Department of Defense Strategy for Operating in Cyberspace

Results: 571



#Item
181Government / United States Border Patrol / Public safety / U.S. Customs and Border Protection / United States Coast Guard / U.S. Department of Defense Strategy for Operating in Cyberspace / Department of Defense Strategy for Operating in Cyberspace / Borders of the United States / National security / United States Department of Homeland Security

GAO-12-657T, BORDER SECURITY: Observations on the Costs and Benefits of a Department of Defense Role in Helping to Secure the Southwest Land Border

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2012-04-17 10:31:02
182Defense Information Systems Agency / Cloud computing / United States Department of Defense / Cloud infrastructure / Critical infrastructure protection / U.S. Department of Defense Strategy for Operating in Cyberspace / Computer security / Centralized computing / Computing

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C[removed]CHEF INFORMATION OFFICER

Add to Reading List

Source URL: assets.fiercemarkets.net

Language: English - Date: 2014-12-17 11:48:19
183Defense Information Systems Agency / Cloud computing / United States Department of Defense / Cloud infrastructure / Critical infrastructure protection / U.S. Department of Defense Strategy for Operating in Cyberspace / Computer security / Centralized computing / Computing

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C[removed]CHEF INFORMATION OFFICER

Add to Reading List

Source URL: fcw.com

Language: English - Date: 2014-12-17 10:13:46
184National security / United States Department of Defense / Military science / Critical infrastructure protection / Department of Defense Strategy for Operating in Cyberspace / Government Accountability Office / Open government / Technology assessment

GAO[removed]Highlights, Defense Infrastructure: Risk Assessment Needed to Identify If Foreign Encroachment Threatens Test and Training Ranges

Add to Reading List

Source URL: gao.gov

Language: English - Date: 2014-12-16 13:34:50
185Crime / Computer security / Electronic warfare / Hacking / Military technology / Cooperative Cyber Defence Centre of Excellence / International Multilateral Partnership Against Cyber Threats / Cyberterrorism / Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Cyberwarfare / Security

2014–2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014

Add to Reading List

Source URL: www.mkm.ee

Language: English - Date: 2014-10-21 03:59:50
186Computer security / War / Cyber-security regulation / International Multilateral Partnership Against Cyber Threats / National Cyber Security Division / Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Security / Computer crimes

July 15, 2014 President Barack H. Obama The White House 1600 Pennsylvania Ave Washington, D.C[removed]

Add to Reading List

Source URL: www.eff.org

Language: English - Date: 2014-07-15 20:00:39
187Security / Cyberwarfare / Military science / War / Intellectual property / Computer security / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Electronic warfare / Hacking / Military technology

Opening Statement of the Honorable Fred Upton Subcommittee on Oversight and Investigations Hearing on “Cyber Espionage and the Theft of U.S. Intellectual Property and Technology” July 9, 2013 (As Prepared for Deliver

Add to Reading List

Source URL: energycommerce.house.gov

Language: English - Date: 2013-07-09 10:04:11
188James Andrew Lewis / Cyberwarfare / Military science / War / Canadian Security Intelligence Service / Cyberspace / Center for Strategic and International Studies / Technology / Department of Defense Strategy for Operating in Cyberspace / Electronic warfare / Hacking / Military technology

James Andrew Lewis Center for Strategic and International Studies James Andrew Lewis is a senior fellow and Program Director at CSIS where he writes on technology, security and the international economy. Before joining C

Add to Reading List

Source URL: docs.house.gov

Language: English - Date: 2013-07-08 09:22:20
189Hacking / Military technology / Public safety / Computer security / United States Department of Homeland Security / International Cybercrime / Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Security / Electronic warfare

What is the Cyber Hygiene Campaign? While awareness of the increasing threat of cyber attacks has improved, we all recognize that online behavior has not kept pace--the vast majority of cyber attacks are successful due t

Add to Reading List

Source URL: www.cisecurity.org

Language: English - Date: 2014-09-17 11:48:30
190Hacking / Military technology / Public safety / Computer security / United States Department of Homeland Security / International Cybercrime / Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Security / Electronic warfare

What is the Cyber Hygiene Campaign? While awareness of the increasing threat of cyber attacks has improved, we all recognize that online behavior has not kept pace--the vast majority of cyber attacks are successful due t

Add to Reading List

Source URL: www.cisecurity.org

Language: English - Date: 2014-09-17 11:48:30
UPDATE