Author: United States. General Accounting Office
Publisher: DIANE Publishing
ISBN: 1428936785
Category : Administrative agencies
Languages : en
Pages : 45
Book Description
Information security continued action needed to improve software patch management : report to congressional requesters.
Author: United States. General Accounting Office
Publisher: DIANE Publishing
ISBN: 1428936785
Category : Administrative agencies
Languages : en
Pages : 45
Book Description
Publisher: DIANE Publishing
ISBN: 1428936785
Category : Administrative agencies
Languages : en
Pages : 45
Book Description
Information security progress made, but Federal Aviation Administration needs to improve controls over air traffic control systems : report to congressional requesters.
Author:
Publisher: DIANE Publishing
ISBN: 1428933298
Category :
Languages : en
Pages : 37
Book Description
Publisher: DIANE Publishing
ISBN: 1428933298
Category :
Languages : en
Pages : 37
Book Description
Information security agencies need to implement consistent processes in authorizing systems for operations : report to congressional requesters.
Author:
Publisher: DIANE Publishing
ISBN: 1428936769
Category :
Languages : en
Pages : 46
Book Description
Publisher: DIANE Publishing
ISBN: 1428936769
Category :
Languages : en
Pages : 46
Book Description
Information Security Continued Action Needed to Improve Software Patch Management
Information Security
Author: United States Government Accountability Office
Publisher: Createspace Independent Publishing Platform
ISBN: 9781978446816
Category :
Languages : en
Pages : 46
Book Description
Information Security: Continued Action Needed to Improve Software Patch Management
Publisher: Createspace Independent Publishing Platform
ISBN: 9781978446816
Category :
Languages : en
Pages : 46
Book Description
Information Security: Continued Action Needed to Improve Software Patch Management
Information Security: Concerted Response Needed to Resolve Persistent Weakness
Author: Gregory C. Wilshusen
Publisher: DIANE Publishing
ISBN: 1437931235
Category : Computers
Languages : en
Pages : 21
Book Description
Without proper safeguards, fed. computer systems are vulnerable to intrusions by individuals who have malicious intentions and can obtain sensitive info. The need for a vigilant approach to info. security (IS) has been demonstrated by the pervasive and sustained cyber attacks against the U.S. Concerned by reports of weaknesses in fed. systems, Congress passed the Fed. IS Management Act (FISMA), which authorized and strengthened IS program, evaluation, and annual reporting requirements for fed. agencies. This testimony discusses fed. IS and agency efforts to comply with FISMA. It summarizes: (1) fed. agencies¿ efforts to secure info. systems and (2) opportunities to enhance fed. cybersecurity. Charts and tables.
Publisher: DIANE Publishing
ISBN: 1437931235
Category : Computers
Languages : en
Pages : 21
Book Description
Without proper safeguards, fed. computer systems are vulnerable to intrusions by individuals who have malicious intentions and can obtain sensitive info. The need for a vigilant approach to info. security (IS) has been demonstrated by the pervasive and sustained cyber attacks against the U.S. Concerned by reports of weaknesses in fed. systems, Congress passed the Fed. IS Management Act (FISMA), which authorized and strengthened IS program, evaluation, and annual reporting requirements for fed. agencies. This testimony discusses fed. IS and agency efforts to comply with FISMA. It summarizes: (1) fed. agencies¿ efforts to secure info. systems and (2) opportunities to enhance fed. cybersecurity. Charts and tables.
Cybersecurity: Continued Federal Efforts are Needed to Protect Critical Systems and Information
Author: Gregory C. Wilshusen
Publisher: DIANE Publishing
ISBN: 1437918506
Category : Computers
Languages : en
Pages : 24
Book Description
Federal laws and policy have assigned important roles and responsibilities to the Dept. of Homeland Security (DHS) and the Nat. Inst. of Standards and Tech. (NIST) for securing computer networks and systems. DHS is charged with coordinating the protection of computer-reliant critical infrastructure -- much of which is owned by the private sector -- and securing its own computer systems, while NIST is responsible for developing standards and guidelines for implementing security controls over information and information systems. This report describes cybersecurity efforts at DHS and NIST -- including partnership activities with the private sector -- and the use of cybersecurity performance metrics in the fed. gov¿t. Table and graphs.
