{ "id": "R44408", "type": "CRS Report", "typeId": "REPORTS", "number": "R44408", "active": false, "source": "EveryCRSReport.com", "versions": [ { "source": "EveryCRSReport.com", "id": 589828, "date": "2019-01-11", "retrieved": "2020-01-02T16:11:56.008989", "title": "Cybersecurity: Cybercrime and National Security Authoritative Reports and Resources", "summary": "As online attacks grow in volume and sophistication, the United States is expanding its cybersecurity efforts. Cybercriminals continue to develop new ways to ensnare victims, whereas nation-state hackers compromise companies, government agencies, and businesses to create espionage networks and steal information. Threats come from both criminals and hostile countries, especially China, Russia, Iran, and North Korea. \nMuch is written on this topic, and this CRS report directs the reader to authoritative sources that address many of the most prominent issues. The annotated descriptions of these sources are listed in reverse chronological order, with an emphasis on material published in the past several years. This report includes resources and studies from government agencies (federal, state, local, and international), think tanks, academic institutions, news organizations, and other sources:\nTable 1\u2014cybercrime, data breaches and security, including hacking, real-time attack maps, and statistics (such as economic estimates)\nTable 2\u2014national security, cyber espionage, and cyberwar, including Stuxnet, China, and the Dark Web\nTable 3\u2014, The Internet of Things (IoT), smart cites, cloud computing, and FedRAMP\nThe following reports comprise a series of authoritative reports and resources on these additional cybersecurity topics:\nCRS Report R44405, Cybersecurity: Overview Reports and Links to Government, News, and Related Resources, by Rita Tehan.\nCRS Report R44406, Cybersecurity: Education, Training, and R&D Authoritative Reports and Resources, by Rita Tehan.\nCRS Report R44408, Cybersecurity: Cybercrime and National Security Authoritative Reports and Resources, by Rita Tehan.\nCRS Report R44410, Cybersecurity: Critical Infrastructure Authoritative Reports and Resources, by Rita Tehan.\nCRS Report R44417, Cybersecurity: State, Local, and International Authoritative Reports and Resources, by Rita Tehan.\nCRS Report R44427, Cybersecurity: Federal Government Authoritative Reports and Resources, by Rita Tehan.\nCRS Report R43317, Cybersecurity: Legislation, Hearings, and Executive Branch Documents, by Rita Tehan.\nCRS Report R43310, Cybersecurity: Data, Statistics, and Glossaries, by Rita Tehan.", "type": "CRS Report", "typeId": "REPORTS", "active": false, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "https://www.crs.gov/Reports/R44408", "sha1": "513e8a8f4544f5f683dd176784e9b9463909b538", "filename": "files/20190111_R44408_513e8a8f4544f5f683dd176784e9b9463909b538.html", "images": {} } ], "topics": [] }, { "source": "EveryCRSReport.com", "id": 575516, "date": "2017-11-14", "retrieved": "2018-10-08T20:10:53.535643", "title": "Cybersecurity: Cybercrime and National Security Authoritative Reports and Resources", "summary": "As online attacks grow in volume and sophistication, the United States is expanding its cybersecurity efforts. Cybercriminals continue to develop new ways to ensnare victims, whereas nation-state hackers compromise companies, government agencies, and businesses to create espionage networks and steal information. Threats come from both criminals and hostile countries, especially China, Russia, Iran, and North Korea. \nMuch is written on this topic, and this CRS report directs the reader to authoritative sources that address many of the most prominent issues. The annotated descriptions of these sources are listed in reverse chronological order, with an emphasis on material published in the past several years. This report includes resources and studies from government agencies (federal, state, local, and international), think tanks, academic institutions, news organizations, and other sources:\nTable 1\u2014cybercrime, data breaches and security, including hacking, real-time attack maps, and statistics (such as economic estimates)\nTable 2\u2014national security, cyber espionage, and cyberwar, including Stuxnet, China, and the Dark Web\nTable 3\u2014cloud computing, the Internet of Things (IoT), smart cites, and FedRAMP\nThe following reports comprise a series of authoritative reports and resources on these additional cybersecurity topics:\nCRS Report R44405, Cybersecurity: Overview Reports and Links to Government, News, and Related Resources, by Rita Tehan.\nCRS Report R44406, Cybersecurity: Education, Training, and R&D Authoritative Reports and Resources, by Rita Tehan.