Computers + Access control -- United States
Label
Computers + Access control -- United States
Name
Computers + Access control
Sub focus
Actions
Incoming Resources
- Subject of26
- Information security, despite reported progress, federal agencies need to address persistent weaknesses : report to congressional committees
- Information security, further efforts needed to fully implement statutory requirements in DOD : statement of Robert F. Dacey, Director, Information Security Issues, before the Subcommittee on Terrorism, Unconventional Threats and Capabilities, Committee on Armed Services, House of Representatives, United States General Accounting Office
- Terrorist capabilities for cyberattack, overview and policy issues, John Rollins, Clay Wilson
- Critical infrastructure protection, challenges and efforts to secure control systems : report to congressional requesters
- Information security, status of federal public key infrastructure activities at major federal departments and agencies : report to the Committee on Government Reform and the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census, House of Representatives
- Electronic government, planned e-Authentication gateway faces formidable development challenges : report to the Committee on Government Reform and the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census, House of Representatives, United States General Accounting Office
- Critical infrastructure protection, significant challenges in protecting federal systems and developing analysis and warning capabilities, statement of Joel C. Willemssen, Managing Director, Information Technology Issues
- The Security and Freedom through Encryption (SAFE) Act, hearing before the Subcommittee on Telecommunications, Trade, and Consumer Protection of the Committee on Commerce, House of Representatives, One Hundred Sixth Congress, first session, on H.R. 850, May 25, 1999
- Critical infrastructure protection, challenges to building a comprehensive strategy for information sharing and coordination : statement of Jack L. Brock, Jr., Director, Governmentwide and Defense Information Systems, Accounting and Information Management Division, before the Subcommittee on Government Management, Information and Technology, Committee on Government Reform, House of Representatives
- Critical infrastructure protection, significant challenges in developing analysis, warning, and response capabilities, statement of Robert F. Dacey, Director, Information Security Issues
- Information security, weaknesses persist at federal agencies despite progress made in implementing related statutory requirements : report to congressional committees
- Critical infrastructure, challenges remain in protecting key sectors : testimony before the Subcommittee on Homeland Security, Committee on Appropriations, House of Representatives, statement of Eileen R. Larence, David A. Powner
- Computer Matching and Privacy Protection Act, data integration and individual rights, Natalie R. Ortiz
- Security and Freedom through Encryption (SAFE) Act, report together with additional views (to accompany H.R. 850) (including cost estimate of the Congressional Budget Office)
- Information security, weak controls place Interior's financial and other data at risk : report to the secretary of the Interior, United States General Accounting Office
- Federal data integration and individual rights, the Computer Matching and Privacy Protection Act, Natalie R. Ortiz
- Information security, although progress reported, federal agencies need to resolve significant deficiencies : testimony before Congressional Subcommittees, Committee on Oversight and Government Reform, House of Representatives, statement of Gregory C. Wilshusen
- Critical infrastructure protection, national plan for information systems protection
- Identity and access management for electric utilities, Jim McCarthy [and four others]; Leah Kauffman, editor-in-chief
- Critical infrastructures, background, policy, and implementation, John D. Moteff
- Approaches to cyber intrusion response, report to the President's Commission on Critical Infrastructure Protection
- Obscene material available via the Internet, hearing before the Subcommittee on Telecommunications, Trade, and Consumer Protection of the Committee on Commerce, House of Representatives, One Hundred Sixth Congress, second session, May 23, 2000
- Security assessment provider requirements and customer responsibilities, building a security assessment credentialing program for federal information systems : initial public draft, Arnold Johnson, Pat Toth
- Cyber crime, updating the Computer Fraud and Abuse Act to protect cyber space and combat emerging threats : hearing before the Committee on the Judiciary, United States Senate, One Hundred Twelfth Congress, first session, September 7, 2011
- Hacking the homeland, investigating cybersecurity vulnerabilities at the Department of Homeland Security : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, June 20, 2007
- Critical infrastructure protection, significant challenges in developing analysis, warning, and response capabilities : statement of Robert F. Dacey, Director, Information Security Issues, before the Subcommittee on Technology, Terrorism, and Government Information, Committee on the Judiciary, U.S. Senate, United States General Accounting Office
Outgoing Resources
- Focus1
- Sub focus3