Computer networks -- Security measures -- United States
Resource Information
The concept Computer networks -- Security measures -- United States represents the subject, aboutness, idea or notion of resources found in Jacksonville Public Library.
The Resource
Computer networks -- Security measures -- United States
Resource Information
The concept Computer networks -- Security measures -- United States represents the subject, aboutness, idea or notion of resources found in Jacksonville Public Library.
- Label
- Computer networks -- Security measures -- United States
238 Items that share the Concept Computer networks -- Security measures -- United States
Context
Context of Computer networks -- Security measures -- United StatesSubject of
No resources found
No enriched resources found
- Wireless network security : 802.11, Bluetooth and handheld devices : recommendations of the National Institute of Standards and Technology
- 2019 internal penetration test of FHFA's network and systems
- 2020 Census: initial enumeration underway but readiness for upcoming operations is mixed : a report to congressional requesters
- 2020 census : COVID-19 presents delays and risks to census count : a report to congressional requesters
- 2020 census: recent decision to compress census timeframe poses additional risks to an accurate count : a report to congressional requesters
- 21 steps to improve cyber security of SCADA networks
- Additional controls can enhance the security of the automated commercial environment system
- Agency response to cyberspace policy review : joint hearing before the Subcommittee on Technology and Innovation and the Subcommittee on Research and Science Education, Committee on Science and Technology, House of Representatives, One Hundred Eleventh Congress, first session, June 16, 2009
- An Act to Require the Secretary of Homeland Security to Establish a Security Vulnerability Disclosure Policy, to Establish a Bug Bounty Program for the Department of Homeland Security, to Amend title 41, United States Code, to Provide for Federal Acquisition Supply Chain Security, and for Other Purposes
- Artificial intelligence: emerging opportunities, challenges, and implications for policy and research : testimony before the Subcommittees on Research and Technology and Energy, Committee on Science, Space, and Technology
- Assessing federal and commercial information security needs
- Audit of the Civil Division's information security program pursuant to the Federal Information Security Modernization Act of 2014 fiscal year 2017
- Audit of the Criminal Division's information security program pursuant to the Federal Information Security Modernization Act of 2014, fiscal year 2018
- Audit of the Department of the Treasury's cybersecurity information sharing
- Audit of the Executive Office for Immigration Review's Justice Consolidated Office Network/eWorld System Pursuant to the Federal Information Security Modernization Act of 2014
- Audit of the Executive Office for Immigration Review's information security program pursuant to the Federal Information Security Modernization Act of 2014, fiscal year 2018
- Audit of the Executive Office for United States Attorneys' Victim Notification System pursuant to the Federal Information Security Modernization Act of 2014, fiscal year 2018
- Audit of the Federal Bureau of Investigation's Child Exploitation Tracking System pursuant to the Federal Information Security Modernization Act of 2014, fiscal year 2018
- Audit of the Federal Bureau of Investigation's Operational Technology Division Administrative Support Information System pursuant to the Federal Information Security Modernization Act of 2014, fiscal year 2018
- Audit of the Federal Bureau of Investigation's cyber victim notification process
- Audit of the SEC's compliance with the Federal Information Security Modernization Act for fiscal year ...
