Documents in the NTIS Technical Reports collection are the results of federally funded research. They are directly submitted to or collected by NTIS from Federal agencies for permanent accessibility to industry, academia and the public.  Before purchasing from NTIS, you may want to check for free access from (1) the issuing organization's website; (2) the U.S. Government Printing Office's Federal Digital System website; (3) the federal government Internet portal; or (4) a web search conducted using a commercial search engine such as
Accession Number ADA582219
Title Cybersecurity: Authoritative Reports and Resources.
Publication Date Jul 2013
Media Count 107p
Personal Author R. Tehan
Abstract Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which also makes a response problematic. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on the following: Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries, Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, Research and Development (R&D), and Related Resources (Other Websites). The report will be updated as needed.
Keywords Auditing
Cloud computing
Executive orders
Federal budgets
Government reports
House hearings
National security
Presidential directives
Scientific research
Senate hearings
United states government

Source Agency Non Paid ADAS
NTIS Subject Category 92C - Social Concerns
74G - Military Operations, Strategy, & Tactics
62 - Computers, Control & Information Theory
Corporate Author Congressional Research Service, Washington, DC.
Document Type Technical report
Title Note Congressional rept.
NTIS Issue Number 1326
Contract Number N/A

Science and Technology Highlights

See a sampling of the latest scientific, technical and engineering information from NTIS in the NTIS Technical Reports Newsletter

Acrobat Reader Mobile    Acrobat Reader