Cyberwarfare in the United States

Results: 459



#Item
31Crime prevention / National security / Data security / Cyberwarfare / Public safety / Intelsat / Information security / Internet security / Network security / Computer network security / Security / Computer security

cyber security USCG explains need for better cyber security The security of the United States Coast Guard’s (USCG’s) maritime IT networks was put in the spotlight in January at

Add to Reading List

Source URL: www.intelsat.com

Language: English - Date: 2015-02-24 08:33:43
32Hacking / Military technology / Military science / War / National security / Computer security / Cyber-security regulation / Cyberwarfare in the United States / Cyberwarfare / Security / Electronic warfare

R eport N ational C ommission for the R eview of the R esearch and D evelopment P rograms of the U nited S tates I ntelligence C ommunity

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 20:30:00
33Hacking / Military technology / Military science / Cyberspace / War / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / United States Department of Homeland Security / Electronic warfare

FACT SHEET ON PRESIDENTIAL POLICY DIRECTIVE 20 ● The President recently signed a classified Presidential directive relating to cyber operations. ● Because the policy is classified, we cannot discuss all of the eleme

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2013-04-19 15:55:21
34Computer crimes / Electronic warfare / Hacking / War / United States Department of Homeland Security / Cyberterrorism / Computer security / National Cyber Security Division / Cyberwarfare in the United States / Cyberwarfare / Cybercrime / Security

Microsoft Word - Reading Module 05 _6-7_ - Virtual Advisers.doc

Add to Reading List

Source URL: www.ditc.net.au

Language: English - Date: 2014-12-07 17:10:51
35Military technology / Cyberwarfare / Military science / War / Internet-related prefixes / Cyberspace / Crime / Legal aspects of computing / Cyberwarfare in the United States / Computer crimes / Electronic warfare / Hacking

A Call to Cyber Norms Discussions at the Harvard-MIT–University of Toronto Cyber Norms Workshops, 2O11 and 2O12 Belfer Center for Science and International Affairs Kennedy School of Government

Add to Reading List

Source URL: www.americanbar.org

Language: English - Date: 2015-04-15 13:36:38
36Computer security / Crime prevention / National security / Taxation in the United States / Social Security Administration / Social Security / Information security / Static single assignment form / Internet privacy / Security / Computer network security / Cyberwarfare

T-AIMD/HEHSSocial Security Administration: Internet Access to Personal Earnings and Benefits Information

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2007-08-27 15:52:58
37Malware / Financial institution / Cyberwarfare / Credential / Government / War / Public administration / Call report / Bank regulation in the United States / Federal Financial Institutions Examination Council / Federal Deposit Insurance Corporation

Financial Institution Letter FILMarch 30, 2015 Federal Deposit Insurance Corporation 550 17th Street NW, Washington, D.C

Add to Reading List

Source URL: www.fdic.gov

Language: English - Date: 2015-03-30 13:14:24
38Pharmacy / United States Department of Veterans Affairs / Cyberwarfare / United States Computer Emergency Readiness Team / Data breach / Notification system / Internet privacy / Computer security / Security / Consolidated Mail Outpatient Pharmacy

Information Security Monthly Activity Report* February 2015 VA uses a defense-in-depth approach to information security to protect the data we hold on Veterans. While the defense-in-depth approach protects from inbound

Add to Reading List

Source URL: www.va.gov

Language: English
39Cyberwarfare / Consolidated Mail Outpatient Pharmacy / Pharmacy / United States Department of Veterans Affairs / United States Computer Emergency Readiness Team / Data breach / Information security / Internet privacy / Security / Computer security / Data security

Information Security Monthly Activity Report* March 2015 VA uses a defense-in-depth approach to information security to protect the data we hold on Veterans. While the defense-in-depth approach protects from inbound thr

Add to Reading List

Source URL: www.va.gov

Language: English
40Anthem / Health maintenance organization / WellPoint / Cyberwarfare / Blue Cross Blue Shield Association / Phishing / Healthcare in the United States / Cybercrime / Health

Update on Anthem Cyber Attack — General Information for Clients and Brokers What happened? What information has been compromised?

Add to Reading List

Source URL: in.gov

Language: English - Date: 2015-02-12 12:03:03
UPDATE