Author: United States. Congress. House. Committee on Science. Subcommittee on Technology
Publisher:
ISBN:
Category : Technology and state
Languages : en
Pages : 376
Book Description
Funding Needs for the National Institute of Standards and Technology (NIST), Parts I and II
Guide to Protecting the Confidentiality of Personally Identifiable Information
Author: Erika McCallister
Publisher: DIANE Publishing
ISBN: 1437934889
Category : Computers
Languages : en
Pages : 59
Book Description
The escalation of security breaches involving personally identifiable information (PII) has contributed to the loss of millions of records over the past few years. Breaches involving PII are hazardous to both individuals and org. Individual harms may include identity theft, embarrassment, or blackmail. Organ. harms may include a loss of public trust, legal liability, or remediation costs. To protect the confidentiality of PII, org. should use a risk-based approach. This report provides guidelines for a risk-based approach to protecting the confidentiality of PII. The recommend. here are intended primarily for U.S. Fed. gov¿t. agencies and those who conduct business on behalf of the agencies, but other org. may find portions of the publication useful.
Publisher: DIANE Publishing
ISBN: 1437934889
Category : Computers
Languages : en
Pages : 59
Book Description
The escalation of security breaches involving personally identifiable information (PII) has contributed to the loss of millions of records over the past few years. Breaches involving PII are hazardous to both individuals and org. Individual harms may include identity theft, embarrassment, or blackmail. Organ. harms may include a loss of public trust, legal liability, or remediation costs. To protect the confidentiality of PII, org. should use a risk-based approach. This report provides guidelines for a risk-based approach to protecting the confidentiality of PII. The recommend. here are intended primarily for U.S. Fed. gov¿t. agencies and those who conduct business on behalf of the agencies, but other org. may find portions of the publication useful.
Framework for Improving Critical Infrastructure Cybersecurity
Author:
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 48
Book Description
The Framework focuses on using business drivers to guide cybersecurity activities and considering cybersecurity risks as part of the organization’s risk management processes. The Framework consists of three parts: the Framework Core, the Implementation Tiers, and the Framework Profiles. The Framework Core is a set of cybersecurity activities, outcomes, and informative references that are common across sectors and critical infrastructure. Elements of the Core provide detailed guidance for developing individual organizational Profiles. Through use of Profiles, the Framework will help an organization to align and prioritize its cybersecurity activities with its business/mission requirements, risk tolerances, and resources. The Tiers provide a mechanism for organizations to view and understand the characteristics of their approach to managing cybersecurity risk, which will help in prioritizing and achieving cybersecurity objectives.
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 48
Book Description
The Framework focuses on using business drivers to guide cybersecurity activities and considering cybersecurity risks as part of the organization’s risk management processes. The Framework consists of three parts: the Framework Core, the Implementation Tiers, and the Framework Profiles. The Framework Core is a set of cybersecurity activities, outcomes, and informative references that are common across sectors and critical infrastructure. Elements of the Core provide detailed guidance for developing individual organizational Profiles. Through use of Profiles, the Framework will help an organization to align and prioritize its cybersecurity activities with its business/mission requirements, risk tolerances, and resources. The Tiers provide a mechanism for organizations to view and understand the characteristics of their approach to managing cybersecurity risk, which will help in prioritizing and achieving cybersecurity objectives.
National Institute of Standards and Technology Authorization Act of 1997
Author: United States. Congress. House. Committee on Science
Publisher:
ISBN:
Category :
Languages : en
Pages : 30
Book Description
Publisher:
ISBN:
Category :
Languages : en
Pages : 30
Book Description
Commerce, Justice, Science, and Related Agencies Appropriations for 2010, Part 2, 111-1 Hearings
Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 1898
Book Description
Publisher:
ISBN:
Category :
Languages : en
Pages : 1898
Book Description
Commerce, Justice, Science, and Related Agencies Appropriations for 2011, Part 2, 111-2 Hearings
Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 2084
Book Description
Publisher:
ISBN:
Category :
Languages : en
Pages : 2084
Book Description
2016 Catalog of Federal Domestic Assistance
Author: United States. Congress. Senate. Office of Management and Budget. Executive Office of the President
Publisher:
ISBN: 9780160936340
Category : Economic assistance, Domestic
Languages : en
Pages : 1780
Book Description
Identifies and describes specific government assistance opportunities such as loans, grants, counseling, and procurement contracts available under many agencies and programs.
Publisher:
ISBN: 9780160936340
Category : Economic assistance, Domestic
Languages : en
Pages : 1780
Book Description
Identifies and describes specific government assistance opportunities such as loans, grants, counseling, and procurement contracts available under many agencies and programs.
An Assessment of Federal Funding for Private Research and Development
Author: United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Federal Financial Management, Government Information, and International Security
Publisher:
ISBN:
Category : Political Science
Languages : en
Pages : 228
Book Description
Publisher:
ISBN:
Category : Political Science
Languages : en
Pages : 228
Book Description
Fiscal Year 2005 National Institute of Standards and Technology Budget
Author: United States. Congress. House. Committee on Science. Subcommittee on Environment, Technology, and Standards
Publisher:
ISBN:
Category :
Languages : en
Pages : 76
Book Description
Publisher:
ISBN:
Category :
Languages : en
Pages : 76
Book Description
Follow the Money, Part I and Part II
Author: United States. Congress. House. Committee on Science and Technology (2007). Subcommittee on Investigations and Oversight
Publisher:
ISBN:
Category : Federal aid to research
Languages : en
Pages : 364
Book Description
Publisher:
ISBN:
Category : Federal aid to research
Languages : en
Pages : 364
Book Description