- Best practices for victim response and reporting of cyber incidents
- Bolstering data privacy and mobile security : an assessment of IMSI catcher threats : hearing before the Subcommittee on Oversight, Committee on Science, Space, and Technology, House of Representatives, One Hundred Fifteenth Congress, second session, June 27, 2018
- Bridging the gap : how an airborne mobile-mesh network can overcome space vulnerabilities in tomorrow's fight
- Building a more secure cyber future : examining private sector experience with the NIST framework : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourteenth Congress, first session, February 4, 2015
- Careful connections : keeping the internet of things secure
- Challenges remain in DHS' efforts to secure control systems
- Challenges remain in securing the nation's cyber infrastructure
- China's cyber power and America's national security
- Cloud computing : an overview of the technology and the issues facing American innovators : hearing before the Subcommittee on Intellectual Property, Competition, and the Internet of the Committee on the Judiciary, House of Representatives, One Hundred Twelfth Congress, second session, July 25, 2012
- Cloud computing : what are the security implications? : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Twelfth Congress, first session, October 6, 2011
- Communications networks and consumer privacy : recent developments : hearing before the Subcommittee on Communications, Technology, and the Internet of the Committee on Energy and Commerce, House of Representatives, One Hundred Eleventh Congress, first session, April 23, 2009
- Computer networks and information warfare : implications for military operations
- Computer security incident handling guide : recommendations of the National Institute of Standards and Technology
- Computer security incident handling guide : recommendations of the National Institute of Standards and Technology
- Confronting the challenge of cybersecurity : field hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourteenth Congress, first session, September 3, 2015
- Continuation of the national emergency with respect to securing the information and communications technology and services supply chain : communication from the President of the United States, transmitting continuation of the national emergency with respect to securing the information and communications technology and services supply chain that was declared in Executive Order 13873 of May 15, 2019, is to continue in effect beyond May 15, 2020, pursuant to 50 U.S.C. 1622(d); Public law 94-412, Sec. 202(d); (90 Stat. 1257)
- Continuation of the national emergency with respect to securing the information and communications technology and supply chain : message from the President of the United States transmitting continuation of the national emergency with respect to securing the information and communications technology and services supply chain that was declared in Executive Order 13873 of May 15, 2019, is to continue in effect beyond May 15, 2021, pursuant to 50 U.S.C. 1622(d); Public law 94-412, Sec. 202(d); (90 Stat. 1257)
- Critical infrastructure cybersecurity : assessments of smart grid security : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Twelfth Congress, second session, February 28, 2012
- Critical infrastructure protection : challenges in securing control systems : statement of Robert F. Dacey, Director, Information Security Issues, before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census, House Committee on Government reform
- Critical infrastructure protection : establishing effective information sharing with infrastructure sectors
- Critical infrastructure protection : federal efforts require a more coordinated and comprehensive approach for protecting information systems
- Critical infrastructure protection : improving information sharing with infrastructure sectors : report to congressional requesters
- Critical infrastructure protection : multiple efforts to secure control systems are under way, but challenges remain : report to congressional requesters
- Critical infrastructure protection : national plan for information systems protection
- Critical infrastructure protection : progress coordinating government and private sector efforts varies by sectors' characteristics : report to congressional requesters
- Cyber Security Enhancement Act of 2002 : report (to accompany H.R. 3482) (including cost estimate of the Congressional Budget Office)
- Cyber attacks : an unprecedented threat to U.S. national security : hearing before the Subcommittee on Europe, Eurasia, and Emerging Threats of the Committee on Foreign Affairs, House of Representatives, One Hundred Thirteenth Congress, second session, March 21, 2013
- Cyber operations : improving the military cybersecurity posture in an uncertain threat environment : hearing before the Subcommittee on Emerging Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Fourteenth Congress, first session, hearing held March 8, 2015
- Cyber security : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Thirteenth Congress, second session
- Cyber strategy, policy and organization : hearings before the Committee on Armed Services, United States Senate, One Hundred Fifteenth Congress, first session, March 2 and May 11, 2017
- Cyber threats : law enforcement and private sector responses : hearing before the Subcommittee on Crime and Terrorism of the Committee on the Judiciary, United States Senate, One Hundred Thirteenth Congress, first session, May 8, 2013
- Cyber threats facing America : an overview of the cybersecurity threat landscape : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Fifteenth Congress, first session, May 10, 2017
- Cyber threats from China, Russia, and Iran : protecting American critical infrastructure : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, March 20, 2013
