Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 61
Book Description
Information System Security: Government Information Security Reform Act Implementation: Defense Advanced Research Projects Agency Management Support System
Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 61
Book Description
Publisher:
ISBN:
Category :
Languages : en
Pages : 61
Book Description
Government Information Security Reform Act Implementation
Author: United States. Department of Defense. Office of the Inspector General
Publisher:
ISBN:
Category :
Languages : en
Pages :
Book Description
Publisher:
ISBN:
Category :
Languages : en
Pages :
Book Description
Government Information Security Reform Act Implementation
Author: United States. Department of Defense. Office of the Inspector General
Publisher:
ISBN:
Category :
Languages : en
Pages :
Book Description
Publisher:
ISBN:
Category :
Languages : en
Pages :
Book Description
Information System Security: Government Information Security Reform Act Implementation: Defense Security Assistance Management System
Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 0
Book Description
To gather data on assessments of the effectiveness of DoD information assurance policies, procedures, and practices, DoD developed a GISR Act collection matrix for automated information systems. DoD selected a sample of 560 automated information systems from the almost 4,000 automated information systems in DoD. For those 560 systems, DoD reported the aggregate results of the assessments for FY 2001 in "GISR Report FY01: Government Information Security Reform Act, Report of the Department of Defense," October 2001. Of the 560 systems, the Office of the Inspector General of the Department of Defense, the Defense Information Systems Agency Inspector General, and Military Department audit agencies assessed a sample of 115 systems. This report is one in a series of GISR Act audits and is an assessment of the Defense Security Assistance Management System. The Defense Security Assistance Management System is a mission-essential system developed to produce and track security assistance-related contractual documents (sales agreements between governments).
Publisher:
ISBN:
Category :
Languages : en
Pages : 0
Book Description
To gather data on assessments of the effectiveness of DoD information assurance policies, procedures, and practices, DoD developed a GISR Act collection matrix for automated information systems. DoD selected a sample of 560 automated information systems from the almost 4,000 automated information systems in DoD. For those 560 systems, DoD reported the aggregate results of the assessments for FY 2001 in "GISR Report FY01: Government Information Security Reform Act, Report of the Department of Defense," October 2001. Of the 560 systems, the Office of the Inspector General of the Department of Defense, the Defense Information Systems Agency Inspector General, and Military Department audit agencies assessed a sample of 115 systems. This report is one in a series of GISR Act audits and is an assessment of the Defense Security Assistance Management System. The Defense Security Assistance Management System is a mission-essential system developed to produce and track security assistance-related contractual documents (sales agreements between governments).
Information security additional actions needed to fully implement reform legislation.
Author:
Publisher: DIANE Publishing
ISBN: 1428945059
Category :
Languages : en
Pages : 43
Book Description
In March, we testified before your subcommittee on the federal governments first-year efforts to implement legislative provisions for Government Information Security Reform (the reform provisions).1 In brief, we reported that initial implementation of the reform provisions is a significant step in improving federal agencies information security programs and addressing their serious, pervasive information security weaknesses, and has resulted in agency benefits and important actions by the administration to address information security.
Publisher: DIANE Publishing
ISBN: 1428945059
Category :
Languages : en
Pages : 43
Book Description
In March, we testified before your subcommittee on the federal governments first-year efforts to implement legislative provisions for Government Information Security Reform (the reform provisions).1 In brief, we reported that initial implementation of the reform provisions is a significant step in improving federal agencies information security programs and addressing their serious, pervasive information security weaknesses, and has resulted in agency benefits and important actions by the administration to address information security.
