Only 1/2! You are seeing results from the Public Collection, which is half the size of the Full Collection. Sign in to search everything (see eligibility).

Cyber Infrastructure Protection

Browsing featured resources (49)

Search general resources for Cyber Infrastructure Protection (576)

49 featured resources    updated Jun 15, 2016

 Jump to grouping:

Audits & Investigations

  • Critical Infrastructure Protection: Federal Agencies Have Taken Actions to Address Electromagnetic Risks, but Opportunities Exist to Further Assess Risks and Strengthen Collaboration, Report to Congressional Requesters
    "Electromagnetic risks caused by a man-made EMP or a naturally occurring solar weather event could have a significant impact on the nation's electric grid as well as other infrastructure sectors that depend on electricit… more
  • Critical Infrastructure Protection: Measures Needed to Assess Agencies' Promotion of the Cybersecurity Framework, Report to Congressional Committees
    "U.S. critical infrastructures, such as financial institutions and communications networks, are systems and assets vital to national security, economic stability, and public health and safety. Systems supporting critical infra… more

CRS Reports

  • Cybersecurity: Critical Infrastructure Authoritative Reports and Resources [March 8, 2016]
    "This report serves as a starting point for congressional staff assigned to cover cybersecurity issues as they relate to critical infrastructure. Much is written about protecting U.S. critical infrastructure, and this CRS [Con… more
    Tehan, Rita
  • Cybersecurity Issues for the Bulk Power System [June 10, 2015]
    "In the United States, it is generally taken for granted that the electricity needed to power the U.S. economy is available on demand and will always be available to power our machines and devices. However, in recent years, ne… more
    Campbell, Richard J.
  • Cybersecurity: Legislation, Hearings, and Executive Branch Documents [March 30, 2016]
    "Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, a… more
    Tehan, Rita
  • Cybersecurity: Overview Reports and Links to Government, News, and Related Resources [March 2, 2016]
    "Much is written on the topic of cybersecurity. This CRS [Congressional Research Service] report and those listed below direct the reader to authoritative sources that address many of the most prominent issues. Included in the… more
    Tehan, Rita

DoD Reports

  • Cyber Infrastructure Protection, Volume II
    "This book is a follow-on to our earlier book published in 2011 and represents a detailed look at various aspects of cyber security. The chapters in this book are the result of invited presentations in a 2-day conference on cy… more
    Jordan, Louis H.; Saadawi, Tarek Nazir, 1951-; Boudreau, Vicent

Executive Branch

  • Executive Order 13636: Improving Critical Infrastructure Cybersecurity
    "Repeated cyber intrusions into critical infrastructure demonstrate the need for improved cybersecurity. The cyber threat to critical infrastructure continues to grow and represents one of the most serious national security ch… more
    Obama, Barack
  • Executive Order 13718: Commission on Enhancing National Cybersecurity
    "[I]n order to enhance cybersecurity awareness and protections at all levels of Government, business, and society, to protect privacy, to ensure public safety and economic and national security, and to empower Americans to tak… more
    Obama, Barack
  • Presidential Policy Directive 21: Critical Infrastructure Security and Resilience
    "The Nation's critical infrastructure provides the essential services that underpin American society. Proactive and coordinated efforts are necessary to strengthen and maintain secure, functioning, and resilient critical infra… more

Exercise Reports

  • Cyber Storm: Exercise Report
    "Cyber Storm was designed to exercise communication, incident response policies, and operational procedures in response to various cyber incidents, and to identify future planning and process improvements. The exercise challen… more
  • Cyber Storm II: Final Report
    "The National Cyber Exercise: Cyber Storm II successfully executed on March 10 -- 14, 2008 at player locations across the United States, as well as in international partner locations in Australia, Canada, New Zealand, and the U… more
  • Cyber Storm III: Final Report
    "The National Cyber Exercise: Cyber Storm (CS) is the Department of Homeland Security's (DHS) capstone national-level cybersecurity exercise and represents the Nation's most extensive cybersecurity exercise effort of its kind.… more
  • Informing Cyber Storm V: Lessons Learned from Cyber Storm IV
    "This report seeks to inform the development of Cyber Storm V (CS V) and to share lessons learned from Cyber Storm IV (CS IV). This report aggregates the After Action Reports (AAR) from each of the exercises conducted as part… more