Publisher: DIANE Publishing
ISBN: 1437918506
Category : Computers
Languages : en
Pages : 24
Book Description
Federal laws and policy have assigned important roles and responsibilities to the Dept. of Homeland Security (DHS) and the Nat. Inst. of Standards and Tech. (NIST) for securing computer networks and systems. DHS is charged with coordinating the protection of computer-reliant critical infrastructure -- much of which is owned by the private sector -- and securing its own computer systems, while NIST is responsible for developing standards and guidelines for implementing security controls over information and information systems. This report describes cybersecurity efforts at DHS and NIST -- including partnership activities with the private sector -- and the use of cybersecurity performance metrics in the fed. gov¿t. Table and graphs.
Information Security
Author: U S Government Accountability Office (G
Publisher: BiblioGov
ISBN: 9781289123734
Category :
Languages : en
Pages : 28
Book Description
The U.S. Government Accountability Office (GAO) is an independent agency that works for Congress. The GAO watches over Congress, and investigates how the federal government spends taxpayers dollars. The Comptroller General of the United States is the leader of the GAO, and is appointed to a 15-year term by the U.S. President. The GAO wants to support Congress, while at the same time doing right by the citizens of the United States. They audit, investigate, perform analyses, issue legal decisions and report anything that the government is doing. This is one of their reports.
Publisher: BiblioGov
ISBN: 9781289123734
Category :
Languages : en
Pages : 28
Book Description
The U.S. Government Accountability Office (GAO) is an independent agency that works for Congress. The GAO watches over Congress, and investigates how the federal government spends taxpayers dollars. The Comptroller General of the United States is the leader of the GAO, and is appointed to a 15-year term by the U.S. President. The GAO wants to support Congress, while at the same time doing right by the citizens of the United States. They audit, investigate, perform analyses, issue legal decisions and report anything that the government is doing. This is one of their reports.
Cybersecurity: Continued Efforts Are Needed to Protect Information Systems Form Evolving Threats
Author: Gregory C. Wilshusen
Publisher: DIANE Publishing
ISBN: 1437925650
Category : Computers
Languages : en
Pages : 24
Book Description
Pervasive and sustained cyber attacks continue to pose a potentially devastating threat to the systems and operations of the fed. government. In recent months, fed. officials have cited the continued efforts of foreign nations and criminals to target government and private sector networks; terrorist groups have expressed a desire to use cyber attacks to target the U.S.; and press accounts have reported attacks on the Web sites of government agencies. This statement describes: (1) cyber threats to fed. information systems and cyber-based critical infrastructures; (2) control deficiencies at fed. agencies that make these systems and infrastructures vulnerable to cyber threats; and (3) opportunities that exist for improving fed. cybersecurity.
Publisher: DIANE Publishing
ISBN: 1437925650
Category : Computers
Languages : en
Pages : 24
Book Description
Pervasive and sustained cyber attacks continue to pose a potentially devastating threat to the systems and operations of the fed. government. In recent months, fed. officials have cited the continued efforts of foreign nations and criminals to target government and private sector networks; terrorist groups have expressed a desire to use cyber attacks to target the U.S.; and press accounts have reported attacks on the Web sites of government agencies. This statement describes: (1) cyber threats to fed. information systems and cyber-based critical infrastructures; (2) control deficiencies at fed. agencies that make these systems and infrastructures vulnerable to cyber threats; and (3) opportunities that exist for improving fed. cybersecurity.
Federal Information Security Issues
Author: Gregory C. Wilshusen
Publisher: DIANE Publishing
ISBN: 1437918638
Category : Computers
Languages : en
Pages : 7
Book Description
Addresses additional questions arising from the May 19, 2009, hearing on federal information security held by the Subcommittee on Government Management, Organization, and Procurement. In that hearing, there was a discussion on the current state of information security throughout the federal government and agency efforts to comply with the requirements of the Federal Information Security Management Act of 2002 (FISMA). Congress had the following two questions: (1) Comment on the need for improved cyber security relating to S.773, the proposed Cybersecurity Act of 2009; and (2) Provide recommendations to improve the Federal Information Security Management Act. This report provides the responses.
Publisher: DIANE Publishing
ISBN: 1437918638
Category : Computers
Languages : en
Pages : 7
Book Description
Addresses additional questions arising from the May 19, 2009, hearing on federal information security held by the Subcommittee on Government Management, Organization, and Procurement. In that hearing, there was a discussion on the current state of information security throughout the federal government and agency efforts to comply with the requirements of the Federal Information Security Management Act of 2002 (FISMA). Congress had the following two questions: (1) Comment on the need for improved cyber security relating to S.773, the proposed Cybersecurity Act of 2009; and (2) Provide recommendations to improve the Federal Information Security Management Act. This report provides the responses.