Cybersecurity

Addressing Cyber Security Through Public-Private Partnership: An Analysis of Existing Models
The Blueprint to Security
Agencies in Peril: Are We Doing Enough to Protect Federal IT and Secure Sensitive Information?
Be Prepared for Cyberterrorism
Botnets, Cybercrime and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
China Attempting Cyberspace Dominance
Common Risks Impeding the Adequate Protection of Government Information
Critical Infrastructure: Control Systems and the Terrorist Threat
Critical Issues for Cyber Assurance Policy Reform: An Industry Assessment
Critical Infrastructure Protection: Current Cyber Sector-Specific Planning Approach Needs Reassessment
Cyber Crime: Public and Private Entities Face Challenges in Addressing Cyber Threats
Cyberinfrastructure Vision for 21st Century Discovery
Cyber Security: Emerging Threats, Vulnerabilities, and Challenges in Securing Federal Information Systems, Testimony 1 of 5
Cyber Insecurity: Hackers are Penetrating Federal Systems and Critical
Cyber Security: A Crisis of Prioritization
ber Security: Emerging Threats, Vulnerabilities, and Challenges in Securing Federal Information Systems, Testimony 4 of 5
Cyber Security: Emerging Threats, Vulnerabilities, and Challenges in Securing Federal Information Systems, Testimony 2 of 5
Cyber Security: Emerging Threats, Vulnerabilities, and Challenges in Securing Federal Information Systems, Testimony 3 of 5
Cyber Security: Emerging Threats, Vulnerabilities, and Challenges in Securing Federal Information Systems, Testimony 5 of 5
Cyber Storm: Exercise Report
Cybersecurity: Everybody’s Imperative. Protecting our Economies, Governments, and Citizens
Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress
Data Mining and Homeland Security: An Overview
Data Security Breaches: Context and Incident Summaries
Deterring Violent Non-State Actors in Cyberspace
DHS Cyber Preparedness E-Newsletter
House Permanent Select Committee on Intelligence, Cyber Security Hearing – Paul B. Kurtz
Information Security: Although Progress Reported, Federal Agencies Need to Resolve Significant Deficiencies
House Permanent Select Committee on Intelligence, Cyber Security Hearing – John Nagengast
House Permanent Select Committee on Intelligence, Cyber Security Hearing – Amit Yoran
Independent Commission Examines Nation’s Cyber Vulnerabilities
Insider Threat Study: Illicit Cyber Activity in the Information Technology and Telecommunications Sector
Internet Infrastructure: Challenges in Developing a Public/Private Recovery Plan
National Cyber Security: Research and Development Challenges Related to Economics, Physical Infrastructure and Human Behavior
Internet Epidemiology
Privacy Rights Clearinghouse: A Chronology of Data Breaches
“Report to the President: Cyber Security: A Crisis of Prioritization”
Review of Web Applications Security and Intrusion Detection in Air Traffic Control Systems (Federal Aviation Administration)
Securing Cyberspace for the 44th Presidency
Terrorist Capabilities for Cyberattack: Overview and Policy Issues
Center for Identity Management and Information Protection (CIMIP)
Cyber Security: Developing a National Strategy
Cybersecurity for Critical Infrastructure Protection
Cyber Attacks: Protecting Industry Against Growing Threats, Testimony of Michael P. Merritt
Cyber Attacks: Protecting Industry Against Growing Threats, Testimony of Philip Reitinger
Cyber Attacks: Protecting Industry Against Growing Threats, Testimony of Robert O. Carr
Cyber Attacks: Protecting Industry Against Growing Threats, Testimony of William B. Nelson
Cybersecurity – Assessing Our Vulnerabilities and Developing An Effective Defense [Witness Testimony of Eugene H. Spafford]
testimony 4 of 4
Cybersecurity – Assessing Our Vulnerabilities and Developing An Effective Defense [Witness Testimony of Edward Amoroso]
testimony 3 of 4
Cybersecurity – Assessing Our Vulnerabilities and Developing An Effective Defense [Witness Testimony of James A. Lewis]
testimony 1 of 4
Essential Steps to Strengthen America’s Cyber Terrorism Preparedness
Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations
Cybersecurity – Assessing Our Vulnerabilities and Developing An Effective Defense [Witness Testimony of Joseph M. Weiss]
testimony 2 of 4
Internet Infrastructure: Challenges in Developing a Public/Private Recovery Plan
Federal Progress Report for 2006
How Can We Protect Our Critical Infrastructure from Cyber Attacks?