  • Cybersecurity for Power Systems, Hearing Before the Committee on Science, Space, and Technology, Subcommittee on Energy, Subcommittee on Research and Technology, U.S. House of Representatives, One Hundred Fourteenth Congress, First Session, October 21, 2015
    This is a testimony compilation of the October 21, 2015 hearing "Cybersecurity for Power Systems," held before the House Committee on Science, Space, and Technology. From the statement of Chairman Lamar Smith: "Today we will e… more
  • DHS Cybersecurity: Roles and Responsibilities to Protect the Nation's Critical Infrastructure: Hearing Before the U.S. House of Representatives Committee on Homeland Security, One Hundred Thirteenth Congress, First Session, March 13, 2013
    This testimony compilation is from the March 13, 2013 hearing, "DHS Cybersecurity: Roles and Responsibilities to Protect the Nation's Critical Infrastructure," before the U.S. House of Representatives Committee on Homeland Sec… more
  • Subcommittee Field Hearing: Protecting Your Personal Data: How Law Enforcement Works With the Private Sector to Prevent Cybercrime, Hearing Before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies, Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, Second Session, April 16, 2014
    This testimony compilation is from the Field Hearing before the House Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies titled, "Protecting Your Personal Data: How Law Enforcement Works With t… more

International Perspective

Research & Analysis

  • Federal Government's Track Record on Cybersecurity and Critical Infrastructure
    "In the past few years, we have seen significant breaches in cybersecurity which could affect critical U.S. infrastructure. Data on the nation's weakest dams, including those which could kill Americans if they failed, were sto… more
  • Framework for Improving Critical Infrastructure Cybersecurity
    "The national and economic security of the United States depends on the reliable functioning of critical infrastructure. Cybersecurity threats exploit the increased complexity and connectivity of critical infrastructure system… more
  • National Critical Infrastructure Security and Resilience Research and Development Plan
    "The purpose of this 'National Critical Infrastructure Security and Resilience Research and Development Plan' (hereafter referred to as the National CISR R&D Plan or the Plan) is to identify National R&D Priority Areas that in… more
  • NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0
    "Since the release of the last edition of the 'NIST [National Institute of Standards and Technology] Smart Grid Framework and Roadmap for Interoperability Standards (Release 2.0),' in February 2012, significant technological a… more
  • Survey of Research in Supervisory Control and Data Acquisition (SCADA)
    "Supervisory Control and Data Acquisition (SCADA) systems collect information from sensors and actuators about some physical environment and provide an operator interface which allows control and reporting. The physical enviro… more
    Smith, Sidney C.


  • Closing the Cyber Gap: Integrating Cross-Government Cyber Capabilities to Support the DHS Cyber Security Mission
    From the thesis abstract: "Following the 9/11 terror attacks, the Department of Homeland Security (DHS) was mandated to ensure the security of the nation's cyber-supported critical infrastructure, which is predominantly priva… more
    Lowery, Edward W.
  • Shadows of Stuxnet: Recommendations for U.S. Policy on Critical Infrastructure Cyber Defense Derived from the Stuxnet Attack
    From the thesis abstract: "In June 2012, the worldwide cyber security landscape changed when the presence of a new and sophisticated malware, later dubbed 'Stuxnet,' was discovered in the computers of an Iranian nuclear facili… more
    Lendvay, Ronald L.


  • DHS: Office of Cybersecurity and Communications [website]
    "The Office of Cybersecurity and Communications (CS&C), within the National Protection and Programs Directorate, is responsible for enhancing the security, resilience, and reliability of the Nation's cyber and communications i… more
  • US-CERT [website]
    "The United States Computer Emergency Readiness Team (US-CERT) is a partnership between the Department of Homeland Security and the public and private sectors. Established in 2003 to protect the nation's Internet infrastructur… more