Author: United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations
Publisher:
ISBN:
Category : Administrative agencies
Languages : en
Pages : 192
Book Description
What Can be Done to Reduce the Threats Posed by Computer Viruses and Worms to the Workings of Government? : Hearing Before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, First Session, August 29, 2001
Author: United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations
Publisher:
ISBN:
Category : Administrative agencies
Languages : en
Pages : 192
Book Description
Publisher:
ISBN:
Category : Administrative agencies
Languages : en
Pages : 192
Book Description
Monthly Catalog of United States Government Publications
Author:
Publisher:
ISBN:
Category : Government publications
Languages : en
Pages : 836
Book Description
Publisher:
ISBN:
Category : Government publications
Languages : en
Pages : 836
Book Description
Information Security and Privacy in Network Environments
Author:
Publisher: United States Congress
ISBN:
Category : Computer networks
Languages : en
Pages : 252
Book Description
The use of information networks for business and government is expanding enormously. Government use of networks features prominently in plans to make government more efficient, effective, and responsive. But the transformation brought about by the networking also raises new concerns for the security and privacy of networked information. This Office of Technology Assessment (OTA) report was requested by the Senate Committee on Governmental Affairs and the House Subcommittee on Telecommunications and Finance. The report begins with background information and an overview of the current situation, a statement of the problems involved in safeguarding unclassified networked information, and a summary of policy issues and options. The major part of the report is then devoted to detailed discussions of policy issues in three areas: (1) cryptography policy, including federal information processing standards and export controls; (2) guidance on safeguarding unclassified information in federal agencies; and (3) legal issues and information security, including electronic commerce, privacy, and intellectual property. Appendices include Congressional letters of request; the Computer Security Act and related documents; evolution of the digital signature standard; and lists of workshop participants, reviews, and other contributors. An index is provided. A separately published eight-page OTA Report Summary is included. (JLB).
Publisher: United States Congress
ISBN:
Category : Computer networks
Languages : en
Pages : 252
Book Description
The use of information networks for business and government is expanding enormously. Government use of networks features prominently in plans to make government more efficient, effective, and responsive. But the transformation brought about by the networking also raises new concerns for the security and privacy of networked information. This Office of Technology Assessment (OTA) report was requested by the Senate Committee on Governmental Affairs and the House Subcommittee on Telecommunications and Finance. The report begins with background information and an overview of the current situation, a statement of the problems involved in safeguarding unclassified networked information, and a summary of policy issues and options. The major part of the report is then devoted to detailed discussions of policy issues in three areas: (1) cryptography policy, including federal information processing standards and export controls; (2) guidance on safeguarding unclassified information in federal agencies; and (3) legal issues and information security, including electronic commerce, privacy, and intellectual property. Appendices include Congressional letters of request; the Computer Security Act and related documents; evolution of the digital signature standard; and lists of workshop participants, reviews, and other contributors. An index is provided. A separately published eight-page OTA Report Summary is included. (JLB).
Creating a National Framework for Cybersecurity
Author: Eric A. Fischer
Publisher: Nova Science Pub Incorporated
ISBN: 9781604565591
Category : Science
Languages : en
Pages : 92
Book Description
Even before the terrorist attacks of September 2001, concerns had been rising among security experts about the vulnerabilities to attack of computer systems and associated infrastructure. Yet, despite increasing attention from federal and state governments and international organisations, the defence against attacks on these systems has appeared to be generally fragmented and varying widely in effectiveness. Concerns have grown that what is needed is a national cybersecurity framework a co-ordinated, coherent set of public- and private-sector efforts required to ensure an acceptable level of cybersecurity for the nation. As commonly used, cybersecurity refers to three things: measures to protect information technology; the information it contains, processes, and transmits, and associated physical and virtual elements (which together comprise cyberspace); the degree of protection resulting from application of those measures; and the associated field of professional endeavour. Virtually any element of cyberspace can be at risk, and the degree of interconnection of those elements can make it difficult to determine the extent of the cybersecurity framework that is needed. Identifying the major weaknesses in U.S. cybersecurity is an area of some controversy. However, some components appear to be sources of potentially significant risk because either major vulnerabilities have been identified or substantial impacts could result from a successful attack in particular, components that play critical roles in elements of critical infrastructure, widely used commercial software, organisational governance, and the level of public knowledge and perception about cybersecurity. This book addresses each of those questions in turn.
