Cyberwarfare in the United States

Results: 459



#Item
41Deterring Malicious Behavior in Cyberspace Scott Jasper Abstract Recent incidents reveal cyberattacks are being employed and honed in a systematic, coordinated fashion to achieve the objectives of malicious actors. Deter

Deterring Malicious Behavior in Cyberspace Scott Jasper Abstract Recent incidents reveal cyberattacks are being employed and honed in a systematic, coordinated fashion to achieve the objectives of malicious actors. Deter

Add to Reading List

Source URL: www.au.af.mil

Language: English - Date: 2015-02-19 16:04:11
42Submission to the National Commission of Audit from the Australian Strategic Policy Institute (ASPI) regarding National Security Overview This submission addresses the National Commission of Audit’s terms of reference

Submission to the National Commission of Audit from the Australian Strategic Policy Institute (ASPI) regarding National Security Overview This submission addresses the National Commission of Audit’s terms of reference

Add to Reading List

Source URL: aspi.org.au

Language: English - Date: 2014-02-13 22:52:14
43Department of Defense Cyberspace Policy Report A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934 November 2011

Department of Defense Cyberspace Policy Report A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934 November 2011

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 20:17:00
44

PDF Document

Add to Reading List

Source URL: www.fox-it.com

Language: English - Date: 2015-04-23 09:10:05
45

PDF Document

Add to Reading List

Source URL: www.langner.com

Language: English - Date: 2015-01-11 10:26:05
46In a flurry of activity, the U.S. House of Representatives last week passed two cybersecurity information sharing bills. Both the House Intelligence Committee and the House Homeland Security Committee had approved separa

In a flurry of activity, the U.S. House of Representatives last week passed two cybersecurity information sharing bills. Both the House Intelligence Committee and the House Homeland Security Committee had approved separa

Add to Reading List

Source URL: www.isaca.org

Language: English - Date: 2015-04-28 10:54:36
47Policy Brief • MayQuarterly Journal: International Security Exaggerating the Chinese Cyber Threat BOTTOM LINES

Policy Brief • MayQuarterly Journal: International Security Exaggerating the Chinese Cyber Threat BOTTOM LINES

Add to Reading List

Source URL: belfercenter.ksg.harvard.edu

Language: English - Date: 2015-05-05 15:45:46
48Sharing Cyber Security Information - Good Practice Stemming from the Dutch Public-Private Approach

Sharing Cyber Security Information - Good Practice Stemming from the Dutch Public-Private Approach

Add to Reading List

Source URL: publications.tno.nl

Language: English
49deloitte on technology No Such Thing as Hacker-proof Security breaches breakdown Top causes of data breaches1

deloitte on technology No Such Thing as Hacker-proof Security breaches breakdown Top causes of data breaches1

Add to Reading List

Source URL: deloitte.wsj.com

Language: English
50Volume II  Issue 1 CYBER MEDIA WATCH Cyber Security

Volume II Issue 1 CYBER MEDIA WATCH Cyber Security

Add to Reading List

Source URL: www.orfonline.org

Language: English - Date: 2014-01-15 02:52:18