Department of Defense Strategy for Operating in Cyberspace

Results: 571



#Item
311U.S. Department of Defense Strategy for Operating in Cyberspace / Department of Defense Strategy for Operating in Cyberspace / Military acquisition / Military science / DARPA

THE DEPARTMENT OF DEFENSE CRITICAL TECHNOLOGIES PLAN FOR THE COMMITTEES ON ARMED SERVICES

Add to Reading List

Source URL: www.dod.mil

Language: English - Date: 2012-11-06 09:36:49
312National security / Under Secretary of Defense for Policy / Assistant Secretary of Defense for Public Affairs / United States Department of Defense / Global Information Grid / Under Secretary of Defense for Acquisition /  Technology and Logistics / Defense Intelligence Agency / Critical infrastructure protection / U.S. Department of Defense Strategy for Operating in Cyberspace / Military science / United States federal executive departments / Military acquisition

DoD Directive[removed], January 14, 2010; Incorporating Change 2, September 21, 2012

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2012-11-19 09:32:04
313Cyberwarfare / National Strategy to Secure Cyberspace / Public safety / National security / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / United States Department of Homeland Security / DHS Directorate for Science and Technology / War

Press Office U.S. Department of Homeland Security Press Release October 24, 2012 Contact: DHS S&T Press Office at[removed]

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2013-06-21 12:14:34
314Military acquisition / Government / Military-industrial complex / Defense Intelligence Agency / United States Armed Forces / DARPA / U.S. Department of Defense Strategy for Operating in Cyberspace / Department of Defense Strategy for Operating in Cyberspace / United States Department of Defense / Military science / United States federal executive departments

DEPARTMENT OF DEFENSE Funding Highlights: • Provides $525.4 billion in discretionary funding for the base Department of Defense budget, a decrease of 1 percent, or $5.1 billion, below the 2012 enacted level. This wil

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2012-02-13 11:19:51
315Computer security / Crime prevention / Counter-intelligence / Military intelligence / Counterintelligence / Information security / Information assurance / U.S. Department of Defense Strategy for Operating in Cyberspace / Department of Defense Strategy for Operating in Cyberspace / Security / National security / Espionage

TSP-ITD CLIENT LISTING - SERVICES PROVIDED

Add to Reading List

Source URL: www.insiderthreatdefense.com

Language: English - Date: 2014-03-11 17:07:34
316Insider / Security controls / Cyberwarfare / Information security / Information assurance / National Security Agency / U.S. Department of Defense Strategy for Operating in Cyberspace / Department of Defense Strategy for Operating in Cyberspace / Security / Computer security / National security

Espionage-Insider Threat Timeline

Add to Reading List

Source URL: www.insiderthreatdefense.com

Language: English - Date: 2014-03-11 21:22:00
317Electronic warfare / Military technology / Military science / War / Military / Cooperative Cyber Defence Centre of Excellence / National Cybersecurity Center / Cyberwarfare in the United States / Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Computer crimes / Hacking

Concordiam per VOLUME 5, ISSUE 2, 2014 Journal of European Security and Defense Issues

Add to Reading List

Source URL: www.marshallcenter.org

Language: English - Date: 2014-06-05 04:50:06
318Computer security / Technology / Security / Electronic warfare / Military technology / Twitter / Internet security / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / Computer network security / Hacking / Cyberwarfare

FOR IMMEDIATE RELEASE Contact: Kristen Anderson[removed]ext[removed]removed] Half of All Federal Agency Security Breaches Caused by Lack of User Compliance;

Add to Reading List

Source URL: www.meritalk.com

Language: English - Date: 2013-11-19 12:24:00
319Cyberspace / Information Age / Virtual reality / William Gibson / Computer security / Internet-related prefixes / Cyberpunk / Contemporary history / Department of Defense Strategy for Operating in Cyberspace / Security / National security / Cyberwarfare

AGENDA CICIR – CSIS Talks on Cybersecurity December 17, 2009 Washington, DC Session I: Cyberspace and International Security - 9:00 am – 12:00 pm No nation by itself can adequately secure cyberspace. However, there i

Add to Reading List

Source URL: csis.org

Language: English - Date: 2012-09-17 12:55:51
320Government procurement in the United States / Procurement / 3M / Defense industry / Under Secretary of Defense for Acquisition /  Technology and Logistics / Government / U.S. Department of Defense Strategy for Operating in Cyberspace / Department of Defense Strategy for Operating in Cyberspace / Military acquisition / Business / Technology

Count on Commercial Solutions To Maintain Technological Superiority By Rory J. Yanchek and Richard N. Kuyath

Add to Reading List

Source URL: www.ausa.org

Language: English - Date: 2014-07-14 15:57:05
UPDATE