Publisher: Nova Science Pub Incorporated
ISBN: 9781604565591
Category : Science
Languages : en
Pages : 92
Book Description
Even before the terrorist attacks of September 2001, concerns had been rising among security experts about the vulnerabilities to attack of computer systems and associated infrastructure. Yet, despite increasing attention from federal and state governments and international organisations, the defence against attacks on these systems has appeared to be generally fragmented and varying widely in effectiveness. Concerns have grown that what is needed is a national cybersecurity framework a co-ordinated, coherent set of public- and private-sector efforts required to ensure an acceptable level of cybersecurity for the nation. As commonly used, cybersecurity refers to three things: measures to protect information technology; the information it contains, processes, and transmits, and associated physical and virtual elements (which together comprise cyberspace); the degree of protection resulting from application of those measures; and the associated field of professional endeavour. Virtually any element of cyberspace can be at risk, and the degree of interconnection of those elements can make it difficult to determine the extent of the cybersecurity framework that is needed. Identifying the major weaknesses in U.S. cybersecurity is an area of some controversy. However, some components appear to be sources of potentially significant risk because either major vulnerabilities have been identified or substantial impacts could result from a successful attack in particular, components that play critical roles in elements of critical infrastructure, widely used commercial software, organisational governance, and the level of public knowledge and perception about cybersecurity. This book addresses each of those questions in turn.
Computers at Risk
Author: National Research Council
Publisher: National Academies Press
ISBN: 0309043883
Category : Computers
Languages : en
Pages : 320
Book Description
Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.
Publisher: National Academies Press
ISBN: 0309043883
Category : Computers
Languages : en
Pages : 320
Book Description
Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.
Fostering Integrity in Research
Author: National Academies of Sciences, Engineering, and Medicine
Publisher: National Academies Press
ISBN: 0309391253
Category : Science
Languages : en
Pages : 327
Book Description
The integrity of knowledge that emerges from research is based on individual and collective adherence to core values of objectivity, honesty, openness, fairness, accountability, and stewardship. Integrity in science means that the organizations in which research is conducted encourage those involved to exemplify these values in every step of the research process. Understanding the dynamics that support â€" or distort â€" practices that uphold the integrity of research by all participants ensures that the research enterprise advances knowledge. The 1992 report Responsible Science: Ensuring the Integrity of the Research Process evaluated issues related to scientific responsibility and the conduct of research. It provided a valuable service in describing and analyzing a very complicated set of issues, and has served as a crucial basis for thinking about research integrity for more than two decades. However, as experience has accumulated with various forms of research misconduct, detrimental research practices, and other forms of misconduct, as subsequent empirical research has revealed more about the nature of scientific misconduct, and because technological and social changes have altered the environment in which science is conducted, it is clear that the framework established more than two decades ago needs to be updated. Responsible Science served as a valuable benchmark to set the context for this most recent analysis and to help guide the committee's thought process. Fostering Integrity in Research identifies best practices in research and recommends practical options for discouraging and addressing research misconduct and detrimental research practices.