\nCRS Report R44408, Cybersecurity: Cybercrime and National Security Authoritative Reports and Resources, by Rita Tehan.\nCRS Report R44410, Cybersecurity: Critical Infrastructure Authoritative Reports and Resources, by Rita Tehan.\nCRS Report R44417, Cybersecurity: State, Local, and International Authoritative Reports and Resources, by Rita Tehan.\nCRS Report R44427, Cybersecurity: Federal Government Authoritative Reports and Resources, by Rita Tehan.\nCRS Report R43317, Cybersecurity: Legislation, Hearings, and Executive Branch Documents, by Rita Tehan.\nCRS Report R43310, Cybersecurity: Data, Statistics, and Glossaries, by Rita Tehan.", "type": "CRS Report", "typeId": "REPORTS", "active": true, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/R44408", "sha1": "91384961d35e100e0d74121f4fd99d4097deeb8e", "filename": "files/20171114_R44408_91384961d35e100e0d74121f4fd99d4097deeb8e.html", "images": { "/products/Getimages/?directory=R/html/R44408_files&id=/0.png": "files/20171114_R44408_images_754465dbec02b21a602c76209234ed13896d2a5e.png", "/products/Getimages/?directory=R/html/R44408_files&id=/1.png": "files/20171114_R44408_images_754465dbec02b21a602c76209234ed13896d2a5e.png" } } ], "topics": [] }, { "source": "EveryCRSReport.com", "id": 460790, "date": "2017-04-28", "retrieved": "2017-08-22T14:57:12.321122", "title": "Cybersecurity: Cybercrime and National Security Authoritative Reports and Resources", "summary": "As online attacks grow in volume and sophistication, the United States is expanding its cybersecurity efforts. Cybercriminals continue to develop new ways to ensnare victims, whereas nation-state hackers compromise companies, government agencies, and businesses to create espionage networks and steal information. Threats come from both criminals and hostile countries, especially China, Russia, Iran, and North Korea. \nMuch is written on this topic, and this CRS report directs the reader to authoritative sources that address many of the most prominent issues. The annotated descriptions of these sources are listed in reverse chronological order, with an emphasis on material published in the past several years. This report includes resources and studies from government agencies (federal, state, local, and international), think tanks, academic institutions, news organizations, and other sources:\nTable 1\u2014cybercrime, data breaches and security, including hacking, real-time attack maps, and statistics (such as economic estimates)\nTable 2\u2014national security, cyber espionage, and cyberwar, including Stuxnet, China, and the Dark Web\nTable 3\u2014cloud computing, the Internet of Things (IoT), smart cites, and FedRAMP\nThe following reports comprise a series of authoritative reports and resources on these additional cybersecurity topics:\nCRS Report R44405, Cybersecurity: Overview Reports and Links to Government, News, and Related Resources, by Rita Tehan \nCRS Report R44406, Cybersecurity: Education, Training, and R&D Authoritative Reports and Resources, by Rita Tehan \nCRS Report R44408, Cybersecurity: Cybercrime and National Security Authoritative Reports and Resources, by Rita Tehan\nCRS Report R44410, Cybersecurity: Critical Infrastructure Authoritative Reports and Resources, by Rita Tehan\nCRS Report R44417, Cybersecurity: State, Local, and International Authoritative Reports and Resources, by Rita Tehan\nCRS Report R44427, Cybersecurity: Federal Government Authoritative Reports and Resources, by Rita Tehan \nCRS Report R43317, Cybersecurity: Legislation, Hearings, and Executive Branch Documents, by Rita Tehan\nCRS Report R43310, Cybersecurity: Data, Statistics, and Glossaries, by Rita Tehan \nFor access to additional CRS reports and other resources, see the Science & Technology: Science for Security and Homeland Security & Immigration: Cybersecurity Issue Pages at http://www.crs.gov.", "type": "CRS Report", "typeId": "REPORTS", "active": true, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/R44408", "sha1": "5419745ad1801767d227a2d429e532dabe1bf417", "filename": "files/20170428_R44408_5419745ad1801767d227a2d429e532dabe1bf417.html", "images": { "/products/Getimages/?directory=R/html/R44408_files&id=/0.png": "files/20170428_R44408_images_754465dbec02b21a602c76209234ed13896d2a5e.png", "/products/Getimages/?directory=R/html/R44408_files&id=/1.png": "files/20170428_R44408_images_754465dbec02b21a602c76209234ed13896d2a5e.png" } } ], "topics": [] }, { "source": "EveryCRSReport.com", "id": 459383, "date": "2017-03-02", "retrieved": "2017-03-09T17:49:04.848855", "title": "Cybersecurity: Cybercrime and National Security Authoritative Reports and Resources", "summary": "As online attacks grow in volume and sophistication, the United States is expanding its cybersecurity