Back to Results
First PageMeta Content
Computer security / Crime prevention / United States Department of Homeland Security / Cyber security standards / Internet Security Alliance / Critical infrastructure protection / Cyberterrorism / Melissa Hathaway / Information security / Cyberwarfare / Security / National security


ISSUE AREA 3: NORMS OF BEHAVIOR
Add to Reading List

Document Date: 2012-11-15 16:01:23


Open Document

File Size: 103,08 KB

Share Result on Facebook

Company

Control data / PricewaterhouseCoopers / Verizon / /

Country

United States / /

Currency

USD / /

Facility

Carnegie Mellon University / National Institute of Standards and Technology Standards / American National Standards Institute / /

IndustryTerm

corporate networks / electronic infrastructure / energy infrastructure / Internet energy / insurance benefits / secure cyber network / campaign finance / public utilities / information security technology / physical security technology / telephone networks / cyber infrastructure / bank / telecommunications / cyber security technology / social network / INTERNET MAY / practices / cyber systems / /

Organization

Role Government / Government’s Role Government / Internet Subcommittee / International Standards Organization / US government / American National Standards Institute / National Intelligence / Telecommunications and Internet Subcommittee / Energy and Commerce Committee / Aerospace Industries Alliance / Congress / Institute of Standards and Technology Standards / Internet Security Alliance / federal government / Central Intelligence Agency / Obama administration / ISA Board / INTERNET SECURITY ALLIANCE HOUSE SUBCOMMITTEE ON COMMUNICATIONS / Carnegie Mellon University / NASD / /

Person

Obama / Larry Clinton / Robert Bigman / Hillary Clinton / TESTIMONY LARRY CLINTON / Assurance / Melissa E. Hathaway / Bush / Mike McConnell / /

Position

PRESIDENT / Acting Senior Director / Advisor to President Bush / Secretary of State / Chief / Director / Role The President / /

Technology

use encryption / mostly physical security technology / cyber security technology / information security technology / using cyber security technology / /

SocialTag