Publisher: National Academies Press
ISBN: 0309391253
Category : Science
Languages : en
Pages : 327
Book Description
The integrity of knowledge that emerges from research is based on individual and collective adherence to core values of objectivity, honesty, openness, fairness, accountability, and stewardship. Integrity in science means that the organizations in which research is conducted encourage those involved to exemplify these values in every step of the research process. Understanding the dynamics that support â€" or distort â€" practices that uphold the integrity of research by all participants ensures that the research enterprise advances knowledge. The 1992 report Responsible Science: Ensuring the Integrity of the Research Process evaluated issues related to scientific responsibility and the conduct of research. It provided a valuable service in describing and analyzing a very complicated set of issues, and has served as a crucial basis for thinking about research integrity for more than two decades. However, as experience has accumulated with various forms of research misconduct, detrimental research practices, and other forms of misconduct, as subsequent empirical research has revealed more about the nature of scientific misconduct, and because technological and social changes have altered the environment in which science is conducted, it is clear that the framework established more than two decades ago needs to be updated. Responsible Science served as a valuable benchmark to set the context for this most recent analysis and to help guide the committee's thought process. Fostering Integrity in Research identifies best practices in research and recommends practical options for discouraging and addressing research misconduct and detrimental research practices.
The Manchurian Candidate
Author: Richard Condon
Publisher: RosettaBooks
ISBN: 0795335067
Category : Fiction
Languages : en
Pages : 312
Book Description
The classic thriller about a hostile foreign power infiltrating American politics: “Brilliant . . . wild and exhilarating.” —The New Yorker A war hero and the recipient of the Congressional Medal of Honor, Sgt. Raymond Shaw is keeping a deadly secret—even from himself. During his time as a prisoner of war in North Korea, he was brainwashed by his Communist captors and transformed into a deadly weapon—a sleeper assassin, programmed to kill without question or mercy at his captors’ signal. Now he’s been returned to the United States with a covert mission: to kill a candidate running for US president . . . This “shocking, tense” and sharply satirical novel has become a modern classic, and was the basis for two film adaptations (San Francisco Chronicle). “Crammed with suspense.” —Chicago Tribune “Condon is wickedly skillful.” —Time
Publisher: RosettaBooks
ISBN: 0795335067
Category : Fiction
Languages : en
Pages : 312
Book Description
The classic thriller about a hostile foreign power infiltrating American politics: “Brilliant . . . wild and exhilarating.” —The New Yorker A war hero and the recipient of the Congressional Medal of Honor, Sgt. Raymond Shaw is keeping a deadly secret—even from himself. During his time as a prisoner of war in North Korea, he was brainwashed by his Communist captors and transformed into a deadly weapon—a sleeper assassin, programmed to kill without question or mercy at his captors’ signal. Now he’s been returned to the United States with a covert mission: to kill a candidate running for US president . . . This “shocking, tense” and sharply satirical novel has become a modern classic, and was the basis for two film adaptations (San Francisco Chronicle). “Crammed with suspense.” —Chicago Tribune “Condon is wickedly skillful.” —Time
Bioterrorism and Biocrimes
Author: W. Seth Carus
Publisher: The Minerva Group, Inc.
ISBN: 9781410100238
Category : History
Languages : en
Pages : 224
Book Description
The working paper is divided into two main parts. The first part is a descriptive analysis of the illicit use of biological agents by criminals and terrorists. It draws on a series of case studies documented in the second part. The case studies describe every instance identifiable in open source materials in which a perpetrator used, acquired, or threatened to use a biological agent. While the inventory of cases is clearly incomplete, it provides an empirical basis for addressing a number of important questions relating to both biocrimes and bioterrorism. This material should enable policymakers concerned with bioterrorism to make more informed decisions. In the course of this project, the author has researched over 270 alleged cases involving biological agents. This includes all incidents found in open sources that allegedly occurred during the 20th Century. While the list is certainly not complete, it provides the most comprehensive existing unclassified coverage of instances of illicit use of biological agents.
Publisher: The Minerva Group, Inc.