- Cyber threats to capital markets and corporate accounts : hearing before the Subcommittee on Capital Markets and Government Sponsored Enterprises of the Committee on Financial Services, U.S. House of Representatives, One Hundred Twelfth Congress, second session, June 1, 2012
- Cybersecurity : OMB should update inspector general reporting guidance to increase rating consistency and precision : report to congressional committees
- Cybersecurity : an examination of the communications supply chain : hearing before the Subcommittee on Communications and Technology of the Committee on Energy and Commerce, House of Representatives, one Hundred Thirteenth Congress, first session, May 21, 2013
- Cybersecurity : an overview of risks to critical infrastructure : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Twelfth Congress, first session, July 26, 2011
- Cybersecurity : assessing our vulnerabilities and developing an effective response : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, first session, March 19, 2009
- Cybersecurity : continued federal efforts are needed to protect critical systems and information : testimony before the Subcommittee on Technology and Innovation, Committee on Science and Technology, House of Representatives
- Cybersecurity : innovative solutions to challenging problems : hearing before the Subcommittee on Intellectual Property, Competition, and the Internet of the Committee on the Judiciary, House of Representatives, One Hundred Twelfth Congress, first session, May 25, 2011
- Cybersecurity : internet architecture is considered resilient, but federal agencies continue to address risks : report to the Committee on Armed Services, House of Representatives
- Cybersecurity : network threats and policy challenges : hearing before the Subcommittee on Communications, Technology, and the Internet of the Committee on Energy and Commerce, House of Representatives, One Hundred Eleventh Congress, first session, May 1, 2009
- Cybersecurity : next steps to protect our critical infrastructure : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, second session, February 23, 2010
- Cybersecurity : progress made but challenges remain in defining and coordinating the Comprehensive National Initiative : report to Congressional requesters
- Cybersecurity : the pivotal role of communications networks : hearing before the Subcommittee on Communications and Technology of the Committee on Energy and Commerce, House of Representatives, One Hundred Twelfth Congress, second session, March 7, 2012
- Cybersecurity : threats to communications networks and private sector responses : hearing before the Subcommittee on Communications and Technology of the Committee on Energy and Commerce, House of Representatives, One Hundred Twelfth Congress, second session, February 8, 2012
- Cybersecurity Vulnerability Identification and Notification Act : report of the Committee on Homeland Security and Governmental Affairs, United States Senate, to accompany S. 3045, to amend the Homeland Security Act of 2012 to protect United States critical infrastructure by ensuring that the Cybersecurity and Infrastructure Security Agency has the legal tools it needs to notify private and public sector entities put at risk by cybersecurity vulnerabilities in the networks and systems that control critical assets of the United States
- Cybersecurity Vulnerability Remediation Act : report (to accompany H.R. 3710) (including cost estimate of the Congressional Budget Office)
- Cybersecurity and Infrastructure Security Agency Act of 2017 : report (to accompany H.R. 3359) (including cost estimate of the Congressional Budget Office)
- Cybersecurity and information sharing
- Cybersecurity and information sharing : comparison of H.R. 1560 (PCNA and NCPAA) and S. 754 (CISA)
- Cybersecurity for the new frontier : reforming the Federal Information Security Management Act : hearing before the Committee on Oversight and Reform, House of Representatives, One Hundred Seventeenth Congress, second session, January 11, 2022
- Cybersecurity issues and challenges
- Cybersecurity issues and challenges : in brief
- Cybersecurity recommendations for the next administration : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, September 16, 2008
- Cybersecurity regulation harmonization : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Fifteenth Congress, first session, June 21, 2017
- Cybersecurity workforce, urgent need for DHS to take actions to identify its position and critical skill requirements : report to congressional committees
- Cybersecurity, actions needed to strengthen U.S. capabilities : testimony before the Subcommittee on Research and Technology, Committee on Science, Space, and Technology, House of Representatives
- Cybersecurity, encryption and United States national security matters : hearing before the Committee on Armed Services, United States Senate, One Hundred Fourteenth Congress, second session, July 14; September 13, 2016
- Cybersecurity, terrorism, and beyond : addressing evolving threats to the homeland : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Thirteenth Congress, second session, September 10, 2014
- Cyberspace as a warfighting domain : policy, management, and technical challenges to mission assurance : hearing before the Terrorism, Unconventional Threats, and Capabilities Subcommittee of the Committee on Armed Services, House of Representatives, One Hundred Eleventh Congress, first session, hearing held May 5, 2009
- Cyberspace policy review : assuring a trusted and resilient information and communications infrastructure
- DHS cybersecurity : roles and responsibilities to protect the nation's critical infrastructure : hearing before the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, March 13, 2013
- DHS needs to improve cybersecurity workforce planning
