Information Security: Progress Reported, but Weaknesses at Federal Agencies Persist: Congressional Testimony

Information Security: Progress Reported, but Weaknesses at Federal Agencies Persist: Congressional Testimony PDF Author:
Publisher: DIANE Publishing
ISBN: 1437902669
Category :
Languages : en
Pages : 35

Get Book Here

Book Description

Information Security: Progress Reported, but Weaknesses at Federal Agencies Persist: Congressional Testimony

Information Security: Progress Reported, but Weaknesses at Federal Agencies Persist: Congressional Testimony PDF Author:
Publisher: DIANE Publishing
ISBN: 1437902669
Category :
Languages : en
Pages : 35

Get Book Here

Book Description


Information Security: Agencies Make Progress in Implementation of Requirements, But Significant Weaknesses Persist

Information Security: Agencies Make Progress in Implementation of Requirements, But Significant Weaknesses Persist PDF Author: Gregory C. Wilshusen
Publisher: DIANE Publishing
ISBN: 1437917631
Category :
Languages : en
Pages : 16

Get Book Here

Book Description
Without proper safeguards, fed. agencies' computer systems are vulnerable to intrusions by individuals and groups who have malicious intentions and can obtain sensitive info., commit fraud, disrupt operations, or launch attacks against other computer systems and networks. Concerned by reports of significant weaknesses in fed. systems, Congress passed the Fed. Info. Security Mgmt. Act (FISMA), which permanently authorized and strengthened info. security program, evaluation, and annual reporting requirements for fed. agencies. This is testimony on a draft report on: (1) the adequacy and effectiveness of fed. agencies' info. security policies and practices; and (2) their implementation of FISMA requirements.

Information Security: Concerted Response Needed to Resolve Persistent Weakness

Information Security: Concerted Response Needed to Resolve Persistent Weakness PDF Author: Gregory C. Wilshusen
Publisher: DIANE Publishing
ISBN: 1437931235
Category : Computers
Languages : en
Pages : 21

Get Book Here

Book Description
Without proper safeguards, fed. computer systems are vulnerable to intrusions by individuals who have malicious intentions and can obtain sensitive info. The need for a vigilant approach to info. security (IS) has been demonstrated by the pervasive and sustained cyber attacks against the U.S. Concerned by reports of weaknesses in fed. systems, Congress passed the Fed. IS Management Act (FISMA), which authorized and strengthened IS program, evaluation, and annual reporting requirements for fed. agencies. This testimony discusses fed. IS and agency efforts to comply with FISMA. It summarizes: (1) fed. agencies¿ efforts to secure info. systems and (2) opportunities to enhance fed. cybersecurity. Charts and tables.

Information Security: Agencies Report Progress, But Sensitive Data Remain at Risk

Information Security: Agencies Report Progress, But Sensitive Data Remain at Risk PDF Author: Gregory Wilshusen
Publisher: DIANE Publishing
ISBN: 9781422319154
Category : Computers
Languages : en
Pages : 34

Get Book Here

Book Description
Weaknesses in information security (IS) in the fed. gov¿t. are a problem with potentially devastating consequences -- such as intrusions by malicious users, compromised networks, & the theft of personally identifiable info; it is a high-risk issue. Concerned by reports of significant vulnerabilities in fed. computer systems, Congress passed the Fed. Info. Security Mgmt. Act of 2002 (FISMA), which authorized & strengthened the IS program, eval¿n., & reporting require. for fed. agencies. This testimony discusses security incidents reported at fed. agencies, the continued weaknesses in IS controls at major fed. agencies, agencies¿ progress in performing key control activities, & oppor. to enhance FISMA reporting & independent evaluations. Tables.

Identity Theft: Governments Have Acted to Protect Personally Identifiable Information, But Vulnerabilities Remain

Identity Theft: Governments Have Acted to Protect Personally Identifiable Information, But Vulnerabilities Remain PDF Author: Daniel Bertoni
Publisher: DIANE Publishing
ISBN: 1437918239
Category : Computers
Languages : en
Pages : 24

Get Book Here

Book Description
The loss of personally identifiable information, such as an individual's Social Security number, name, and date of birth can result in serious harm, including identity theft. Identity theft, a serious crime that impacts millions of individuals each year, occurs when such information is used without authorization to commit fraud or other crimes. While progress has been made protecting personally identifiable information in the public and private sectors, challenges remain. This testimony summarizes: (1) the problem of identity theft; (2) steps taken at the fed., state, and local level to prevent potential identity theft; and (3) vulnerabilities that remain to protecting personally identifiable information, including in fed. information systems. Illustrations.

Agencies in Peril

Agencies in Peril PDF Author: United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security
Publisher:
ISBN:
Category : Administrative agencies
Languages : en
Pages : 216

Get Book Here

Book Description


Hearing on the Repeated Failures of VA's Information Technology Management

Hearing on the Repeated Failures of VA's Information Technology Management PDF Author: United States. Congress. House. Committee on Veterans' Affairs
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 88

Get Book Here

Book Description


The State of Federal Information Security

The State of Federal Information Security PDF Author: United States. Congress. House. Committee on Oversight and Government Reform. Subcommittee on Government Management, Organization, and Procurement
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 88

Get Book Here

Book Description


Cybersecurity: Continued Federal Efforts are Needed to Protect Critical Systems and Information

Cybersecurity: Continued Federal Efforts are Needed to Protect Critical Systems and Information PDF Author: Gregory C. Wilshusen
Publisher: DIANE Publishing
ISBN: 1437918506
Category : Computers
Languages : en
Pages : 24

Get Book Here

Book Description
Federal laws and policy have assigned important roles and responsibilities to the Dept. of Homeland Security (DHS) and the Nat. Inst. of Standards and Tech. (NIST) for securing computer networks and systems. DHS is charged with coordinating the protection of computer-reliant critical infrastructure -- much of which is owned by the private sector -- and securing its own computer systems, while NIST is responsible for developing standards and guidelines for implementing security controls over information and information systems. This report describes cybersecurity efforts at DHS and NIST -- including partnership activities with the private sector -- and the use of cybersecurity performance metrics in the fed. gov¿t. Table and graphs.

The Cybersecurity Partnership Between the Private Sector and Our Government

The Cybersecurity Partnership Between the Private Sector and Our Government PDF Author: United States. Congress. Senate. Committee on Commerce, Science, and Transportation
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 112

Get Book Here

Book Description