Cyberwarfare in the United States

Results: 459



#Item
41Electronic warfare / Nuclear strategies / Military technology / International security / Cyberwarfare / Deterrence theory / United States Cyber Command / U.S. Department of Defense Strategy for Operating in Cyberspace / Department of Defense Strategy for Operating in Cyberspace / Military science / International relations / Hacking

Deterring Malicious Behavior in Cyberspace Scott Jasper Abstract Recent incidents reveal cyberattacks are being employed and honed in a systematic, coordinated fashion to achieve the objectives of malicious actors. Deter

Add to Reading List

Source URL: www.au.af.mil

Language: English - Date: 2015-02-19 16:04:11
42United States Department of Homeland Security / Cyberwarfare / Public safety / Security engineering / International Multilateral Partnership Against Cyber Threats / Critical infrastructure protection / Computer security / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / National security / Security / Computer crimes

Submission to the National Commission of Audit from the Australian Strategic Policy Institute (ASPI) regarding National Security Overview This submission addresses the National Commission of Audit’s terms of reference

Add to Reading List

Source URL: aspi.org.au

Language: English - Date: 2014-02-13 22:52:14
43Electronic warfare / Hacking / Military technology / Cyberwarfare / National security / Military organization / United States Cyber Command / Department of Defense Cyber Crime Center / U.S. Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Military science / Department of Defense Strategy for Operating in Cyberspace

Department of Defense Cyberspace Policy Report A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934 November 2011

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 20:17:00
44Computer security / Computer crimes / Hacking / International Multilateral Partnership Against Cyber Threats / Advanced persistent threat / Threat / Stuxnet / Department of Defense Cyber Crime Center / Cyberwarfare in the United States / Cyberwarfare / Security / Computer network security

PDF Document

Add to Reading List

Source URL: www.fox-it.com

Language: English - Date: 2015-04-23 09:10:05
45Security / Nuclear safety / Safety / Nuclear Regulatory Commission / Rockville /  Maryland / North American Electric Reliability Corporation / Federal Energy Regulatory Commission / Nuclear safety in the United States / Critical infrastructure protection / Nuclear energy in the United States / National security / Cyberwarfare

PDF Document

Add to Reading List

Source URL: www.langner.com

Language: English - Date: 2015-01-11 10:26:05
46Cyberwarfare / Electronic warfare / Hacking / Military technology / National security / International Multilateral Partnership Against Cyber Threats / United States Department of Homeland Security / Computer security / National Cyber Security Division / Security / Computer crimes / Public safety

In a flurry of activity, the U.S. House of Representatives last week passed two cybersecurity information sharing bills. Both the House Intelligence Committee and the House Homeland Security Committee had approved separa

Add to Reading List

Source URL: www.isaca.org

Language: English - Date: 2015-04-28 10:54:36
47Security / National security / Military science / Electronic warfare / Military technology / Industrial espionage / Cyber spying / International Multilateral Partnership Against Cyber Threats / Cyberwarfare in the United States / Cyberwarfare / Computer crimes / Hacking

Policy Brief • MayQuarterly Journal: International Security Exaggerating the Chinese Cyber Threat BOTTOM LINES

Add to Reading List

Source URL: belfercenter.ksg.harvard.edu

Language: English - Date: 2015-05-05 15:45:46
48National security / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / United States Department of Homeland Security / Computer security / Crime / National Cyber Security Division / Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Security / Cyberwarfare

Sharing Cyber Security Information - Good Practice Stemming from the Dutch Public-Private Approach

Add to Reading List

Source URL: publications.tno.nl

Language: English
49Hacking / Military technology / Security / War / Crime / Computer security / Cyber-security regulation / Cyberwarfare in the United States / Cyberwarfare / Electronic warfare / Computer crimes

deloitte on technology No Such Thing as Hacker-proof Security breaches breakdown Top causes of data breaches1

Add to Reading List

Source URL: deloitte.wsj.com

Language: English
50Electronic warfare / Hacking / Military technology / War / Military / United States Cyber Command / National Cyber Security Division / International Multilateral Partnership Against Cyber Threats / Cyberwarfare in the United States / Cyberwarfare / Computer crimes / Military science

Volume II Issue 1 CYBER MEDIA WATCH Cyber Security

Add to Reading List

Source URL: www.orfonline.org

Language: English - Date: 2014-01-15 02:52:18
UPDATE