- DHS' efforts to develop the Homeland secure data network
- DHS's effort to secure .gov : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, first session, June 24, 2015
- Defense : cooperation : Agreement between the United States of America and Poland, Signed at Warsaw, June 21, 2010
- Defense : cooperation : memorandum of understanding between the United States of America and the Republic of Korea signed at Washington and Seoul, April 30, 2009
- Defense : information exchange : memorandum of understanding between the United States of America and Germany, signed at Washington and Berlin, May 16 and 26, 2008
- Defense Department cyber efforts : DOD faces challenges in its cyber activities : report to Congressional requesters
- Defense Department cyber efforts : definitions, focal point, and methodology needed for DOD to develop full-spectrum cyberspace budget estimates
- Defense acquisitions : Cyber Command needs to develop metrics to assess warfighting capabilities : report to congressional committees
- Department of Defense cybersecurity culture and compliance (DC3I)
- Department of Defense enterprise-wide cybersecurity policies and architecture : hearing before the Subcommittee on Cybersecurity of the Committee on Armed Services, United States Senate, One Hundred Sixteenth Congress, first session, January 29, 2019
- Department of Defense strategy for operating in cyberspace
- Disaster recovery planning for DHS information systems needs improvement : (redacted)
- EPA's emergency response systems at risk of having inadequate security controls
- Efforts to protect U.S. energy delivery systems from cybersecurity threats : hearing before the Committee on Energy and Natural Resources, United States Senate, One Hundred Fifteenth Congress, first session, April 4, 2017
- Electronic authentication guideline : recommendations of the National Institute of Standards and Technology
- Enabling distributed security in cyberspace : building a healthy and resilient cyber ecosystem with automated collective action
- Encryption, key recovery, and privacy protection in the information age : hearing before the Committee on the Judiciary, United States Senate, One Hundred Fifth Congress, first session on S. 376 ... S. 909 ... July 9, 1997
- Enhancing preparedness and response capabilities to address cyber threats : joint hearing before the Subcommittee on Emergency Preparedness, Response and Communications and the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, second session, May 24, 2016
- Evaluation of DHS' compliance with Federal Information Security Modernization Act requirements for intelligence systems for fiscal year 2020
- Evaluation of DHS' information security program for fiscal year 2020
- Examining DHS's efforts to strengthen its cybersecurity workforce : joint hearing before the Subcommittee on Cybersecurity and Infrastructure Protection and the Subcommittee on Oversight and Management Efficiency of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, March 7, 2018
- Examining insider threat risk at the U.S.Citizenship and Immigration Services
- Examining the cyber threat to critical infrastructure and the American economy : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Twelfth Congress, first session, March 16, 2011
- External penetration test of FHFA's network and systems during 2018
- FEMA's longstanding IT deficiencies hindered 2017 response and recovery operations
- Federal Cybersecurity Enhancement Act of 2015 : report of the Committee on Homeland Security and Governmental Affairs, United States Senate, to accompany S. 1869 , to improve federal network security and authorize and enhance an existing intrusion detection and prevention system for civilian federal networks
- Federal Information Security Modernization Act of 2014 : report of the Committee on Homeland Security and Governmental Affairs, United States Senate, to accompany S. 2521, to amend chapter 35 of title 44, United States Code, to provide for reform to federal information security
- Federal cybersecurity research and development strategic plan
- Federal information security : mixed progress in implementing program complements; improved metrics needed to measure effectiveness : report to Congressional committees
- Filesharing programs and "technological features to induce users to share" : a report to the United States Patent and Trademark Office from the Office of International Relations, Prepared by Thomas D. Sydnor II, John Knight, Lee A. Hollaar
- Final audit report : review of Treasury's critical infrastructure protection program
- Foreign cyber threats to the United States : hearing before the Committee on Armed Services, United States Senate, One Hundred Fifteenth Congress, first session, January 5, 2017
- Foundations of a security policy for use of the National Research and Educational Network
- Guide to Bluetooth security : recommendations of the National Institute of Standards and Technology
- Guide to Bluetooth security : recommendations of the National Institute of Standards and Technology
- Guide to Bluetooth security : recommendations of the National Institute of Standards and Technology
- Guide to securing Microsoft Windows XP systems for IT professionals : a NIST security configuration checklist : recommendations of the National Institute of Standards and Technology
- Guide to the Distributed Energy Resources Cybersecurity Framework
- Guidelines on firewalls and firewall policy (draft) : recommendations of the National Institute of Standards and Technology
- Guidelines on firewalls and firewall policy : recommendations of the National Institute of Standards and Technology
- Guidelines on firewalls and firewall policy : recommendations of the National Institute of Standards and Technology
- Guidelines on securing public web servers : recommendations of the National Institute of Standards and Technology
