Cyber Threat
Cyber Threat | ||||
---|---|---|---|---|
Date | Document Title | Author | Modified By | Comments (hover over for full text) |
2010-08-12 | Verizon 2010 DBIR | Verizon + US Secret Service | John Gerth | This annual report provides a wealth of statistics about the overall nature of breaches. A highlight of this year's report was... |
2009-08-03 | 2009 Cyber Threats and Trends | Richard Howard | This document presents cyber security threats for 2009 and predicts cyber security disruptors that may emerge in 10 to 15 years. | |
2009-07-31 | Microsoft Security Intelligence Report | Microsoft Malware Protection Center | Steven Lipner | Recent summary of the prevalance of cyber attacks and vulnerabilities worldwide. |
2009-07-09 | Terrorist Capability for Cyberattack (2007) | Sean Fahey | This report examines possible terrorists? objectives and computer vulnerabilities that might lead to an attempted cyberattack against the critical infrastructure of... | |
2009-07-09 | Symantec Global Internet Security Threat Report (2008) | Sean Fahey | The Symantec Global Internet Security Threat Report provides a six-month update of worldwide Internet threat activity. It includes analysis of network-based... | |
2009-07-09 | GAO - Cybercrime (2008) | Sean Fahey | GAO?s objectives were to (1) determine the impact of cybercrime on our nation?s economy and security; (2) describe key federal entities,... | |
2009-07-06 | Mission Oriented Risk and Design Analysis of Critical Information Systems | Donald L. Buckshaw, et al. | William Streilein | This paper summarizes some interesting and useful work in risk analysis of cyber systems. It provides a methodology for assessing risk... |