The purpose of this paper is to consider the direct influence and impact of government agencies on the cybersecurity decision cycle, especially regarding computer system and network critical infrastructure. I am purposely defining and discussing the definitions and fundamental points for cybersecurity, Critical Infrastructure Protection (CIP) and decision-making cycles, and use these items to build a framework or basis for discussing strategic, operational and tactical approaches to cybersecurity. Copyright SANS Institut
The analysis of the impact on the ecology of the state of cybersecurity of critical infrastructure o...
The first step in preparing any battlespace is to define the domain for attack and maneuver. The var...
We were tasked by CENTRA Technology, Inc., to create a methodology that could be used to prioritize ...
The purpose of this paper is to consider the direct influence and impact of government agencies on t...
Problems with information and network security have quickly moved up the political agenda. The curre...
Nations and their citizens rely on infrastructures. Their incapacitation or destruction could preven...
This chapter provides a political and philosophical analysis of the values at stake in ensuring cybe...
A chapter report issued by the General Accounting Office with an abstract that begins "Computers are...
This chapter provides a political and philosophical analysis of the values at stake in ensuring cybe...
A Comparative Analysis of Cybersecurity Initiatives Worldwide The worst possible consequences of ris...
The capability related to cybersecurity plays an ever-growing role on overall national security and ...
This technical note outlines a framework for the analysis of cybersecurity, presenting consideration...
The 2016 GPG [GM2016] outlined that Critical Information Infrastructure Protection (CIIP) is a compl...
A letter report issued by the General Accounting Office with an abstract that begins "Critical infra...
The cybersecurity issue discussed in the paper is seen from the perspective of political science wit...
The analysis of the impact on the ecology of the state of cybersecurity of critical infrastructure o...
The first step in preparing any battlespace is to define the domain for attack and maneuver. The var...
We were tasked by CENTRA Technology, Inc., to create a methodology that could be used to prioritize ...
The purpose of this paper is to consider the direct influence and impact of government agencies on t...
Problems with information and network security have quickly moved up the political agenda. The curre...
Nations and their citizens rely on infrastructures. Their incapacitation or destruction could preven...
This chapter provides a political and philosophical analysis of the values at stake in ensuring cybe...
A chapter report issued by the General Accounting Office with an abstract that begins "Computers are...
This chapter provides a political and philosophical analysis of the values at stake in ensuring cybe...
A Comparative Analysis of Cybersecurity Initiatives Worldwide The worst possible consequences of ris...
The capability related to cybersecurity plays an ever-growing role on overall national security and ...
This technical note outlines a framework for the analysis of cybersecurity, presenting consideration...
The 2016 GPG [GM2016] outlined that Critical Information Infrastructure Protection (CIIP) is a compl...
A letter report issued by the General Accounting Office with an abstract that begins "Critical infra...
The cybersecurity issue discussed in the paper is seen from the perspective of political science wit...
The analysis of the impact on the ecology of the state of cybersecurity of critical infrastructure o...
The first step in preparing any battlespace is to define the domain for attack and maneuver. The var...
We were tasked by CENTRA Technology, Inc., to create a methodology that could be used to prioritize ...