Back to Results
First PageMeta Content
Electronic warfare / Hacking / Computer crimes / Computer network security / Operation Aurora / Industrial espionage / Computer insecurity / Computer security / Threat / Cybercrime / Cyberwarfare / Espionage


Rethinking the Cyber Threat A Framework and Path Forward SCOTT CHARNEY Corporate Vice President Trustworthy Computing Group
Add to Reading List

Document Date: 2010-05-02 19:30:31


Open Document

File Size: 537,90 KB

Share Result on Facebook

City

Redmond / /

Company

The New York Times / Microsoft Corp. / Google / /

Country

United States / /

Facility

Pearl Harbor / /

IndustryTerm

authentication technologies / Online Attacks / widespread Internet connectivity / law enforcement mechanisms / supply chain / security response systems / information technology systems / Low cost computer technology / search warrants / law enforcement personnel / law enforcement execution / infrastructure services / computer technology / disrupting critical infrastructure services / /

Organization

End-to-End Trust / Council of Europe Convention / Department of Defense / Chinese Government / U.S. Department of Defense / /

Person

SCOTT CHARNEY / Steve Ragan / /

Position

Vice President Trustworthy Computing Group Microsoft Corporation The information / bad actor / /

Product

Microsoft Corporation Portable Audio Device / /

ProgrammingLanguage

php / /

ProvinceOrState

Washington / /

PublishedMedium

The New York Times / /

Technology

authentication technologies / Low cost computer technology / information technology / computer technology / /

URL

http /

SocialTag