1. Савин Л. Национальная киберстратегия США – преамбула агрессии. Фонд Стратегической Культуры. 28.09.2018. Available at: https://www.fondsk.ru/news/2018/09/28/nacionalnaja-kiberstrategia-us-preambula-agressii-46860.html (accessed 22.02.2020).
2. Трамп утвердил новую стратегию кибербезопасности США. ТАСС. 20.09.2018. Available at: https://tass.ru/mezhdunarodnaya-panorama/5588614 (accessed 01.03.2020).
3. A Bill H.R. 3359. 115th Congress 1st Session. July 2017. Available at: https://www.congress.gov/115/bills/hr3359/BILLS-115hr3359rh.pdf (accessed 25.02.2020).
4. Adelman K. A war we can fight to win. Foreign Policy. 29.05.2009. Available at: https://foreignpolicy.com/2009/05/29/a-war-we-can-fight-to-win/ (accessed 21.02.2020).
5. Carter W.A. Extending Federal Cybersecurity to the Endpoint. Center for Strategic and International Studies (CSIS). 09.10.2018. Available at: https://www.csis.org/analysis/extending-federal-cybersecurity-endpoint (accessed 20.03.2020).
6. Cyberspace Policy Review 2009. The White House. Available at: https://fas.org/irp/eprint/cyber-review.pdf (accessed 13.02.2020).
7. Department of Defense Cyber Strategy 2018. US Department of Defense. Available at: https://media.defense.gov/2018/Sep/18/2002041658/-1/-1/1/CYBER_STRATEGY_SUMMARY_FINAL.PDF (accessed 12.03.2020).
8. Kirk J. Trump Pulls Gloves Off on Offensive Cyber Actions. Info Security. 17.08.2018. Available at: https://www.govinfosecurity.com/trump-pulls-gloves-off-on-offensive-cyber-actions-a-11374 (accessed 20.02.2020).
9. Kirk J. US, UK: Russian Hackers Deeply Embedded in Routers, Switches. Info Security. 17.04.2018. Available at: https://www.bankinfosecurity.com/us-uk-russia-deeply-embedded-in-routers-switches-a-10806 (accessed 20.02.2020).
10. Lange K. 5 Keys To Success Here's The DoD Cybersecurity Strategy. The Department of the Navy’s Information Technology. 16.05.2015. Available At: https://www.doncio.navy.mil/CHIPS/ArticleDetails.aspx?ID=10846 (accessed 24.02.2020).
11. McGee M. K. White House National Cyber Strategy: An Analysis. Info Security. 26.09.2018. Available at: https://www.bankinfosecurity.com/white-house-national-cyber-strategy-analysis-a-11558 (accessed 26.02.2020).
12. National Cyber Strategy of the United States of America 2018. The White House. September, 2018. Available at: https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf (accessed 10.03.2020).
13. Perlroth N. Chinese and Iranian Hackers Renew Their Attacks on U.S. Compa-nies. The New York Times. 18.02.2019. Available at: https://www.nytimes.com/2019/02/18/technology/hackers-chinese-iran-usa.html?searchResultPosition=8 (accessed 26.02.2020).
14. Release of the 2018 National Cyber Strategy. U.S. Department of State. September, 2018. Available at: https://www.state.gov/r/pa/prs/ps/2018/09/286093.htm (accessed 20.03.2020).
15. Tadjdeh Y. Analysts Laud New Federal Cyber Strategies. National Defense. 01.11.2018. Available at: https://www.nationaldefensemagazine.org/articles/2018/11/1/analysts-laud-new-federal-cyber-strategies (accessed 24.03.2020).
16. Crandall M., Thayer B. The Balance of Cyber power. The National Interest. 25.11.2018. Available at: https://nationalinterest.org/feature/balance-cyberpower-36637 (accessed 25.03.2020).
17. The National Strategy to Secure Cyberspace 2003. The White House. Available at: https://www.us-cert.gov/sites/default/files/publications/cyberspace_strategy.pdf (accessed 12.03.2020).
18. Volz D. Trump, Seeking to Relax Rules on U.S. Cyberattacks, Reverses Obama Directive. The Wall Street Journal. 15.08.2018. Available at: https://www.wsj.com/articles/trump-seeking-to-relax-rules-on-u-s-cyberattacks-reverses-obama-directive-1534378721 (accessed 23.03.2020).
19. Volz D. White House Confirms It Has Relaxed Rules on U.S. Use of Cyberweapons. The Wall Street Journal. 20.09.2018. Available at: https://www.wsj.com/articles/white-house-confirms-it-has-relaxed-rules-on-u-s-use-of-cyber-weapons-1537476729 (accessed 24.03.2020).
20. Wolff J. Trump’s Reckless Cybersecurity Strategy. The New York Times. 02.10.2018. Available at: https://www.nytimes.com/2018/10/02/opinion/trumps-reckless-cybersecurity-strategy.html?searchResultPosition=2 (accessed 18.03.2020).
21. Nakashima E. U.S. Cybercom contemplates information warfare to counter Russian interference in 2020 election. The Washington Post. 26.12.2019. Available at: https://www.washingtonpost.com/national-security/us-cybercom-contemplates-information-warfare-to-counter-russian-interference-in-the-2020-election/2019/12/25/21bb246e-20e8-11ea-bed5-880264cc91a9_story.html (accessed 27.03.2020).
22. S.Con.Res.10 - A concurrent resolution recognizing that Chinese telecommunications companies such as Huawei and ZTE pose serious threats to the national security of the United States and its allies. US Congress. 28.03.2019. Available at: https://www.congress.gov/bill/116th-congress/senate-concurrent-resolution/10/text?q=%7B%22search%22%3A%5B%22cyber+N+136%22%5D%7D&r=10&s=3 (accessed 24.03.2020).
23. Res.140 - A resolution urging the establishment of a Cyber League of Indo-Pacific States to address cyber threats. US Congress. 04.03.2019. Available at: https://www.congress.gov/bill/116th-congress/senate-resolution/140/text?q=%7B%22search%22%3A%5B%22cybersecurity%22%5D%7D&r=7&s=1 (accessed 18.03.2020).
24. H.R.5515 - John S. McCain National Defense Authorization Act for Fiscal Year 2019. US Congress. 18.04.2018. Available at: https://www.congress.gov/115/bills/hr5515/BILLS-115hr5515enr.pdf (accessed 20.03.2020).
25. Executive Order on Securing the Information and Communications Technology and Services Supply Chain. The White House. 15.05.2019. Available at: https://www.whitehouse.gov/presidential-actions/executive-order-securing-information-communications-technology-services-supply-chain/ (accessed 17.03.2020).
26. Kuo L., Siddiqui S. Huawei hits back over Trump's national emergency on telecoms 'threat'. The Guardian. 15.05.2019. Available at: https://www.theguardian.com/us-news/2019/may/15/donald-trump-national-emergency-telecoms-threats-huawei (accessed 20.03.2020).
27. Цветкова Н.А, Стадник И. Политика кибербезопасности США: эволюция восприятия угроз. Международные процессы. 2018. №3. С. 157-169. DOI 10.17994/IT.2018.16.3.54.9
Комментарии
Сообщения не найдены