Top 20+ cyber security 2009

1 CSIIRW: Cyber Security and Information Intelligence Research

Table of Contents

  • Author: dl.acm.org
  • Published: 06/22/2022
  • Review: 4.91 (766 vote)
  • Summary: CSIIRW ’09: Proceedings of the 5th Annual Workshop on Cyber Security and Information … Research Workshop Oak Ridge Tennessee USA April 13 – 15, 2009

2 NSCI Cyber Reference Library – National Security Cyberspace Institute

  • Author: nsci-va.org
  • Published: 09/29/2021
  • Review: 4.64 (536 vote)
  • Summary: National Security Cyberspace Institute Cyberspace Reference Library. … Roadmap for Cybersecurity Research; Department of Homeland Security (November 2009) 

3 The New Policy World of Cybersecurity – jstor

  • Author: jstor.org
  • Published: 04/07/2022
  • Review: 4.54 (204 vote)
  • Summary: structure Protection Plan (NIPP) (2006, updated in 2009). The focus of this historic document was on infrastructure, not cyber security

4 2009 Cyberspace Policy Review | CISA

  • Author: cisa.gov
  • Published: 02/26/2022
  • Review: 4.37 (519 vote)
  • Summary: The nation needs to develop the policies, processes, people, and technology required to mitigate cybersecurity related risks. Information and communications 

5 [PDF] Cyber Storm II Final Report – Homeland Security Digital Library

  • Author: hsdl.org
  • Published: 05/11/2022
  • Review: 4.14 (514 vote)
  • Summary: CYBER STORM II. Final Report. July 2009. Department of Homeland Security. Office of Cybersecurity and Communications. National Cyber Security Division

6 Fact Sheet: Executive Order on Cybersecurity / Presidential Policy

  • Author: dhs.gov
  • Published: 06/18/2022
  • Review: 3.84 (363 vote)
  • Summary: · Critical infrastructure – both physical and cyber – is the backbone … In May 2009, President Obama declared our digital infrastructure a 

7 Federal Authority Over the Internet? The Cybersecurity Act of 2009

  • Author: eff.org
  • Published: 05/22/2022
  • Review: 3.71 (209 vote)
  • Summary: · There’s a new bill working its way through Congress that is cause for some alarm: the Cybersecurity Act of 2009 (PDF summary here), 

8 S.773 – 111th Congress (2009-2010): Cybersecurity Act of 2010

  • Author: congress.gov
  • Published: 06/09/2022
  • Review: 3.42 (561 vote)
  • Summary: Authorizes the President, in the event of an immediate threat to strategic national interests involving compromised federal government or U.S. critical 

9 (PDF) The Cybersecurity Triad: Government, Private Sector Partners

  • Author: researchgate.net
  • Published: 08/16/2021
  • Review: 3.27 (228 vote)
  • Summary: · PDF | In May 2009, the Obama administration released its, Cyberspace Policy Review: Assuring a Trusted and Resilient Information and 

10 International Cybersecurity Strategy: Deterring Foreign Threats and

  • Author: 2009-2017.state.gov
  • Published: 04/27/2022
  • Review: 3.03 (360 vote)
  • Summary: · Since 2009, the United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context 

11 The Comprehensive National Cybersecurity Initiative

  • Author: obamawhitehouse.archives.gov
  • Published: 12/23/2021
  • Review: 2.95 (81 vote)
  • Summary: The Comprehensive National Cybersecurity Initiative. President Obama has identified cybersecurity as one of the most serious economic and national security 

12 Shaping Preventive Policy in “Cyber War” and Cyber Security – CSIAC

  • Author: csiac.org
  • Published: 06/12/2022
  • Review: 2.75 (113 vote)
  • Summary: Part I will draw distinctions in cyber security, specifically between attempted … Scott Charney, Rethinking the Cyber Threat, Microsoft (2009), 

