Information Security: Agencies Make Progress in Implementation of Requirements, But Significant Weaknesses Persist

Information Security: Agencies Make Progress in Implementation of Requirements, But Significant Weaknesses Persist PDF Author: Gregory C. Wilshusen
Publisher: DIANE Publishing
ISBN: 1437917631
Category :
Languages : en
Pages : 16

Get Book Here

Book Description
Without proper safeguards, fed. agencies' computer systems are vulnerable to intrusions by individuals and groups who have malicious intentions and can obtain sensitive info., commit fraud, disrupt operations, or launch attacks against other computer systems and networks. Concerned by reports of significant weaknesses in fed. systems, Congress passed the Fed. Info. Security Mgmt. Act (FISMA), which permanently authorized and strengthened info. security program, evaluation, and annual reporting requirements for fed. agencies. This is testimony on a draft report on: (1) the adequacy and effectiveness of fed. agencies' info. security policies and practices; and (2) their implementation of FISMA requirements.

Information security weaknesses persist at federal agencies despite progress made in implementing related statutory requirements : report to congressional committees.

Information security weaknesses persist at federal agencies despite progress made in implementing related statutory requirements : report to congressional committees. PDF Author: United States Government Accountability Office
Publisher: DIANE Publishing
ISBN: 1428931287
Category : Administrative agencies
Languages : en
Pages : 54

Get Book Here

Book Description


Information Security: Progress Reported, but Weaknesses at Federal Agencies Persist: Congressional Testimony

Information Security: Progress Reported, but Weaknesses at Federal Agencies Persist: Congressional Testimony PDF Author:
Publisher: DIANE Publishing
ISBN: 1437902669
Category :
Languages : en
Pages : 35

Get Book Here

Book Description


The State of Federal Information Security

The State of Federal Information Security PDF Author: United States. Congress. House. Committee on Oversight and Government Reform. Subcommittee on Government Management, Organization, and Procurement
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 88

Get Book Here

Book Description


Assessing Cybersecurity Activities at NIST and DHS

Assessing Cybersecurity Activities at NIST and DHS PDF Author: United States. Congress. House. Committee on Science and Technology (2007). Subcommittee on Technology and Innovation
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 84

Get Book Here

Book Description


Cybersecurity: Continued Federal Efforts are Needed to Protect Critical Systems and Information

Cybersecurity: Continued Federal Efforts are Needed to Protect Critical Systems and Information PDF Author: Gregory C. Wilshusen
Publisher: DIANE Publishing
ISBN: 1437918506
Category : Computers
Languages : en
Pages : 24

Get Book Here

Book Description
Federal laws and policy have assigned important roles and responsibilities to the Dept. of Homeland Security (DHS) and the Nat. Inst. of Standards and Tech. (NIST) for securing computer networks and systems. DHS is charged with coordinating the protection of computer-reliant critical infrastructure -- much of which is owned by the private sector -- and securing its own computer systems, while NIST is responsible for developing standards and guidelines for implementing security controls over information and information systems. This report describes cybersecurity efforts at DHS and NIST -- including partnership activities with the private sector -- and the use of cybersecurity performance metrics in the fed. gov¿t. Table and graphs.

Information Security

Information Security PDF Author: Gregory C. Wilshusen
Publisher: DIANE Publishing
ISBN: 1437932223
Category : Computers
Languages : en
Pages : 88

Get Book Here

Book Description
The increase in security incidents and continuing weakness in security controls on information technology systems at federal agencies highlight the continuing need for improved information security. To standardize and strengthen agencies' security, the Office of Management and Budget, in collaboration with the Nat. Inst. of Standards and Technology, launched the Federal Desktop Core Configuration initiative in 2007. This report: (1) identifies the goals, objectives, and requirements of the initiative; (2) determines the status of actions federal agencies have taken, or plan to take, to implement the initiative; and (3) identifies the benefits, challenges, and lessons learned in implementing this initiative. Includes recommendations. Charts and tables.

Federal Information Security Issues

Federal Information Security Issues PDF Author: Gregory C. Wilshusen
Publisher: DIANE Publishing
ISBN: 1437918638
Category : Computers
Languages : en
Pages : 7

Get Book Here

Book Description
Addresses additional questions arising from the May 19, 2009, hearing on federal information security held by the Subcommittee on Government Management, Organization, and Procurement. In that hearing, there was a discussion on the current state of information security throughout the federal government and agency efforts to comply with the requirements of the Federal Information Security Management Act of 2002 (FISMA). Congress had the following two questions: (1) Comment on the need for improved cyber security relating to S.773, the proposed Cybersecurity Act of 2009; and (2) Provide recommendations to improve the Federal Information Security Management Act. This report provides the responses.

Identity Theft: Governments Have Acted to Protect Personally Identifiable Information, But Vulnerabilities Remain

Identity Theft: Governments Have Acted to Protect Personally Identifiable Information, But Vulnerabilities Remain PDF Author: Daniel Bertoni
Publisher: DIANE Publishing
ISBN: 1437918239
Category : Computers
Languages : en
Pages : 24

Get Book Here

Book Description
The loss of personally identifiable information, such as an individual's Social Security number, name, and date of birth can result in serious harm, including identity theft. Identity theft, a serious crime that impacts millions of individuals each year, occurs when such information is used without authorization to commit fraud or other crimes. While progress has been made protecting personally identifiable information in the public and private sectors, challenges remain. This testimony summarizes: (1) the problem of identity theft; (2) steps taken at the fed., state, and local level to prevent potential identity theft; and (3) vulnerabilities that remain to protecting personally identifiable information, including in fed. information systems. Illustrations.

Managing Information in the Public Sector

Managing Information in the Public Sector PDF Author: Jay D White
Publisher: Routledge
ISBN: 1317465504
Category : Political Science
Languages : en
Pages : 333

Get Book Here

Book Description
This first-of-its-kind survey covers both the basics of information technology and the managerial and political issues surrounding the use of these technologies. Unlike other works on information systems, this book is written specifically for the public sector and addresses unique public sector issues and concerns. The technical basics are explained in clear English with as little technical jargon as possible so that readers can move on to informed analysis of the public policy issues surrounding government's use of MIS. This practical tool includes end of chapter summaries with bridges to upcoming chapters, numerous boxed exhibits, thorough end-of-chapter notes and a bibliography for further reading.