[removed]

Add to Reading List

Source URL: homeland.house.gov

Language: English - Date: 2014-05-21 10:49:55
387Computer network security / Internet governance / United States Computer Emergency Readiness Team / Carnegie Mellon University / Vulnerability / SCADA / Control system security / Attack / CERT Coordination Center / Computer security / Cyberwarfare / Security

APRIL[removed]What is ICS-CERT? The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) provides a control system security focus in collaboration with US-CERT to:

Add to Reading List

Source URL: ics-cert.us-cert.gov

Language: English - Date: 2013-09-16 17:06:17
388Cyberwarfare / Cyberspace / Military science / War / United States Air Force / Legal aspects of computing / United States Strategic Command / Internet / Cyberwarfare in the United States / Electronic warfare / Hacking / Military technology

THE AIR FORCE LAW REVIEW CYBERLAW EDITION SOVEREIGNTY IN CYBERSPACE: CAN IT EXIST? Lieutenant Colonel Patrick W. Franzese, USAF

Add to Reading List

Source URL: www.afjag.af.mil

Language: English - Date: 2009-10-26 13:51:36
389Hacking / Military technology / Security / United States Cyber Command / Computer security / Cyberwarfare in the United States / Cyber-security regulation / Cyberwarfare / Military science / Electronic warfare

The Government’s Four Cyber Silences Testimony of Jason Healey Director, Cyber Statecraft Initiative, Atlantic Council to the US-China Economic and Security Review Commission on

Add to Reading List

Source URL: www.uscc.gov

Language: English - Date: 2013-02-13 13:43:06
390Computer crimes / Electronic warfare / Hacking / Military technology / War / Central Intelligence Agency / Counterintelligence / Cyberwarfare in the United States / Cyberterrorism / Cyberwarfare / Military science / Espionage

Microsoft Word - UNCLASS_2013 ATA SFR FINAL for SSCI _12 Mar 2013_

Add to Reading List

Source URL: www.nctc.gov

Language: English - Date: 2014-05-08 13:37:16
UPDATE