Date: September 8, 2015
Creator: Tehan, Rita
Description: This report provides a list of executive orders and presidential directives pertaining to information and computer security. Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have various targets, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, engaging in cybercrime, or intimidating political activists; additionally attributing an attack to a specific location can be difficult, which may make responding problematic.
Contributing Partner: UNT Libraries Government Documents Department