ISBN: 9781410100238
Category : History
Languages : en
Pages : 224
Book Description
The working paper is divided into two main parts. The first part is a descriptive analysis of the illicit use of biological agents by criminals and terrorists. It draws on a series of case studies documented in the second part. The case studies describe every instance identifiable in open source materials in which a perpetrator used, acquired, or threatened to use a biological agent. While the inventory of cases is clearly incomplete, it provides an empirical basis for addressing a number of important questions relating to both biocrimes and bioterrorism. This material should enable policymakers concerned with bioterrorism to make more informed decisions. In the course of this project, the author has researched over 270 alleged cases involving biological agents. This includes all incidents found in open sources that allegedly occurred during the 20th Century. While the list is certainly not complete, it provides the most comprehensive existing unclassified coverage of instances of illicit use of biological agents.
Pharmaceutical R&D
Author:
Publisher: DIANE Publishing
ISBN: 9780788104688
Category : Medical
Languages : en
Pages : 380
Book Description
Analyzes the costs, risks, and economic rewards of pharmaceutical R&D and the impact of public policy on both costs and returns. Examines the rapid increase in pharmaceutical R&D that began in the 1980s in the light of trends in science, technology, drug discovery, and health insurance coverage; Government regulation; product liability; market competition; Federal tax policy; and Federal support of prescription drug research. 12 appendices, including a glossary of terms.
Publisher: DIANE Publishing
ISBN: 9780788104688
Category : Medical
Languages : en
Pages : 380
Book Description
Analyzes the costs, risks, and economic rewards of pharmaceutical R&D and the impact of public policy on both costs and returns. Examines the rapid increase in pharmaceutical R&D that began in the 1980s in the light of trends in science, technology, drug discovery, and health insurance coverage; Government regulation; product liability; market competition; Federal tax policy; and Federal support of prescription drug research. 12 appendices, including a glossary of terms.
Countering the Problem of Falsified and Substandard Drugs
Author: Institute of Medicine
Publisher: National Academies Press
ISBN: 0309269393
Category : Medical
Languages : en
Pages : 377
Book Description
The adulteration and fraudulent manufacture of medicines is an old problem, vastly aggravated by modern manufacturing and trade. In the last decade, impotent antimicrobial drugs have compromised the treatment of many deadly diseases in poor countries. More recently, negligent production at a Massachusetts compounding pharmacy sickened hundreds of Americans. While the national drugs regulatory authority (hereafter, the regulatory authority) is responsible for the safety of a country's drug supply, no single country can entirely guarantee this today. The once common use of the term counterfeit to describe any drug that is not what it claims to be is at the heart of the argument. In a narrow, legal sense a counterfeit drug is one that infringes on a registered trademark. The lay meaning is much broader, including any drug made with intentional deceit. Some generic drug companies and civil society groups object to calling bad medicines counterfeit, seeing it as the deliberate conflation of public health and intellectual property concerns. Countering the Problem of Falsified and Substandard Drugs accepts the narrow meaning of counterfeit, and, because the nuances of trademark infringement must be dealt with by courts, case by case, the report does not discuss the problem of counterfeit medicines.
Publisher: National Academies Press
ISBN: 0309269393
Category : Medical
Languages : en
Pages : 377
Book Description
The adulteration and fraudulent manufacture of medicines is an old problem, vastly aggravated by modern manufacturing and trade. In the last decade, impotent antimicrobial drugs have compromised the treatment of many deadly diseases in poor countries. More recently, negligent production at a Massachusetts compounding pharmacy sickened hundreds of Americans. While the national drugs regulatory authority (hereafter, the regulatory authority) is responsible for the safety of a country's drug supply, no single country can entirely guarantee this today. The once common use of the term counterfeit to describe any drug that is not what it claims to be is at the heart of the argument. In a narrow, legal sense a counterfeit drug is one that infringes on a registered trademark. The lay meaning is much broader, including any drug made with intentional deceit. Some generic drug companies and civil society groups object to calling bad medicines counterfeit, seeing it as the deliberate conflation of public health and intellectual property concerns. Countering the Problem of Falsified and Substandard Drugs accepts the narrow meaning of counterfeit, and, because the nuances of trademark infringement must be dealt with by courts, case by case, the report does not discuss the problem of counterfeit medicines.