- Harnessing small business innovation for national security cyber needs : hearing before the Subcommittee on Terrorism, Unconventional Threats, and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Eleventh Congress, second session, hearing held July 28, 2010
- Hearing on National Defense Authorization Act for Fiscal Year 2008 and oversight of previously authorized programs before the Committee on Armed Services, House of Representatives, One Hundred Tenth Congress, first session : Terrorism, Unconventional Threats and Capabilities Subcommittee hearing on budget request on information technology, hearing held March 28, 2007
- Hearing on National Defense Authorization Act for Fiscal Year 2013 and oversight of previously authorized programs before the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, second session : Subcommittee on Emerging Threats and Capabilities hearing on budget request for information technology and cyber operations programs, hearing held March 20, 2012
- Hearing on National Defense Authorization Act for Fiscal Year 2017 and oversight of previously authorized programs before the Committee on Armed Services, House of Representatives, One Hundred Fourteenth Congress, second session : Subcommittee on Emerging Threats and Capabilities hearing on fiscal year 2017 information technology and cyber programs, foundations for a secure warfighting network, hearing held March 22, 2016
- Hearing on National Defense Authorization Act for Fiscal Year 2020 and oversight of previously authorized programs before the Committee on Armed Services, House of Representatives, One Hundred Sixteenth Congress, first session : Subcommittee on Intelligence and Emerging Threats and Capabilities hearing on Department of Defense information technology, cybersecurity, and information assurance : hearing held February 26, 2019
- Hearing on National Defense Authorization Act for fiscal year 2022 and oversight of previously authorized programs before the Committee on Armed Services, House of Representatives, One Hundred Seventeenth Congress, first session : Subcommittee on Cyber, Innovative Technologies, and Information Systems on Department of Defense information technology, cybersecurity, and information assurance for fiscal year 2022, hearing held June 29, 2021
- Homeland cybersecurity : assessing cyber threats and building resilience : hearing before the Committee on Homeland Security, House of Representatives, One Hundred Seventeenth Congress, first session, February 10, 2021
- How secure is our critical infrastructure? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Seventh Congress, first session, September 12, 2001
- Implementing the Department of Defense cyber strategy : Committee on Armed Services, House of Representatives, One Hundred Fourteenth Congress, first session, hearing held September 30, 2015
- Implications of power blackouts for the nation's cybersecurity and critical infrastructure protection : joint hearing of the Subcommittee on Cybersecurity, Science, and Research and Development and the Subcommittee on Infrastructure and Border Security of the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, first session, September 4, 2003 and September 23, 2003
- Improved security required for DHS networks : (redacted)
- Improved security required for Transportation Security Administration networks : (redacted)
- Improved security required for U.S. Coast Guard networks : (redacted)
- Improved security required for U.S. Customs and Border Protection networks : (redacted)
- Improved security required for U.S. Secret Service networks : (redacted)
- Improvements in patch and configuration management controls can better protect TSA's wireless network and devices : redacted
- Inadvertent file sharing over peer-to-peer networks : hearing before the Committee on Oversight and Government Reform, House of Representatives, One Hundred Tenth Congress, first session, July 24, 2007
- Inadvertent file sharing over peer-to-peer networks : how it endangers citizens and jeopardizes national security : hearing before the Committee on Oversight and Government Reform, House of Representatives, One Hundred Eleventh Congress, first session, July 29, 2009
- Information security : Federal Deposit Insurance Corporation needs to mitigate control weaknesses : report to the Chairman, Federal Deposit Insurance Corporation
- Information security : TVA needs to address weaknesses in control systems and networks : report to congressional requesters
- Information security : agencies make progress in implementation of requirements, but significant weaknesses persist : testimony before the Subcommittee on Government Management, Organization, and Procurement, Committee on Oversight and Government Reform, U.S. House of Representatives
- Information security : comments on the proposed Federal Information Security Management Act of 2002
- Information security : federal agencies have taken steps to secure wireless networks, but further actions can mitigate risk : report to congressional committees
- Information security : federal agencies need to improve controls over wireless networks : report to the Honorable Wm. Lacy Clay, House of Representatives
- Information security : federal agencies show mixed progress in implementing statutory requirements : testimony before the House Committee on Government Reform
- Information security : progress made, but Federal Aviation Administration needs to improve controls over air traffic control systems : report to congressional requesters
- Information security : safeguarding of data in excessed Department of Energy computers
- Information security : the Defense Logistics Agency needs to fully implement its security program : report to congressional committees
- Information security, DHS needs to enhance capabilities, improve planning, and support greater adoption of its National Cybersecurity Protection System : report to congressional committees
