Advanced search Help
Searching for terms: EXACT: "CRS Report for Congress, R42507" in: series
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Cybersecurity: Authoritative Reports and Resources, by Topic [May 7, 2015]
"This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: [1] Policy overview [2] National Strategy for Trusted Identities in Cyberspace (NSTIC) [3] Cloud computing and the Federal Risk and Authorization Management Program (FedRAMP) [4] Critical infrastructure [5] Cybercrime, data breaches, and data security [6] National security, cyber espionage, and cyberwar (including Stuxnet) [7] International efforts [8] Education/training/workforce [9] Research and development (R&D). In addition, the report lists selected cybersecurity-related websites for congressional and government agencies; news; international organizations; and other organizations, associations, and institutions."
Library of Congress. Congressional Research Service
Tehan, Rita
2015-05-07
-
Cybersecurity: Authoritative Reports and Resources, by Topic [April 28, 2015]
"This report provides references to analytical reports on cybersecurity from CRS [Congressional Research Service] , other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: (1)Policy overview (2)National Strategy for Trusted Identities in Cyberspace (NSTIC) (3) Cloud computing and the Federal Risk and Authorization Management Program (FedRAMP) (4) Critical infrastructure (5) Cybercrime, data breaches, and data security (6) National security, cyber espionage, and cyberwar (including Stuxnet) (7) International efforts (8) Education/training/workforce (9)Research and development (R&D) In addition, the report lists selected cybersecurity-related websites for congressional and government agencies; news; international organizations; and other organizations, associations, and institutions."
Library of Congress. Congressional Research Service
Tehan, Rita
2015-04-28
-
Cybersecurity: Authoritative Reports and Resources, by Topic [March 13, 2015]
"This report provides references to analytical reports on cybersecurity from CRS [Congressional Resource Service], other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: [1] Policy overview [2] National Strategy for Trusted Identities in Cyberspace (NSTIC) [3] Cloud computing and the Federal Risk and Authorization Management Program (FedRAMP) [4] Critical infrastructure [5] Cybercrime, data breaches, and data security [6] National security, cyber espionage, and cyberwar (including Stuxnet) [7] International efforts [8] Education/training/workforce [9] Research and development (R&D). In addition, the report lists selected cybersecurity-related websites for congressional and government agencies; news; international organizations; and other organizations, associations, and institutions."
Library of Congress. Congressional Research Service
Tehan, Rita
2015-03-13
-
Cybersecurity: Authoritative Reports and Resources, by Topic [February 27, 2015]
"This report provides references to analytical reports on cybersecurity from CRS [Congressional Research Service], other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: [1] Policy overview [2] National Strategy for Trusted Identities in Cyberspace (NSTIC) [3] Cloud computing and the Federal Risk and Authorization Management Program (FedRAMP) [4] Critical infrastructure [5] Cybercrime, data breaches, and data security [6] National security, cyber espionage, and cyberwar (including Stuxnet) [7] International efforts [8] Education/training/workforce [9] Research and development (R&D) In addition, the report lists selected cybersecurity-related websites for congressional and government agencies; news; international organizations; and other organizations, associations, and institutions."
Library of Congress. Congressional Research Service
Tehan, Rita
2015-02-27
-
Cybersecurity: Authoritative Reports and Resources, by Topic [February 3, 2015]
"This report provides references to analytical reports on cybersecurity from CRS [Congressional Research Service], other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: (1) Policy overview; (2) National Strategy for Trusted Identities in Cyberspace (NSTIC); (3) Cloud computing and the Federal Risk and Authorization Management Program (FedRAMP); (4) Critical infrastructure; (5) Cybercrime, data breaches, and data security; (6) National security, cyber espionage, and cyberwar (including Stuxnet); (7) International efforts; (8) Education/training/workforce; and (9) Research and development (R&D). In addition, the report lists selected cybersecurity-related websites for congressional and government agencies; news; international organizations; and other organizations, associations, and institutions."