efforts. Cybercriminals continue to develop new ways to ensnare victims, whereas nation-state hackers compromise companies, government agencies, and businesses to create espionage networks and steal information. Threats come from both criminals and hostile countries, especially China, Russia, Iran, and North Korea. \nMuch is written on this topic, and this CRS report directs the reader to authoritative sources that address many of the most prominent issues. The annotated descriptions of these sources are listed in reverse chronological order, with an emphasis on material published in the past several years. This report includes resources and studies from government agencies (federal, state, local, and international), think tanks, academic institutions, news organizations, and other sources:\nTable 1\u2014cybercrime, data breaches and security, including hacking, real-time attack maps, and statistics (such as economic estimates)\nTable 2\u2014national security, cyber espionage, and cyberwar, including Stuxnet, China, and the Dark Web\nTable 3\u2014cloud computing, the Internet of Things (IoT), smart cites, and FedRAMP\nThe following reports comprise a series of authoritative reports and resources on these additional cybersecurity topics:\nCRS Report R44405, Cybersecurity: Overview Reports and Links to Government, News, and Related Resources, by Rita Tehan \nCRS Report R44406, Cybersecurity: Education, Training, and R&D Authoritative Reports and Resources, by Rita Tehan \nCRS Report R44408, Cybersecurity: Cybercrime and National Security Authoritative Reports and Resources, by Rita Tehan\nCRS Report R44410, Cybersecurity: Critical Infrastructure Authoritative Reports and Resources, by Rita Tehan\nCRS Report R44417, Cybersecurity: State, Local, and International Authoritative Reports and Resources, by Rita Tehan\nCRS Report R44427, Cybersecurity: Federal Government Authoritative Reports and Resources, by Rita Tehan \nCRS Report R43317, Cybersecurity: Legislation, Hearings, and Executive Branch Documents, by Rita Tehan\nCRS Report R43310, Cybersecurity: Data, Statistics, and Glossaries, by Rita Tehan \nFor access to additional CRS reports and other resources, see the Science & Technology: Science for Security and Homeland Security & Immigration: Cybersecurity Issue Pages at http://www.crs.gov.", "type": "CRS Report", "typeId": "REPORTS", "active": true, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/R44408", "sha1": "3ac0c70dc776f24f58ef77669c5edc778e06de10", "filename": "files/20170302_R44408_3ac0c70dc776f24f58ef77669c5edc778e06de10.html", "images": null } ], "topics": [] }, { "source": "EveryCRSReport.com", "id": 456679, "date": "2016-10-26", "retrieved": "2016-10-28T18:18:00.325035", "title": "Cybersecurity: Cybercrime and National Security Authoritative Reports and Resources", "summary": "As online attacks grow in volume and sophistication, the United States is expanding its cybersecurity efforts. Cybercriminals continue to develop new ways to ensnare victims, whereas nation-state hackers compromise companies, government agencies, and businesses to create espionage networks and steal information. Threats come from both criminals and hostile countries, especially China, Russia, Iran, and North Korea. \nMuch is written on this topic, and this CRS report directs the reader to authoritative sources that address many of the most prominent issues. The annotated descriptions of these sources are listed in reverse chronological order, with an emphasis on material published in the past several years. This report includes resources and studies from government agencies (federal, state, local, and international), think tanks, academic institutions, news organizations, and other sources:\nTable 1\u2014cybercrime, data breaches and security, including hacking, real-time attack maps, and statistics (such as economic estimates)\nTable 2\u2014national security, cyber espionage, and cyberwar, including Stuxnet, China, and the Dark Web\nTable 3\u2014cloud computing, the Internet of Things (IoT), and FedRAMP\nThe following reports comprise a series of authoritative reports and resources on these additional cybersecurity topics:\nCRS Report R44405, Cybersecurity: Overview Reports and Links to Government, News, and Related Resources, by Rita Tehan \nCRS Report R44406, Cybersecurity: Education, Training, and R&D Authoritative Reports and Resources, by Rita Tehan \nCRS Report R44408, Cybersecurity: Cybercrime and National Security Authoritative Reports and Resources, by Rita Tehan\nCRS Report R44410, Cybersecurity: Critical Infrastructure Authoritative Reports and Resources, by Rita Tehan\nCRS Report R44417, Cybersecurity: State, Local, and International Authoritative Reports and