National Strategy to Secure Cyberspace

Results: 120



#Item
91National security / Cyberwarfare / National Cyber Security Alliance / National Cyber Security Awareness Month / Computer security / National Strategy to Secure Cyberspace / Cyber-security regulation / United States Department of Homeland Security / Security / Public safety

STATE/Territory of _______________________ Office of the Governor State Capitol WHEREAS, we recognize the vital role that technology has in our daily lives and in the future of our Nation, whereby today many citizens, sc

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2013-09-04 07:30:18
92Electronic warfare / Military technology / Internet / Internet ethics / Spyware / Internet privacy / Cyber-security regulation / National Strategy to Secure Cyberspace / Espionage / Hacking / Cyberwarfare

CERTIFICATE of RECOGNITION By virtue of the authority vested by the Constitution in the Governor of the Commonwealth of Virginia, there is hereby officially recognized: CYBER SECURITY AWARENESS MONTH WHEREAS, Virginia re

Add to Reading List

Source URL: www.vita.virginia.gov

Language: English - Date: 2013-09-18 14:04:30
93Public safety / National Cyber Security Division / United States Computer Emergency Readiness Team / Critical infrastructure protection / National Strategy to Secure Cyberspace / Homeland Security Act / Cyberwarfare / International Cybercrime / National Response Framework / United States Department of Homeland Security / National security / Computer security

Mississippi Incident Specific – Cyber Incident Annex Federal Coordinating Agencies Coordinating Agencies Department of Defense Department of Homeland Security/ Information Analysis and

Add to Reading List

Source URL: www.msema.org

Language: English - Date: 2012-07-26 16:52:36
94Cyberwarfare / Computer network security / Computer security / Secure communication / Critical infrastructure protection / National Cyber Security Division / Department of Defense Strategy for Operating in Cyberspace / National security / Security / United States Department of Homeland Security

Cybersecurity Letters to House and Congress, signed

Add to Reading List

Source URL: m.whitehouse.gov

Language: English - Date: 2011-05-12 16:09:45
95Computer security / International Multilateral Partnership Against Cyber Threats / United States Department of Homeland Security / National Strategy to Secure Cyberspace / Phishing / IT risk / National Cyber Security Division / International Cybercrime / Cybercrime / Computer crimes / Security

MICROSOFT RESPONSE TO THE DEPARTMENT OF COMMERCE NOTICE OF INQUIRY ON CYBERSECURITY, INNOVATION AND THE INFORMATION ECONOMY Docket No.: [removed] Dated: September 20, 2010 Microsoft Corporation (Microsoft) files

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-10-04 10:20:59
96Electronic commerce / Public-key cryptography / Phishing / Spamming / National Strategy for Trusted Identities in Cyberspace / Online shopping / Password / HTTP Secure / Identity theft / Cryptography / Key management / Computer network security

Via electronic email to [removed] September 20, 2010 Office of the Secretary National Telecommunications and Information Administration International Trade Administration

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-10-04 10:23:47
97Cyberwarfare / Hacking / Software testing / Computer network security / Industrial automation / SCADA / Industrial control system / Vulnerability / National Strategy to Secure Cyberspace / Technology / Telemetry / Computer security

OFFICE OF INSPECTOR GENERAL Catalyst for Improving the Environment Briefing Report EPA Needs to Determine What Barriers

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2012-05-31 22:07:56
98Computer network security / United States Department of Homeland Security / Hacking / Critical infrastructure protection / Infrastructure / Insider / National Strategy to Secure Cyberspace / Attack / Vulnerability / Computer security / Security / National security

Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors Executive Summary Michelle Keeney, J.D., Ph.D. Eileen Kowalski National Threat Assessment Center

Add to Reading List

Source URL: www.secretservice.gov

Language: English - Date: 2005-05-13 06:09:06
99Cyberwarfare / Computer security / Computer crimes / Security engineering / National Cyber Security Division / Critical infrastructure protection / SCADA / National Strategy to Secure Cyberspace / International Multilateral Partnership Against Cyber Threats / National security / United States Department of Homeland Security / Security

GAO[removed]Critical Infrastructure Protection: Challenges and Efforts to Secure Control Systems

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2005-09-14 09:46:36
100Computer crimes / Cyberwarfare / Military science / Security / War / Cyberspace / Internet-related prefixes / Computer security / National Strategy to Secure Cyberspace / Electronic warfare / Hacking / Military technology

The UK Cyber Security Strategy

Add to Reading List

Source URL: www.gov.uk

Language: English - Date: 2013-01-16 14:54:42
UPDATE