Back to Results
First PageMeta Content
Computer crimes / Military science / United States Department of Homeland Security / Electronic warfare / Military technology / United States Cyber Command / Critical infrastructure protection / Howard Schmidt / National Strategy to Secure Cyberspace / National security / Cyberwarfare / Security


Proceedings of a Workshop on Deterring CyberAttacks: Informing Strategies and Developing Options for U.S. Policy Committee on Deterring Cyberattacks: Informing Strategies and Developing Options; National Research Council
Add to Reading List

Document Date: 2014-10-25 10:17:11


Open Document

File Size: 264,77 KB

Share Result on Facebook

Company

Team Telecom / Red Branch Consulting PLLC / National Academies Press / DoD Software / Counterfeit Electronics / Check Point Software Technologies / National Academes Press / Sourcefire / /

Country

Iraq / Germany / Saudi Arabia / United States / /

Currency

USD / ZAR / /

/

Event

M&A / Employment Change / /

Facility

Institute of Medicine / Duke University / Kenneth Dam / University School / /

IndustryTerm

transportation / law enforcement support / non-domestic software / computer technology / system supplier / cyber infrastructure / telecommunications / information technology / cyber products / law enforcement / Web address / intelligence gathering tool / cyber systems / government systems / internal computer networks / stable solution / infrastructure / unacceptable products / defensive mechanisms and whose networks / off the shelf technology / interagency working / cyber networks / electronics / privacy protective systems / connectivity network / /

Movie

Winnie the Pooh / For the first time / /

Organization

National Research Council / U.S. Policy Committee on Deterring Cyberattacks / National Infrastructure Assurance Council / Space Command / Defense Science Board / U.S. government / U.S. Securities and Exchange Commission / Army / Intelligence Advisory Board / Navy / Senate / Duke University / Academy of Engineering / Bureau of Industry and Security / Committee on Foreign Investments / ABA Information Security Committee / Federal Communications Commission / Central Intelligence Agency / Joint Functional Component Command / United States Senate Armed Services Committee / Privacy and Civil Liberties Oversight Board / United States Trade Representative / Department of Commerce / Air Force / U.S. Strategic Command / Coordinating Government / National Security Agency / United States Cyber Command / Institute of Medicine / National Intelligence / National Academy of Sciences / Federal Bureau of Investigation / Department of Justice / United States Government / Anticounterfeiting Task Force / National Guard / White House / federal government / Semiconductor Industry Association / U.S. Cyber Command / Fleet Cyber Command / National Security Council / Committee on Foreign Investment / Congressional Research Service / George Washington University School of Law / Department of Defense Homeland Security and Homeland Defense Exercises / Department of Homeland Security / Department of Defense / Intelligence Oversight Board / U.S. military / /

Person

Obama / Clinton / Robert K. Knake / Keith Alexander / Howard Schmidt / Michael Aisenberg / Nicholas Rueter / Cyber War / Bush / Herbert Lin / Richard A. Clarke / Martin Libicki / /

/

Position

policy coordinator / Advisor / National Coordinator / President / Recent Developments President / first nominated commander / Efforts President / President and Cybersecurity Coordinator / Secretary / Private Sector / state actor / author / Executive / first Special Assistant / representative / Lieutenant General / Cybersecurity Coordinator / Secretary of Defense / various Executive / coordinator / Director / Co-chair / commander / Private / Harper / /

ProvinceOrState

Washington / /

PublishedMedium

the National / the Cyber Space Policy Review / /

Technology

information technology / html / operating systems / PDF / off the shelf technology / COTS computer technology / /

URL

http /

SocialTag