- Information sharing in the era of WikiLeaks : balancing security and collaboration : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate of the One Hundred Twelfth Congress, first session, March 10, 2011
- Information technology : Fiscal Service needs to strengthen security controls over public-facing web servers
- Inquiry into cyber intrusions affecting U.S. Transportation Command contractors : report of the Committee on Armed Services, United States Senate
- Insider threat study : computer system sabotage in critical infrastructure sectors
- Insider threat study : illicit cyber activity in the banking and finance sector
- Interagency report on status of international cybersecurity standardization for the internet of things (IoT)
- International cybersecurity priorities : fostering cybersecurity innovation globally
- International cybersecurity strategy : deterring foreign threats and building global cyber norms : hearing before the Subcommittee on East Asia, the Pacific, and International Cyber Security Policy of the Committee on Foreign Relations, United States Senate, One Hundred Fourteenth Congress, second session, May 25, 2016
- Internet of Things Cybersecurity Improvement Act : report of the Committee on Homeland Security and Governmental Affairs, United States Senate, to accompany S. 734, to leverage federal government procurement power to encourage increased cybersecurity for Internet of Things devices, and for other purposes
- Internet of Things Cybersecurity Improvement Act of 2019 : report together with additional views (to accompany H.R. 1668) (including cost estimate of the Congressional Budget Office)
- Intrusion detection systems
- Investigating and prosecuting 21st century cyber threats : hearing before the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations of the Committee on the Judiciary, House of Representatives, One Hundred Thirteenth Congress, first session, March 13, 2013
- Issue review : a review of NSTAC issues addressed prior to NSTAC XIX
- Issue review : a review of NSTAC issues addressed prior to NSTAC XXII
- Joint statement by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Office of the Director of National Intelligence (ODNI), and the National Security Agency (NSA)
- Know the risk, raise your shield : campaign materials
- Letter report : DHS needs to prioritize its cyber assets
- Letter report : DHS's implementation of protective measures for personally identifiable information
- Management of the DHS wide area network needs improvement
- Maritime critical infrastructure protection : DHS needs to better address port cybersecurity : report to the Chairman, Committee on Commerce, Science, and Transportation, U.S. Senate
- NASA information technology : urgent action needed to address significant management and cybersecurity weaknesses : report to congressional committees
- NASA's efforts to improve the agency's information technology governance
- National Cybersecurity Preparedness Consortium Act of 2016 : report (to accompany H.R. 4743) (including cost estimate of the Congressional Budget Office)
- National Cybersecurity and Communications Integration Center Act of 2014 : report of the Committee on Homeland Security and Governmental Affairs, United States Senate, to accompany S. 2519, to codify an existing operations center for cybersecurity
- National Cybersecurity and Critical Infrastructure Protection Act of 2014 : report (to accompany H.R. 3696) (including cost estimate of the Congressional Budget Office)
- November 1988 Internet computer virus and the vulnerability of national telecommunications networks to computer viruses
- Operating in the digital domain : organizing the military departments for cyber operations : hearing before the Subcommittee on Terrorism, Unconventional Threats, and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Eleventh Congress, second session, hearing held September 23, 2010
- Outside perspectives on the Department of Defense cyber strategy : Committee on Armed Services, House of Representatives, One Hundred Fourteenth Congress, first session, hearing held September 29, 2015
- Oversight of the Cybersecurity Act of 2015 : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, second session, June 15, 2016
- Oversight of the Federal Trade Commission : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourteenth Congress, second session, September 27, 2016
- Planning for the future of cyber attack attribution : hearing before the Subcommittee on Technology and Innovation, Committee on Science and Technology, House of Representatives, One Hundred Eleventh Congress, second session, July 15, 2010
- Planning, management, and systems issues hinder DHS' efforts to protect cyberspace and the nation's cyber infrastructure : redacted
- Preparing for a cyber incident
- Preparing for a cyber incident : what you need to know, Contacting law enforcement
- Preparing for the future : an assessment of emerging cyber threats : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation of the Committee on Homeland Security, House of Representatives, One Hundred Sixteenth Congress, first session, October 22, 2019
- Progress and challenges in securing the Nation's cyberspace
- Project delays prevent EPA from implementing an agency-wide information security vulnerability management program : audit report
- Promoting and incentivizing cybersecurity best practices : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, first session, July 28, 2015
- Protecting America's critical infrastructure : how secure are government computer systems? : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, April 5, 2001
- Protecting critical and emerging U.S. technologies from foreign threats
- Protecting maritime facilities in the 21st century : are our nation's ports at risk for a cyber attack? : hearing before the Subcommittee on Border and Maritime Security of the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, first session, October 8, 2015