Resources, by Rita Tehan\nCRS Report R44427, Cybersecurity: Federal Government Authoritative Reports and Resources, by Rita Tehan \nCRS Report R43317, Cybersecurity: Legislation, Hearings, and Executive Branch Documents, by Rita Tehan\nCRS Report R43310, Cybersecurity: Data, Statistics, and Glossaries, by Rita Tehan \nFor access to additional CRS reports and other resources, see the Science & Technology: Science for Security and Homeland Security & Immigration: Cybersecurity Issue Pages at http://www.crs.gov.", "type": "CRS Report", "typeId": "REPORTS", "active": true, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/R44408", "sha1": "128733bba8ec19b9975753c42e711309659e6a4d", "filename": "files/20161026_R44408_128733bba8ec19b9975753c42e711309659e6a4d.html", "images": null } ], "topics": [] }, { "source": "EveryCRSReport.com", "id": 453231, "date": "2016-06-09", "retrieved": "2016-06-21T21:05:50.795819", "title": "Cybersecurity: Cybercrime and National Security Authoritative Reports and Resources", "summary": "As online attacks grow in volume and sophistication, the United States is expanding its cybersecurity efforts. Cybercriminals continue to develop new ways to ensnare victims, whereas nation-state hackers compromise companies, government agencies, and businesses to create espionage networks and steal information. Threats come from both criminals and hostile countries, especially China, Russia, Iran, and North Korea. \nMuch is written on this topic, and this CRS report directs the reader to authoritative sources that address many of the most prominent issues. The annotated descriptions of these sources are listed in reverse chronological order, with an emphasis on material published in the past several years. This report includes resources and studies from government agencies (federal, state, local, and international), think tanks, academic institutions, news organizations, and other sources:\nTable 1\u2014cybercrime, data breaches and security, including hacking, real-time attack maps, and statistics (such as economic estimates)\nTable 2\u2014national security, cyber espionage, and cyberwar, including Stuxnet, China, and the Dark Web\nTable 3\u2014cloud computing, the Internet of Things (IoT), and FedRAMP\nThe following reports comprise a series of authoritative reports and resources on these additional cybersecurity topics:\nCRS Report R44405, Cybersecurity: Overview Reports and Links to Government, News, and Related Resources, by Rita Tehan \nCRS Report R44406, Cybersecurity: Education, Training, and R&D Authoritative Reports and Resources, by Rita Tehan \nCRS Report R44408, Cybersecurity: Cybercrime and National Security Authoritative Reports and Resources, by Rita Tehan\nCRS Report R44410, Cybersecurity: Critical Infrastructure Authoritative Reports and Resources, by Rita Tehan\nCRS Report R44417, Cybersecurity: State, Local, and International Authoritative Reports and Resources, by Rita Tehan\nCRS Report R44427, Cybersecurity: Federal Government Authoritative Reports and Resources, by Rita Tehan \nCRS Report R43317, Cybersecurity: Legislation, Hearings, and Executive Branch Documents, by Rita Tehan\nCRS Report R43310, Cybersecurity: Data, Statistics, and Glossaries, by Rita Tehan \nFor access to additional CRS reports and other resources, see the Cybersecurity Issue Page at http://www.crs.gov.", "type": "CRS Report", "typeId": "REPORTS", "active": true, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/R44408", "sha1": "d64f3550448d783b17bf33a24ddef56a41e09d73", "filename": "files/20160609_R44408_d64f3550448d783b17bf33a24ddef56a41e09d73.html", "images": null } ], "topics": [] }, { "source": "EveryCRSReport.com", "id": 452732, "date": "2016-05-20", "retrieved": "2016-05-24T19:02:25.154941", "title": "Cybersecurity: Cybercrime and National Security Authoritative Reports and Resources", "summary": "As online attacks grow in volume and sophistication, the United States is expanding its cybersecurity efforts. Cybercriminals continue to develop new ways to ensnare victims, whereas nation-state hackers compromise companies, government agencies, and businesses to create espionage networks and steal information. Threats come from both criminals and hostile countries, especially China, Russia, Iran, and North Korea. \nMuch is written on this topic, and this CRS report directs the reader to authoritative sources that address many of the most prominent issues. The annotated descriptions of these sources are listed in reverse chronological order, with an emphasis on material published in the past several years. This report includes resources and studies from government agencies (federal, state, local, and international), think tanks, academic institutions, news