National Cyber Security Policy

Results: 150



#Item
81UPDATED – Analysis of the Cybersecurity Information Sharing Act of 2014: A Major Step Back on Privacy Robyn Greene, Policy Counsel The Cybersecurity Information Sharing Act of[removed]CISA) (S[removed]i takes a significant

UPDATED – Analysis of the Cybersecurity Information Sharing Act of 2014: A Major Step Back on Privacy Robyn Greene, Policy Counsel The Cybersecurity Information Sharing Act of[removed]CISA) (S[removed]i takes a significant

Add to Reading List

Source URL: oti.newamerica.net

Language: English - Date: 2014-07-11 18:34:27
82Energy & Infrastructure Program Energy Project National Security Program Homeland Security Project

Energy & Infrastructure Program Energy Project National Security Program Homeland Security Project

Add to Reading List

Source URL: bipartisanpolicy.org

Language: English - Date: 2014-02-27 15:33:26
83At the Nexus of Cybersecurity and Public Policy Some Basic Concepts and Issues Computer Science and Telecommunications Board ∙ Division on Engineering & Physical Sciences ∙ May 2014 Our nation is increasingly depende

At the Nexus of Cybersecurity and Public Policy Some Basic Concepts and Issues Computer Science and Telecommunications Board ∙ Division on Engineering & Physical Sciences ∙ May 2014 Our nation is increasingly depende

Add to Reading List

Source URL: sites.nationalacademies.org

Language: English - Date: 2014-09-16 13:39:25
84a report of the technology and public policy program Conflict and Negotiation in Cyberspace

a report of the technology and public policy program Conflict and Negotiation in Cyberspace

Add to Reading List

Source URL: csis.org

Language: English - Date: 2013-02-08 15:53:29
85UPDATED – Analysis of the Cybersecurity Information Sharing Act of 2014: A Major Step Back on Privacy Robyn Greene, Policy Counsel The Cybersecurity Information Sharing Act of[removed]CISA) (S[removed]i takes a significant

UPDATED – Analysis of the Cybersecurity Information Sharing Act of 2014: A Major Step Back on Privacy Robyn Greene, Policy Counsel The Cybersecurity Information Sharing Act of[removed]CISA) (S[removed]i takes a significant

Add to Reading List

Source URL: newamerica.net

Language: English - Date: 2014-07-11 18:17:24
86CHAPTER 1 Cyberpower and National Security: Policy Recommendations for a Strategic Framework Franklin D. Kramer CYBERPOWER is now a fundamental fact of g lobal life. In political, economic, and military affairs, informat

CHAPTER 1 Cyberpower and National Security: Policy Recommendations for a Strategic Framework Franklin D. Kramer CYBERPOWER is now a fundamental fact of g lobal life. In political, economic, and military affairs, informat

Add to Reading List

Source URL: ctnsp.dodlive.mil

Language: English - Date: 2014-03-31 15:04:27
87Hardening The HumanOS Executive Summary Computers store, process and transfer data that is valuable to your organization. As a result, they have been the primary target for cyber attackers. Years ago, exploiting computer

Hardening The HumanOS Executive Summary Computers store, process and transfer data that is valuable to your organization. As a result, they have been the primary target for cyber attackers. Years ago, exploiting computer

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2013-06-20 07:36:29
88Cyber Security Internet and Acceptable Use Policy Template A Non-Technical Guide Essential for Business Managers

Cyber Security Internet and Acceptable Use Policy Template A Non-Technical Guide Essential for Business Managers

Add to Reading List

Source URL: www.mi.gov

Language: English - Date: 2012-12-07 21:03:09
89April 29, 2013  Via Electronic Filing Office of Policy Analysis and Development National Telecommunications and Information Administration

April 29, 2013 Via Electronic Filing Office of Policy Analysis and Development National Telecommunications and Information Administration

Add to Reading List

Source URL: www.tiaonline.org

Language: English - Date: 2013-04-30 10:14:13
90Crime prevention / National security / Electronic commerce / Computer security / Password / Access control / System administrator / Hacker / Authorization / Security / Computing / Identity management

Information Technology Cyber Security Policy (Insert Name of Organization)

Add to Reading List

Source URL: www.illinois.gov

Language: English - Date: 2013-04-20 20:46:57