Information System Security: Government Information Security Reform Act Implementation: Noncombatant Evacuation Operations Tracking System
Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 31
Book Description
Public Law 106-398, Government Information Security Reform, title X, subtitle G of the Floyd D. Spence National Defense Authorization Act for FY 2001, October 30, 2000, requires that each agency obtain an independent assessment of its security posture. The Inspector General of each agency is required to evaluate the agency security posture based on a review of an independently selected subset of information systems. The DoD uses information technology for thousands of processes that are integral to support and operational functions. Mission-critical, mission-essential, and support-function processes, or applications, reside on computer systems throughout DoD. DoD selected a sample of 560 automated information systems from the almost 4,000 automated information systems in DoD. For those 560 systems, DoD developed a Government Information Security Reform Act collection matrix that was used to gather data on assessments of the effectiveness of DoD information assurance policies, procedures, and practices. DoD reported the aggregate results of the assessments for FY 2001 in GISR Report FY01: Government Information Security Reform Act, Report of the Department of Defense, October 2001. Of the 560 systems, the Office of the Inspector General of the Department of Defense; the Defense Information Systems Agency Inspector General; and Military Department Audit Agencies assessed a sample of 115 systems. This report is one in a series of Government Information Security Reform Act audits and is an assessment of the Noncombatant Evacuation Operations Tracking System.
Publisher:
ISBN:
Category :
Languages : en
Pages : 31
Book Description
Public Law 106-398, Government Information Security Reform, title X, subtitle G of the Floyd D. Spence National Defense Authorization Act for FY 2001, October 30, 2000, requires that each agency obtain an independent assessment of its security posture. The Inspector General of each agency is required to evaluate the agency security posture based on a review of an independently selected subset of information systems. The DoD uses information technology for thousands of processes that are integral to support and operational functions. Mission-critical, mission-essential, and support-function processes, or applications, reside on computer systems throughout DoD. DoD selected a sample of 560 automated information systems from the almost 4,000 automated information systems in DoD. For those 560 systems, DoD developed a Government Information Security Reform Act collection matrix that was used to gather data on assessments of the effectiveness of DoD information assurance policies, procedures, and practices. DoD reported the aggregate results of the assessments for FY 2001 in GISR Report FY01: Government Information Security Reform Act, Report of the Department of Defense, October 2001. Of the 560 systems, the Office of the Inspector General of the Department of Defense; the Defense Information Systems Agency Inspector General; and Military Department Audit Agencies assessed a sample of 115 systems. This report is one in a series of Government Information Security Reform Act audits and is an assessment of the Noncombatant Evacuation Operations Tracking System.
Lessons learned from the Government Information Security Reform Act of 2000
Author: United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations
Publisher:
ISBN:
Category : Business & Economics
Languages : en
Pages : 168
Book Description
Publisher:
ISBN:
Category : Business & Economics
Languages : en
Pages : 168
Book Description
LESSONS LEARNED FROM THE GOVERNMENT INFORMATION SECURITY REFORM ACT OF 2000... HEARING... COMMITTEE ON GOVERNMENT REFORM, HOUSE OF REPRESENT
Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 160
Book Description
Publisher:
ISBN:
Category :
Languages : en
Pages : 160
Book Description
H.R. 3844, the Federal Information Security Management Act of 2002
Author: United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 188
Book Description
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 188
Book Description
INFORMATION SECURITY: Additional Actions Needed to Fully Implement Reform Legislation
Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 44
Book Description
In March, we testified before your subcommittee on the federal governments first-year efforts to implement legislative provisions for Government Information Security Reform (the reform provisions).1 In brief, we reported that initial implementation of the reform provisions is a significant step in improving federal agencies information security programs and addressing their serious, pervasive information security weaknesses, and has resulted in agency benefits and important actions by the administration to address information security.
Publisher:
ISBN:
Category :
Languages : en
Pages : 44
Book Description
In March, we testified before your subcommittee on the federal governments first-year efforts to implement legislative provisions for Government Information Security Reform (the reform provisions).1 In brief, we reported that initial implementation of the reform provisions is a significant step in improving federal agencies information security programs and addressing their serious, pervasive information security weaknesses, and has resulted in agency benefits and important actions by the administration to address information security.