Main Content
The Cyber Hub, Cyber Power Index, Booz Allen Hamilton and the Economist Intelligence Unit
2.3.1.2
http://www.cyberhub.com/CyberPowerIndex
The Federal Bureau of Investigation's Ability to Address the National Security Cyber Intrusion Threat, U.S. Department of Justice, Office of the Inspector General, Audit Division., April 2011
3.2.2.4.1
http://www.justice.gov/oig/reports/FBI/a1122r.pdf
The Internet Engineering Task Force, The Tao of IETF: A Novice's Guide to the Internet Engineering Task Force, 15 October, 2011
3.1.2.2.1
https://www.ietf.org/tao.html
The Secretary of Defense, Establishment of a Subordinate Unified U.S. Cyber Command Under U.S. Strategic Command for Military Cyberspace Operations, 23 June 2009
3.2.2.2.3
http://www.defense.gov/home/features/2010/0410_cybersec/docs/cyber_command_gates_memo[1].pdf
The White House, International Strategy for Cyberspace, May 2011
3.2.2.1.1
http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
Thomas Rid, Think Again: Cyberwar, Foreign Policy, March/April 2012
2.2.1.4
http://www.foreignpolicy.com/articles/2012/02/27/cyberwar?page=0,0
Tyler Moore and Richard Clayton, Examining the Impact of Website Take-down on Phishing, APWG eCrime Researchers Summit, 2007
1.3.5.1.2
http://www.ecrimeresearch.org/2007/proceedings/p1_moore.pdf
Tyler Moore, Introducing the Economics of Cybersecurity: Principles and Policy Options, Proceedings of a Workshop on Deterring CyberAttacks: Informing Strategies and Developing Options for U.S. Policy, 2010
2.2.2.2.2
http://sites.nationalacademies.org/CSTB/CSTB_059364
US Secret Service, Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector, CERT, 2004
1.3.5.2.1
http://www.cyber.st.dhs.gov/docs/its_report_040820.pdf
William A. Owens, Kenneth W. Dam, and Herbert S. Lin, Committee on Offensive Information Warfare, National Research Council; Appendix E: Technical Vulnerabilities Targeted by Cyber Offensive Actions in Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, 2009, pp360-367
1.1.2.1
http://www.nap.edu/catalog.php?record_id=12651
This book, and all H2O books, are Creative Commons licensed for sharing and re-use. Material included from the American Legal Institute is reproduced with permission and is exempted from the open license.