Author: United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 160
Book Description
H.R. 3844, the Federal Information Security Management Act of 2002
Author: United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 160
Book Description
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 160
Book Description
Information security progress made, but weaknesses at the Internal Revenue Service continue to pose risks.
Author:
Publisher: DIANE Publishing
ISBN: 1428941819
Category :
Languages : en
Pages : 40
Book Description
Publisher: DIANE Publishing
ISBN: 1428941819
Category :
Languages : en
Pages : 40
Book Description
Information Security
Author: Robert F. Dacey
Publisher: DIANE Publishing
ISBN: 1428941800
Category : Computers
Languages : en
Pages : 36
Book Description
The Dept. of the Treasury relies heavily on information systems -- & on the public¿s trust in its work. Information security is therefore critical to Treasury operations. In support of its annual audit of the govt.¿s financial statements, the author assessed the effectiveness of: (1) Treasury¿s information security controls in protecting the confidentiality, integrity, & availability of the department¿s systems & data; & (2) Treasury¿s implementation of its departmentwide information security program. In assessing the adequacy of Treasury¿s information security program, the author focused on the effectiveness of its departmentwide policies & processes, rather than on bureau-specific directives & guidance. Includes recommendations. Charts & tables.
Publisher: DIANE Publishing
ISBN: 1428941800
Category : Computers
Languages : en
Pages : 36
Book Description
The Dept. of the Treasury relies heavily on information systems -- & on the public¿s trust in its work. Information security is therefore critical to Treasury operations. In support of its annual audit of the govt.¿s financial statements, the author assessed the effectiveness of: (1) Treasury¿s information security controls in protecting the confidentiality, integrity, & availability of the department¿s systems & data; & (2) Treasury¿s implementation of its departmentwide information security program. In assessing the adequacy of Treasury¿s information security program, the author focused on the effectiveness of its departmentwide policies & processes, rather than on bureau-specific directives & guidance. Includes recommendations. Charts & tables.
H.R. 2458 and S. 803, the E-Government Act of 2002
Author: United States. Congress. House. Committee on Government Reform. Subcommittee on Technology and Procurement Policy
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 268
Book Description
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 268
Book Description
Federal Information Security Issues
Author: Gregory C. Wilshusen
Publisher: DIANE Publishing
ISBN: 1437918638
Category : Computers
Languages : en
Pages : 7
Book Description
Addresses additional questions arising from the May 19, 2009, hearing on federal information security held by the Subcommittee on Government Management, Organization, and Procurement. In that hearing, there was a discussion on the current state of information security throughout the federal government and agency efforts to comply with the requirements of the Federal Information Security Management Act of 2002 (FISMA). Congress had the following two questions: (1) Comment on the need for improved cyber security relating to S.773, the proposed Cybersecurity Act of 2009; and (2) Provide recommendations to improve the Federal Information Security Management Act. This report provides the responses.
Publisher: DIANE Publishing
ISBN: 1437918638
Category : Computers
Languages : en
Pages : 7
Book Description
Addresses additional questions arising from the May 19, 2009, hearing on federal information security held by the Subcommittee on Government Management, Organization, and Procurement. In that hearing, there was a discussion on the current state of information security throughout the federal government and agency efforts to comply with the requirements of the Federal Information Security Management Act of 2002 (FISMA). Congress had the following two questions: (1) Comment on the need for improved cyber security relating to S.773, the proposed Cybersecurity Act of 2009; and (2) Provide recommendations to improve the Federal Information Security Management Act. This report provides the responses.
Critical infrastructure protection significant challenges need to be addressed
Author:
Publisher: DIANE Publishing
ISBN: 1428944257
Category : Computer crimes
Languages : en
Pages : 64
Book Description
The United States General Accounting Office (GAO) presents a report entitled "Critical Infrastructure Protection: Significant Challenges in Developing National Capabilities," published in April 2001. The report is for the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary for the U.S. Senate. The report discusses the progress of the National Infrastructure Protection Center (NIPC) in developing national capabilities for analyzing cyber threat and vulnerability data and enhancing capabilities for responding to cyber attacks.
Publisher: DIANE Publishing
ISBN: 1428944257
Category : Computer crimes
Languages : en
Pages : 64
Book Description
The United States General Accounting Office (GAO) presents a report entitled "Critical Infrastructure Protection: Significant Challenges in Developing National Capabilities," published in April 2001. The report is for the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary for the U.S. Senate. The report discusses the progress of the National Infrastructure Protection Center (NIPC) in developing national capabilities for analyzing cyber threat and vulnerability data and enhancing capabilities for responding to cyber attacks.
High-risk Series
Author: United States. General Accounting Office
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 40
Book Description
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 40
Book Description
Cyberterrorism
Author: United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 208
Book Description
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 208
Book Description
FISMA and the Risk Management Framework
Author: Daniel R. Philpott
Publisher: Newnes
ISBN: 1597496421
Category : Computers
Languages : en
Pages : 585
Book Description
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security deals with the Federal Information Security Management Act (FISMA), a law that provides the framework for securing information systems and managing risk associated with information resources in federal government agencies. Comprised of 17 chapters, the book explains the FISMA legislation and its provisions, strengths and limitations, as well as the expectations and obligations of federal agencies subject to FISMA. It also discusses the processes and activities necessary to implement effective information security management following the passage of FISMA, and it describes the National Institute of Standards and Technology's Risk Management Framework. The book looks at how information assurance, risk management, and information systems security is practiced in federal government agencies; the three primary documents that make up the security authorization package: system security plan, security assessment report, and plan of action and milestones; and federal information security-management requirements and initiatives not explicitly covered by FISMA. This book will be helpful to security officers, risk managers, system owners, IT managers, contractors, consultants, service providers, and others involved in securing, managing, or overseeing federal information systems, as well as the mission functions and business processes supported by those systems. - Learn how to build a robust, near real-time risk management system and comply with FISMA - Discover the changes to FISMA compliance and beyond - Gain your systems the authorization they need
Publisher: Newnes
ISBN: 1597496421
Category : Computers
Languages : en
Pages : 585
Book Description
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security deals with the Federal Information Security Management Act (FISMA), a law that provides the framework for securing information systems and managing risk associated with information resources in federal government agencies. Comprised of 17 chapters, the book explains the FISMA legislation and its provisions, strengths and limitations, as well as the expectations and obligations of federal agencies subject to FISMA. It also discusses the processes and activities necessary to implement effective information security management following the passage of FISMA, and it describes the National Institute of Standards and Technology's Risk Management Framework. The book looks at how information assurance, risk management, and information systems security is practiced in federal government agencies; the three primary documents that make up the security authorization package: system security plan, security assessment report, and plan of action and milestones; and federal information security-management requirements and initiatives not explicitly covered by FISMA. This book will be helpful to security officers, risk managers, system owners, IT managers, contractors, consultants, service providers, and others involved in securing, managing, or overseeing federal information systems, as well as the mission functions and business processes supported by those systems. - Learn how to build a robust, near real-time risk management system and comply with FISMA - Discover the changes to FISMA compliance and beyond - Gain your systems the authorization they need
107-2 Hearing: Cyberterrorism: Is The Nation's Critical Infrastructure Adequately Protected?, July 24, 2002, *
Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 200
Book Description
Publisher:
ISBN:
Category :
Languages : en
Pages : 200
Book Description