Library of Congress. Congressional Research Service
Tehan, Rita
2015-02-03
-
Cybersecurity: Authoritative Reports and Resources, by Topic [January 9, 2015]
From the Summary: "This report provides references to analytical reports on cybersecurity from CRS [Congressional Research Service], other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: (1) Policy overview; (2) National Strategy for Trusted Identities in Cyberspace (NSTIC); (3) Cloud computing and the Federal Risk and Authorization Management Program (FedRAMP); (4) Critical infrastructure; (5) Cybercrime, data breaches, and data security; (6) National security, cyber espionage, and cyberwar (including Stuxnet); (7) International efforts; (8) Education/training/workforce; and (9) Research and development (R&D). In addition, the report lists selected cybersecurity-related websites for congressional and government agencies; news; international organizations; and other organizations, associations, and institutions."
Library of Congress. Congressional Research Service
Tehan, Rita
2015-01-09
-
Cybersecurity: Authoritative Reports and Resources, by Topic [December 10, 2014]
From the Summary: "This report provides references to analytical reports on cybersecurity from CRS [Congressional Research Service], other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: (1) Policy overview; (2) National Strategy for Trusted Identities in Cyberspace (NSTIC); (3) Cloud computing and the Federal Risk and Authorization Management Program (FedRAMP); (4) Critical infrastructure; (5) Cybercrime, data breaches, and data security; (6) National security, cyber espionage, and cyberwar (including Stuxnet); (7) International efforts; (8) Education/training/workforce; and (9) Research and development (R&D). In addition, the report lists selected cybersecurity-related websites for congressional and government agencies; news; international organizations; and other organizations, associations, and institutions."
Library of Congress. Congressional Research Service
Tehan, Rita
2014-12-10
-
Cybersecurity: Authoritative Reports and Resources, by Topic [October 14, 2014]
"This report provides references to analytical reports on cybersecurity from CRS [Congressional Research Service], other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: (1) policy overview; (2) National Strategy for Trusted Identities in Cyberspace (NSTIC); (3) cloud computing and FedRAMP [Federal Risk and Authorization Management Program]; (4) critical infrastructure; (5) cybercrime, data breaches, and data security; (6) national security, cyber espionage, and cyberwar (including Stuxnet); (7) international efforts; (8) education/training/workforce; (9) research and development (R&D). In addition, the report lists selected cybersecurity-related websites for congressional and government agencies, news, international organizations, and organizations or institutions."
Library of Congress. Congressional Research Service
Tehan, Rita
2014-10-14
-
Cybersecurity: Authoritative Reports and Resources, by Topic [July 25, 2014]
"This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups."
Library of Congress. Congressional Research Service
Tehan, Rita
2014-07-25
-
Cybersecurity: Authoritative Reports and Resources, by Topic [May 30, 2014]
"This report provides references to analytical reports on cybersecurity from CRS [Congressional Research Service], other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: [1] policy overview [2] National Strategy for Trusted Identities in Cyberspace (NSTIC) [3] cloud computing and FedRAMP [Federal Risk and Authorization Management Program] [4] critical infrastructure [5] cybercrime, data breaches, and data security [6] national security, cyber espionage, and cyberwar (including Stuxnet) [7] international efforts [8] education/training/workforce [9] research and development (R&D) In addition, the report lists selected cybersecurity-related websites for congressional and government agencies, news, international organizations, and organizations or institutions."
Library of Congress. Congressional Research Service
Tehan, Rita
2014-05-30
-
Cybersecurity: Authoritative Reports and Resources, by Topic [May 22, 2014]
"This report provides references to analytical reports on cybersecurity from CRS [Congressional Research Service], other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: (1) policy overview (2) National Strategy for Trusted Identities in Cyberspace (NSTIC) (3) cloud computing and FedRAMP (4) critical infrastructure (5) cybercrime, data breaches, and data security (6) national security, cyber espionage, and cyberwar (including Stuxnet) (7) international efforts (8) education/training/workforce (9) research and development (R&D) In addition, the report lists selected cybersecurity-related websites for congressional and government agencies, news, international organizations, and organizations or institutions."