organizations, and other sources:\nTable 1\u2014cybercrime, data breaches and security, including hacking, real-time attack maps, and statistics (such as economic estimates)\nTable 2\u2014national security, cyber espionage, and cyberwar, including Stuxnet, China, and the Dark Web\nTable 3\u2014cloud computing, the Internet of Things (IoT), and FedRAMP\nThe following reports comprise a series of authoritative reports and resources on these additional cybersecurity topics:\nCRS Report R44405, Cybersecurity: Overview Reports and Links to Government, News, and Related Resources, by Rita Tehan \nCRS Report R44406, Cybersecurity: Education, Training, and R&D Authoritative Reports and Resources, by Rita Tehan \nCRS Report R44408, Cybersecurity: Cybercrime and National Security Authoritative Reports and Resources, by Rita Tehan\nCRS Report R44410, Cybersecurity: Critical Infrastructure Authoritative Reports and Resources, by Rita Tehan\nCRS Report R44417, Cybersecurity: State, Local, and International Authoritative Reports and Resources, by Rita Tehan\nCRS Report R44427, Cybersecurity: Federal Government Authoritative Reports and Resources, by Rita Tehan \nCRS Report R43317, Cybersecurity: Legislation, Hearings, and Executive Branch Documents, by Rita Tehan\nCRS Report R43310, Cybersecurity: Data, Statistics, and Glossaries, by Rita Tehan \nFor access to additional CRS reports and other resources, see the Cybersecurity Issue Page at http://www.crs.gov.", "type": "CRS Report", "typeId": "REPORTS", "active": true, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/R44408", "sha1": "02063b68aad58666f10a6f3f4e0ea173dc4ee5a6", "filename": "files/20160520_R44408_02063b68aad58666f10a6f3f4e0ea173dc4ee5a6.html", "images": null } ], "topics": [] }, { "source": "EveryCRSReport.com", "id": 451077, "date": "2016-03-03", "retrieved": "2016-04-06T16:58:58.371095", "title": "Cybersecurity: Cybercrime and National Security Authoritative Reports and Resources", "summary": "As online attacks grow in volume and sophistication, the United States is expanding its cybersecurity efforts. Cybercriminals continue to develop new ways to ensnare victims, whereas nation-state hackers compromise companies, government agencies, and businesses to create espionage networks and steal information. Threats come from both criminals and hostile countries, especially China, Russia, Iran, and North Korea. \nMuch is written on this topic, and this CRS report directs the reader to authoritative sources that address many of the most prominent issues. The annotated descriptions of these sources are listed in reverse chronological order, with an emphasis on material published in the past several years. This report includes resources and studies from government agencies (federal, state, local, and international), think tanks, academic institutions, news organizations, and other sources:\nTable 1\u2014cybercrime, data breaches and security, including hacking, real-time attack maps, and statistics (such as economic estimates)\nTable 2\u2014national security, cyber espionage, and cyberwar, including Stuxnet, China, and the Dark Web\nTable 3\u2014cloud computing, the Internet of Things (IoT), and FedRAMP\nThe following reports comprise a series of authoritative reports and resources on these additional cybersecurity topics:\nCRS Report R44405, Cybersecurity: Overview Reports and Links to Government, News, and Related Resources, by Rita Tehan \nCRS Report R44406, Cybersecurity: Education, Training, and R&D Authoritative Reports and Resources, by Rita Tehan \nCRS Report R44408, Cybersecurity: Cybercrime and National Security Authoritative Reports and Resources, by Rita Tehan\nCRS Report R44410, Cybersecurity: Critical Infrastructure Authoritative Reports and Resources, by Rita Tehan\nCRS Report R44417, Cybersecurity: State, Local, and International Authoritative Reports and Resources, by Rita Tehan\nCRS Report R44427, Cybersecurity: Federal Government Authoritative Reports and Resources, by Rita Tehan \nCRS Report R43317, Cybersecurity: Legislation, Hearings, and Executive Branch Documents, by Rita Tehan\nCRS Report R43310, Cybersecurity: Data, Statistics, and Glossaries, by Rita Tehan \nFor access to additional CRS reports and other resources, see the Cybersecurity Issue Page at http://www.crs.gov.", "type": "CRS Report", "typeId": "REPORTS", "active": true, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/R44408", "sha1": "3772658a808a51b30eeb3a5aa676b549fb263668", "filename": "files/20160303_R44408_3772658a808a51b30eeb3a5aa676b549fb263668.html", "images": null } ], "topics": [] } ], "topics": [ "Economic Policy", "Foreign Affairs", "Intelligence and National Security", "National Defense", "Science and Technology Policy" ] }