13 Top 10 most notorious cyber attacks in history – Slideshow – ARN

  • Author: arnnet.com.au
  • Published: 05/01/2022
  • Review: 2.59 (164 vote)
  • Summary: Google China hit by cyber attack (2009): When Google’s Chinese headquarters detected a security breech in mid-December, it opened up a whole can of worms 

14 Hundreds more cyber attacks linked to 2009 Google breach – Reuters

  • Author: reuters.com
  • Published: 11/22/2021
  • Review: 2.52 (150 vote)
  • Summary: · BOSTON (Reuters) – The hacker group that attacked Google Inc in 2009 has launched hundreds of other cyber assaults since then, 

15 Cyber Security Strategy – an overview | ScienceDirect Topics

  • Author: sciencedirect.com
  • Published: 03/17/2022
  • Review: 2.47 (196 vote)
  • Summary: As a direct result it published its first ever cyber security strategy on June 25, 2009. The strategy, Cyber Security Strategy of the United Kingdom: Safety 

16 Korean Policies of Cybersecurity and Data Resilience

  • Author: carnegieendowment.org
  • Published: 10/19/2021
  • Review: 2.47 (193 vote)
  • Summary: · An attempt was made in 2009 to establish a single, national cybersecurity strategy, and cyber attacks were identified as a serious threat in the 

17 Information Operations, Cyberwarfare, and Cybersecurity

  • Author: everycrsreport.com
  • Published: 04/22/2022
  • Review: 2.25 (145 vote)
  • Summary: July 19, 2004 – March 17, 2009 RL31787. This report describes the emerging areas of information operations, cybersecurity, and cyberwar in the context of 

18 Text: Obama’s Remarks on Cyber-Security – The New York Times

  • Author: nytimes.com
  • Published: 04/05/2022
  • Review: 2.16 (174 vote)
  • Summary: · . Following is the text of President Obama’s remarks on Friday on a new White House cybersecurity office, as released by the 

19 Preventing cyber attacks – American Psychological Association

  • Author: apa.org
  • Published: 06/15/2022
  • Review: 2.16 (182 vote)
  • Summary: September 2009, Vol 40, No. 8 … The hearing, the first of three scheduled on cyber security, followed on the heels of an Obama administration review of 

20 CYBER SECURITY – Govinfo.gov

  • Author: govinfo.gov
  • Published: 04/15/2022
  • Review: 1.97 (75 vote)
  • Summary: U.S. Government Publishing Office] S. Hrg. 111-724 CYBER SECURITY–2009 … 2009 U.S. Senate, Committee on Homeland Security and Governmental Affairs, 

21 Symantec unveils Global Internet Security Threat Report for 2009

  • Author: securityweek.com
  • Published: 05/02/2022
  • Review: 1.79 (98 vote)
  • Summary: · Symantec unveils Global Internet Security Threat Report for 2009 · In 2009, 60 percent of identities exposed were compromised by hacking attacks

22 Cyber Security Statistics The Ultimate List Of Stats Data, & Trends

  • Author: purplesec.us
  • Published: 10/20/2021
  • Review: 1.8 (194 vote)
  • Summary: Hundreds of cyber security statistics including the latest ransomware stats, the cost of … 2009 – 12.4 million; 2010 – 29.97 million; 2011 – 48.17 million 

23 Cyberconflicts and National Security – the United Nations

  • Author: un.org
  • Published: 10/08/2021
  • Review: 1.73 (183 vote)
  • Summary: In Dharamsala, India, in 2009, security researchers uncovered a sophisticated surveillance system in the Dalai Lama’s computer network

24 Top 5 Most Notorious Attacks in the History of Cyber Warfare – Fortinet

  • Author: fortinet.com
  • Published: 08/31/2021
  • Review: 1.68 (153 vote)
  • Summary: Google China Attack (2009). In 2009, in an act of cyber espionage, hackers were able to get inside Google’s servers and access Gmail accounts belonging to