- Public switched network security assessment guidelines
- Reauthorizing DHS : positioning DHS to address new and emerging threats to the homeland : roundtable before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Fifteenth Congress, second session, February 7, 2018
- Recommended functionalities for improving cybersecurity of distributed energy resources : preprint
- Red cloud rising : cloud computing in China
- Report of the Attorney General's Cyber Digital Task Force
- Review of CBP's major cybersecurity incident during a 2019 biometric pilot
- Review of the Department of Homeland Security's capability to share cyber threat information : redacted
- Safe Communities Act of 2020 : report (to accompany H.R. 5780) (including cost estimate of the Congressional Budget Office)
- Secure link middleware
- Security for telecommuting and broadband communications : recommendations of the National Institute of Standards and Technology
- Security weaknesses increase risks to critical DHS databases : (redacted)
- Security weaknesses increase risks to critical United States Citizenship and Immigration Services database : (redacted)
- Security weaknesses increase risks to critical United States Coast Guard database : (redacted)
- Security weaknesses increase risks to critical United States Secret Service database : (redacted)
- Security weaknesses increase risks to critical emergency preparedness and response database : (redacted)
- Sony and Epsilon : lessons for data security legislation : hearing before the Subcommittee on Commerce, Manufacturing, and Trade of the Committee on Energy and Commerce, House of Representatives, One Hundred Twelfth Congress, first session, June 2, 2011
- State-sponsored cyberspace threats : recent incidents and U.S. policy response : hearing before the Subcommittee on East Asia, the Pacific, and International Cyber Security Policy of the Committee on Foreign Relations, United States Senate, One Hundred Fifteenth Congress, first session, June 13, 2017
- Status of the 1990 decennial census
- Striking the right balance : protecting our nation's critical infrastructure from cyber attack and ensuring privacy and civil liberties : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, April 25, 2013
- Stronger security controls needed on active directory systems
- Supply chain security, global competitiveness, and 5g : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Sixteenth Congress, first session, October 31, 2019
- Taking down botnets : public and private efforts to disrupt and dismantle cybercriminal networks : hearing before the Subcommittee on Crime and Terrorism of the Committee on the Judiciary, United States Senate, One Hundred Thirteenth Congress, second session, July 15, 2014
- Task force on cyber deterrence
- Task force report : resilient military systems and the advanced cyber threat
- Technology assessment : cybersecurity for critical infrastructure protection
- Telecommunications networks : addressing potential security risks of foreign-manufactured equipment : testimony before the Subcommittee on Communications and Technology, Committee on Energy and Commerce, House of Representatives
- Telecommunications security guidelines for telecommunications management network
- Text messages from your bank? : sounds "phishy"
- The Department of Defense cyber strategy
- The DoD cybersecurity policy chart
- The current state of DHS's efforts to secure federal networks : hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, first session, March 28, 2017
- The cybersecurity partnership between the private sector and our government : protecting our national and economic security : joint hearing before the Committee on Commerce, Science, and Transportation and the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Thirteenth Congress, first session, March 7, 2013
- The fifth domain : defending our country, our companies, and ourselves in the age of cyber threats
- The future of information security
- Trustworthy cyberspace : strategic plan for the federal cybersecurity research and development program
- U.S. Computer Emergency Readiness Team makes progress in securing cyberspace, but challenges remain
- U.S. Cyber Command : organizing for cyberspace operations : Committee on Armed Services, House of Representatives, One Hundred Eleventh Congress, second session, hearing held September 23, 2010
- Understanding and mitigating Russian states-sponsored cyber threats to U.S. critical infrastructure
- United States cybersecurity policy and threats : hearing before the Committee on Armed Services, United States Senate, One Hundred Fourteenth Congress, first session, September 29, 2015
- Vulnerabilities highlight the need for more effective web security management
- Wireless connections and bluetooth security tips
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.jaxpubliclibrary.org/resource/SDXuGXkW_fI/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.jaxpubliclibrary.org/resource/SDXuGXkW_fI/">Computer networks -- Security measures -- United States</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.jaxpubliclibrary.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.jaxpubliclibrary.org/">Jacksonville Public Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer networks -- Security measures -- United States
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.jaxpubliclibrary.org/resource/SDXuGXkW_fI/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.jaxpubliclibrary.org/resource/SDXuGXkW_fI/">Computer networks -- Security measures -- United States</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.jaxpubliclibrary.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.jaxpubliclibrary.org/">Jacksonville Public Library</a></span></span></span></span></div>