1 CSIIRW: Cyber Security and Information Intelligence Research
Table of Contents
Author: dl.acm.org
Published: 06/22/2022
Review: 4.91 (766 vote)
Summary: CSIIRW ’09: Proceedings of the 5th Annual Workshop on Cyber Security and Information … Research Workshop Oak Ridge Tennessee USA April 13 – 15, 2009
2 NSCI Cyber Reference Library – National Security Cyberspace Institute
Author: nsci-va.org
Published: 09/29/2021
Review: 4.64 (536 vote)
Summary: National Security Cyberspace Institute Cyberspace Reference Library. … Roadmap for Cybersecurity Research; Department of Homeland Security (November 2009)
Source: http://www.nsci-va.org/CyberLibrary.htm
3 The New Policy World of Cybersecurity – jstor
Author: jstor.org
Published: 04/07/2022
Review: 4.54 (204 vote)
Summary: structure Protection Plan (NIPP) (2006, updated in 2009). The focus of this historic document was on infrastructure, not cyber security
Source: https://www.jstor.org/stable/23017502
4 2009 Cyberspace Policy Review | CISA
Author: cisa.gov
Published: 02/26/2022
Review: 4.37 (519 vote)
Summary: The nation needs to develop the policies, processes, people, and technology required to mitigate cybersecurity related risks. Information and communications
5 [PDF] Cyber Storm II Final Report – Homeland Security Digital Library
Author: hsdl.org
Published: 05/11/2022
Review: 4.14 (514 vote)
Summary: CYBER STORM II. Final Report. July 2009. Department of Homeland Security. Office of Cybersecurity and Communications. National Cyber Security Division
8 S.773 – 111th Congress (2009-2010): Cybersecurity Act of 2010
Author: congress.gov
Published: 06/09/2022
Review: 3.42 (561 vote)
Summary: Authorizes the President, in the event of an immediate threat to strategic national interests involving compromised federal government or U.S. critical
10 International Cybersecurity Strategy: Deterring Foreign Threats and
Author: 2009-2017.state.gov
Published: 04/27/2022
Review: 3.03 (360 vote)
Summary: · Since 2009, the United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context
11 The Comprehensive National Cybersecurity Initiative
Author: obamawhitehouse.archives.gov
Published: 12/23/2021
Review: 2.95 (81 vote)
Summary: The Comprehensive National Cybersecurity Initiative. President Obama has identified cybersecurity as one of the most serious economic and national security
12 Shaping Preventive Policy in “Cyber War” and Cyber Security – CSIAC
Author: csiac.org
Published: 06/12/2022
Review: 2.75 (113 vote)
Summary: Part I will draw distinctions in cyber security, specifically between attempted … Scott Charney, Rethinking the Cyber Threat, Microsoft (2009),
13 Top 10 most notorious cyber attacks in history – Slideshow – ARN
Author: arnnet.com.au
Published: 05/01/2022
Review: 2.59 (164 vote)
Summary: Google China hit by cyber attack (2009): When Google’s Chinese headquarters detected a security breech in mid-December, it opened up a whole can of worms
15 Cyber Security Strategy – an overview | ScienceDirect Topics
Author: sciencedirect.com
Published: 03/17/2022
Review: 2.47 (196 vote)
Summary: As a direct result it published its first ever cyber security strategy on June 25, 2009. The strategy, Cyber Security Strategy of the United Kingdom: Safety
16 Korean Policies of Cybersecurity and Data Resilience
Author: carnegieendowment.org
Published: 10/19/2021
Review: 2.47 (193 vote)
Summary: · An attempt was made in 2009 to establish a single, national cybersecurity strategy, and cyber attacks were identified as a serious threat in the
17 Information Operations, Cyberwarfare, and Cybersecurity
Author: everycrsreport.com
Published: 04/22/2022
Review: 2.25 (145 vote)
Summary: July 19, 2004 – March 17, 2009 RL31787. This report describes the emerging areas of information operations, cybersecurity, and cyberwar in the context of
19 Preventing cyber attacks – American Psychological Association
Author: apa.org
Published: 06/15/2022
Review: 2.16 (182 vote)
Summary: September 2009, Vol 40, No. 8 … The hearing, the first of three scheduled on cyber security, followed on the heels of an Obama administration review of
Summary: U.S. Government Publishing Office] S. Hrg. 111-724 CYBER SECURITY–2009 … 2009 U.S. Senate, Committee on Homeland Security and Governmental Affairs,
21 Symantec unveils Global Internet Security Threat Report for 2009
Author: securityweek.com
Published: 05/02/2022
Review: 1.79 (98 vote)
Summary: · Symantec unveils Global Internet Security Threat Report for 2009 · In 2009, 60 percent of identities exposed were compromised by hacking attacks
22 Cyber Security Statistics The Ultimate List Of Stats Data, & Trends
Author: purplesec.us
Published: 10/20/2021
Review: 1.8 (194 vote)
Summary: Hundreds of cyber security statistics including the latest ransomware stats, the cost of … 2009 – 12.4 million; 2010 – 29.97 million; 2011 – 48.17 million
24 Top 5 Most Notorious Attacks in the History of Cyber Warfare – Fortinet
Author: fortinet.com
Published: 08/31/2021
Review: 1.68 (153 vote)
Summary: Google China Attack (2009). In 2009, in an act of cyber espionage, hackers were able to get inside Google’s servers and access Gmail accounts belonging to