Library of Congress. Congressional Research Service
Tehan, Rita
2014-05-22
-
Cybersecurity: Authoritative Reports and Resources, by Topic [May 2, 2014]
"This report provides references to analytical reports on cybersecurity from CRS [Congressional Research Service], other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: [1] policy overview [2] National Strategy for Trusted Identities in Cyberspace (NSTIC) [3] cloud computing and FedRAMP [Federal Risk and Authorization Management Program] [4] critical infrastructure [5] cybercrime, data breaches and data security [6] national security, cyber espionage, and cyberwar (including Stuxnet) [7] international efforts [8] education/training/workforce [9] research and development (R&D) In addition, the report lists selected cybersecurity-related websites for congressional and government agencies, news, international organizations, and organizations or institutions."
Library of Congress. Congressional Research Service
Tehan, Rita
2014-05-02
-
Cybersecurity: Authoritative Reports and Resources, by Topic [April 3, 2014]
"This report provides references to analytical reports on cybersecurity from CRS [Congressional Research Service], other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: (1) policy overview (2) National Strategy for Trusted Identities in Cyberspace (NSTIC) (3) cloud computing and FedRAMP (4) critical infrastructure (5) cybercrime, data breaches and data security (6) national security, cyber espionage, and cyberwar (including Stuxnet) (7) international efforts (8) education/training/workforce (9) research and development (R&D) In addition, the report lists selected cybersecurity-related websites for congressional and government agencies, news, international organizations, and organizations or institutions."
Library of Congress. Congressional Research Service
Tehan, Rita
2014-04-03
-
Cybersecurity: Authoritative Reports and Resources, by Topic [February 19, 2014]
"This report provides references to analytical reports on cybersecurity from CRS [Congressional Research Service], other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: [1] policy overview [2] National Strategy for Trusted Identities in Cyberspace (NSTIC) [3] cloud computing and FedRAMP [Federal Risk and Authorization Management Program] [4] critical infrastructure [5] cybercrime, data breaches and data security [6] national security, cyber espionage, and cyberwar (including Stuxnet) [7] international effort [8] education/training/workforce [9] research and development (R&D) In addition, the report lists selected cybersecurity-related websites for congressional and government agencies, news, international organizations, and organizations or institutions."
Library of Congress. Congressional Research Service
Tehan, Rita
2014-02-19
-
Cybersecurity: Authoritative Reports and Resources, by Topic [January 23, 2014]
"This report provides references to analytical reports on cybersecurity from CRS [Congressional Research Service], other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: [1] policy overview [2] National Strategy for Trusted Identities in Cyberspace (NSTIC) [3] cloud computing and FedRAMP [Federal Risk and Authorization Management Program] [4] critical infrastructure [5] cybercrime, data breaches and data security [6] national security, cyber espionage, and cyberwar (including Stuxnet) [7] international efforts [8] education/training/workforce [9] research and development (R&D) In addition, the report lists selected cybersecurity-related websites for congressional and government agencies, news, international organizations, and organizations or institutions."
Library of Congress. Congressional Research Service
Tehan, Rita
2014-01-23
-
Cybersecurity: Authoritative Reports and Resources, by Topic [January 9, 2014]
"This report provides references to analytical reports on cybersecurity from CRS [Congressional Research Service], other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: [1] policy overview [2] National Strategy for Trusted Identities in Cyberspace (NSTIC) [3] cloud computing and FedRAMP [Federal Risk and Authorization Management Program] [4] critical infrastructure [5] cybercrime, data breaches and data security [6] national security, cyber espionage, and cyberwar (including Stuxnet) [7] international efforts [8] education/training/workforce [9] research and development (R&D) In addition, the report lists selected cybersecurity-related websites for congressional and government agencies, news, international organizations, and organizations or institutions."
Library of Congress. Congressional Research Service
Tehan, Rita
2014-01-09
-
Cybersecurity: Authoritative Reports and Resources, by Topic [December 4, 2013]
"Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which also makes a response problematic. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues. It includes information on [1] 'CRS Reports by Topic' [2] Government Accountability Office (GAO) reports [3] White House/Office of Management and Budget reports [4] Military/DOD [5] Cloud Computing [6] Critical Infrastructure [7] National Strategy for Trusted Identities in Cyberspace (NSTIC) [8] Cybercrime/Cyberwar [9] International [10] Education/Training/Workforce [11] Research and Development (R&D) [12] 'Related Resources: Other Websites.'"
