|
|
|
|
NSCI Whitepapers
Please email us
if you'd like to be notified when new whitepapers are available!

Cybersecurity: What Have We Learned?
(Jim Ed Crouch, NSCI; Larry McKee, NSCI; October 9, 2011)
|
National Security Cyberspace Institute, Inc. periodically produces cyberspace-related whitepapers and publishes articles,
submitted by our readers, in our CyberPro Newsletter. We frequently publish whitepapers here in draft form to allow the community
at large to comment and provide their input. The whitepapers include foundational concepts as well as more advanced concepts.
|
"Cyber Ace" or "Epic Failure": Senators and the 2014-midterm Elections
(Kandice Matteson, NSCI; May 20, 2014)
-
U.S. Smart Grid Security: How Are We Doing?
(Kathryn Stephens, NSCI; October 19 2011)
-
Cybersecurity: What Have We Learned?
(Jim Ed Crouch, NSCI; Larry McKee, NSCI; October 9 2011)
-
Software (In-)Security
(Kandice McKee, NSCI; September 23, 2011)
-
Security and Privacy Implications of Healthcare Digitization
(Kathryn Stephens, NSCI; September 22, 2011)
-
A Review of Frequently Used Cyber Analogies
(Kandice McKee, NSCI; July 22, 2011)
-
Transforming for the digital age
(Steve Spano, Brigadier General, USAF (Ret); July 7, 2011)
-
A Review of the Cybersecurity Legislative Proposal
(Kathryn Stephens, NSCI; June 15, 2011)
-
Cybersecurity: Improving the White House Grade
(Larry McKee, NSCI; General (Ret) Ron Keys, RK Solutions; May 6, 2011)
-
Data Breaches: Ending the Epidemic
(Kandice McKee, NSCI; May 4, 2011)
-
Cybersecurity at the State and Municipality Levels: Where Do We Stand?
(Jim Ed Crouch, NSCI; Larry McKee, NSCI; February 25, 2011)
-
Federal Government Cybersecurity Progress: Obama Administration Report Card 2009 - Present
(Jim Ed Crouch, NSCI; Larry McKee, NSCI; General (Ret) Ron Keys, RK Solutions; January 18, 2011)
-
Malware Command and Control Overview
(Kathryn Stephens, NSCI; December 30, 2010)
-
An Introduction to Computer Forensics
(Jim Ed Crouch, NSCI; December 16, 2010)
-
Identity Theft
(Charles Winstead, NSCI; December 8, 2010)
-
Increasing Cyberspace Awareness
(Larry K. McKee, Jr., NSCI; November 26, 2010)
-
Cyberspace Exercises Today and Tomorrow
(Charles Winstead, NSCI; Jim Ed Crouch, NSCI; November 19, 2010)
-
Cyberspace Supply Chain
(Kathryn Stephens, NSCI; November 18, 2010)
-
Cyber National Policy Considerations
(Kathryn Stephens, NSCI; November 16, 2010)
-
Cyber Certification and/or Licensure
(Kathryn Stephens, NSCI; November 12, 2010)
-
Cyberspace Recruiting and Retention
(Kathryn Stephens, NSCI; October 25, 2010)
-
Cyberspace Insider Threat
(Kathryn Stephens, NSCI; October 20, 2010)
-
Cybersecurity: Division of Responsibility in the U.S. Government
(Joeli Field, Student; September 18, 2010)
-
Cyber-related Government Jobs
(Kathryn Stephens, NSCI; August 2, 2010)
-
Cybersecurity and Attribution
(General (Ret) Ron Keys, RK Solutions; Charles Winstead, NSCI; Kendra Simmons, NSCI Intern; July 20, 2010)
-
Cyberspace Education and Training
(Jim Ed Crouch NSCI; Larry McKee, NSCI; July 6, 2010)
-
International Cyberspace Strategies
(Kathryn Stephens, NSCI; Larry McKee, NSCI; June 28, 2010)
-
Public-Private Cyberspace Partnerships
(Kathryn Stephens, NSCI; Larry McKee, NSCI; May 26, 2010)
-
International Cyberspace Considerations
(General (Ret) Ron Keys, RK Solutions; Jim Ed Crouch, NSCI; May 17, 2010)
-
When Does Electronic Espionage or a Cyber Attack Become an "Act of War"?
(Major David L. Willson, U.S. Army, May 2010)
-
Cyber Espionage: Is the U.S. Getting More Than It's Giving?
(Kathryn Stephens and Larry McKee, NSCI, March 2010)
-
Beware of Falling Turtles (Plus Other Things That Shouldn't Really Frighten Us)
(Jayson Street, ; January 2010)
- Apple
iPhone Application Development Model: A Possible Approach for JC2 Development?
(Larry McKee,, NSCI, December 2009)
-
The Law and Policy of Protecting our Critical Information Infrastructures
(Maeve Dion, George Mason University School of Law ; December 2009)
-
Cyber Jihad: Use of the Virtual World
(Jeff Bardin, ITSolutions ; October 2009)
-
Concept for Possible Cyberspace Shared Situational Awareness Joint Concept Technology Demonstration (JCTD)
(Larry McKee and General (Ret) Ron Keys, ; August 2009)
-
Will "Deaf Listening" Technology Change Wiretapping Legislation?
(Ed Gundrum, Presidio Networked Solutions; July 2009)
-
The Prudent CIO and the Pandemic
(Dr. James Kasprzak, National Defense University, and Dr. Mary Anne Nixon, Western Carolina University; July 2009)
-
Cyber Defense: Where Do We Go From Here?
(Colonel Glenn Zimmerman, USAF, 21 May 2009)
-
Enabling Cyber Security in a Hostile Threat Environment
(Andrea Belmont-Gwilt & Tracy Nitti, ITT, 9 Apr 2009)
-
Capability Spotlight: Dejavu Technologies Announces eForensics Next Generation Product
(Ed Gundrum, Dejavu Technologies, 9 Apr 2009)
-
Capability Spotlight: PuriFile Software Exposes Hidden Data
(John Ivory, ITT, 26 Feb 2009)
-
Certified Ethical Hacking / Penetration Testing Overview
Kathryn Stephens, NSCI, 19 Jan 2009)
-
Global Information Grid NETOPS Tasking Order
Wayne Ranne and Larry McKee, June 2006)
|
|
|
|
|
|