Mobilizing Information to Prevent Terrorism: Accelerating Development of a Trusted Information Sharing Environment
NIST Database Tracks Software Weaknesses
Internet Security Intelligence Briefing
Planning for Certain High Risk Security Threats
“Reviewing the Federal Cybersecurity Mission” Hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology
Report to the President’s Commission on Critical Infrastructure Protection
Twenty Most Important Controls and Metrics for Effective Cyber Defense and Continuous FISMA Compliance
Understanding and Defending Against Foreign Cyber-Threats
Are Your IDs Secure Enough?
Countering Financial Crime Risks in Information Security: Financial Crime Sector Report
Guidelines for Securing Radio Frequency Identification (RFID) Systems
Mazu Networks Announces Availability of Internal Threat Report: State of Internal Security Poses Significant Risk to Corporate Networks
What Will You Do When the Cyber-Levee Breaks?
2003 National Strategy to Secure Cyberspace
Assessing Cybersecurity Activities at NIST and DHS, Testimony of Mark Bregman
Assessing Cybersecurity Activities at NIST and DHS, Testimony of Gregory C. Wilshusen
Assessing Cybersecurity Activities at NIST and DHS, Testimony of Scott Charney
Assessing Cybersecurity Activities at NIST and DHS, Testimony of Jim Harper
“Cyber Security Agenda for the Next Administration: Proposals by the Cyber Security Industry Alliance”
Cyberspace as a Warfighting Domain: Policy, Management and Technical Challenges to Mission Assurance, Testimony of Lt. Gen. Keith Alexander
Cyberspace as a Warfighting Domain: Policy, Management and Technical Challenges to Mission Assurance, Testimony of Robert Carey
Cyberspace as a Warfighting Domain: Policy, Management and Technical Challenges to Mission Assurance, Testimony of Robert Lentz
Cyberspace as a Warfighting Domain: Policy, Management and Technical Challenges to Mission Assurance, Testimony of William Shelton
Hacker Attacks Hitting Pentagon: But NSA’s Methods for Safeguarding Data Are Growing Obsolete
National Agenda for Information Security in 2006
Report to the President: Cyber Security: A Crisis of Prioritization
World-Wide Information Sharing and Analysis Center (ISAC) Website
Information Security: Agencies Make Progress in Implementation of Requirements, but Significant Weaknesses Persist
Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
Cyber Security Recommendations for the Next Administration Hearing: Cyber Analysis and Warning- DHS Faces Challenges in Establishing a Comprehensive National Capability (GAO report 1)
Cyber Security Recommendations for the Next Administration Hearing: Critical Infrastructure Protection- DHS Needs to Fully Address Lessons Learned from Its First Cyber Storm Exercise (GAO report 2)
Cyber Security Recommendations for the Next Administration: Information Technology- Federal Laws, Regulations, and Mandatory Standards for Securing Private Sector Information Technology Systems and Data in Critical Infrastructure Sectors (GAO report 3)
Cyber Security Recommendations for the Next Administration Hearing: Powner Testimony
Cyber Security Recommendations for the Next Administration Hearing: Testimonies of Lewis, Raduege, and Kurtz
DHS Conducts First Full-Scale Cyber Security Exercise to Enhance Nation’s Cyber Preparedness
Prioritizing Cyber Vulnerabilities: Final Report and Recommendation by the Council
Information Technology Information Sharing and Analysis Center
The Information Warfare Site
Stay Safe Online