Library of Congress. Congressional Research Service
Tehan, Rita
2013-12-04
-
Cybersecurity: Authoritative Reports and Resources [October 25, 2013]
"Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which also makes a response problematic. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on (1) 'Legislation' (2) 'Executive Orders and Presidential Directives' (3) 'Data and Statistics' (4) 'Cybersecurity Glossaries' (5) 'CRS [Congressional Research Service] Reports by Topic' (6) 'Related Resources: Other Websites'."
Library of Congress. Congressional Research Service
Tehan, Rita
2013-10-25
-
Cybersecurity: Authoritative Reports and Resources [August 16, 2013]
"Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which also makes a response problematic. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues."
Library of Congress. Congressional Research Service
Tehan, Rita
2013-08-16
-
Cybersecurity: Authoritative Reports and Resources [August 2, 2013]
"Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which also makes a response problematic. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues."
Library of Congress. Congressional Research Service
Tehan, Rita
2013-08-02
-
Cybersecurity: Authoritative Reports and Resources [July 25, 2013]
"Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which also makes a response problematic. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues."
Library of Congress. Congressional Research Service
Tehan, Rita
2013-07-25
-
Cybersecurity: Authoritative Reports and Resources [July 5, 2013]
"Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which also makes a response problematic. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues."
Library of Congress. Congressional Research Service
Tehan, Rita
2013-07-05
-
Cybersecurity: Authoritative Reports and Resources [June 26, 2013]
"Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which also makes a response problematic. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues."
Library of Congress. Congressional Research Service
Tehan, Rita
2013-06-26
-
Cybersecurity: Authoritative Reports and Resources [May 24, 2013]
"Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which also makes a response problematic. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues."
Library of Congress. Congressional Research Service
Tehan, Rita
2013-05-24
-
Cybersecurity: Authoritative Reports and Resources [May 22, 2013]
"Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which also makes a response problematic. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues."
Library of Congress. Congressional Research Service
Tehan, Rita
2013-05-22
-
Cybersecurity: Authoritative Reports and Resources [April 17, 2013]
"Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which also makes a response problematic. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues."
Library of Congress. Congressional Research Service
Tehan, Rita
2013-04-17
-
Cybersecurity: Authoritative Reports and Resources [March 20, 2013]
"Cybersecurity is a sprawling topic that includes national, international, government, and private industry dimensions. In the 113th Congress, one bill has been introduced in the Senate and two in the House. More than 40 bills and resolutions with provisions related to cybersecurity were introduced in the first session of the 112th Congress, including several proposing revisions to current laws. In the 111th Congress, the total was more than 60. Several of those bills received committee or floor action, but none have become law. In fact, no comprehensive cybersecurity legislation has been enacted since 2002. This report provides links to cybersecurity hearings and legislation under consideration in the 113th and 112th Congresses, as well as executive orders and presidential directives, data and statistics, glossaries, and authoritative reports."
Library of Congress. Congressional Research Service
Tehan, Rita
2013-03-20
-
Cybersecurity: Authoritative Reports and Resources [March 8, 2013]
"Cybersecurity is a sprawling topic that includes national, international, government, and private industry dimensions. In the 113th Congress, one bill has been introduced in the Senate and two in the House. More than 40 bills and resolutions with provisions related to cybersecurity were introduced in the first session of the 112th Congress, including several proposing revisions to current laws. In the 111th Congress, the total was more than 60. Several of those bills received committee or floor action, but none have become law. In fact, no comprehensive cybersecurity legislation has been enacted since 2002. This report provides links to cybersecurity hearings and legislation under consideration in the 113th and 112th Congresses, as well as executive orders and presidential directives, data and statistics, glossaries, and authoritative reports."
Library of Congress. Congressional Research Service
Tehan, Rita
2013-03-08
-
Cybersecurity: Authoritative Reports and Resources [February 28, 2013]
"Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which also makes a response problematic. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues."
Library of Congress. Congressional Research Service
Tehan, Rita
2013-02-28
-
Cybersecurity: Authoritative Reports and Resources [January 17, 2013]
"Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which also makes a response problematic. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues."
Library of Congress. Congressional Research Service
Tehan, Rita
2013-01-17