Computer Security: Identification of Sensitive Systems Operated on Behalf of Ten Agencies : Congressional RequestersThe Office, 1989 - 20 pages |
From inside the book
Results 1-5 of 8
Page 2
... copy of the Computer Security Act or agencies ' definitions of terms , such as sensitive information , along with their reporting instructions . The agen- cies ' headquarters consolidated the information they received and pre- pared an ...
... copy of the Computer Security Act or agencies ' definitions of terms , such as sensitive information , along with their reporting instructions . The agen- cies ' headquarters consolidated the information they received and pre- pared an ...
Page 3
... copies of the lists of sensi- tive computer systems that were submitted to the Committees . We inter- viewed officials of each of the 10 agencies to ascertain how they identified their sensitive systems operated by contractors , states ...
... copies of the lists of sensi- tive computer systems that were submitted to the Committees . We inter- viewed officials of each of the 10 agencies to ascertain how they identified their sensitive systems operated by contractors , states ...
Page 8
... copy of the Computer Security Act of 1987 , and Agriculture's definition of sensitive information . This was done as part of Agriculture's effort to comply with the Computer Security Act . In its response to the Committees ' request ...
... copy of the Computer Security Act of 1987 , and Agriculture's definition of sensitive information . This was done as part of Agriculture's effort to comply with the Computer Security Act . In its response to the Committees ' request ...
Page 9
... copy of the Commit- tees ' letter requesting this information . We contacted one Defense component , the Department of the Navy , to determine how it identified its sensitive systems . According to the Com- puter Security Coordinator ...
... copy of the Commit- tees ' letter requesting this information . We contacted one Defense component , the Department of the Navy , to determine how it identified its sensitive systems . According to the Com- puter Security Coordinator ...
Page 13
... copy of the Computer Security Act , a list of implementation dates , and a form to collect data on all sensitive computer systems . Jus- tice's Systems Policy Staff reviewed the components ' lists of sensitive systems and compared the ...
... copy of the Computer Security Act , a list of implementation dates , and a form to collect data on all sensitive computer systems . Jus- tice's Systems Policy Staff reviewed the components ' lists of sensitive systems and compared the ...
Common terms and phrases
According additional sensitive systems additional systems agencies identified Agencies to Identify analyst compared the lists compiled components a letter components requesting Computer Security Act Computer Security Officer computer security plans computer systems operated contacted definition of sensitive Department of Agriculture Department of Defense Environmental Protection Agency Forest Service's Geological Survey Health and Human Human Services identified its sensitive identified sensitive systems Identify the Systems identify their sensitive Information Resources Management inventory of sensitive letter requesting lists of sensitive Marine Corps headquarters NASA November 1988 request November 29 Number of Sensitive operated by contrac operated by contractors organizations original responses preparing its response puter Security Reported and Approaches Request of March Request of November requesting lists Response to Committees sensitive computer sys sensitive computer systems sensitive information sensitive systems operated Sensitive Systems Reported sent a letter Space Administration Status of Compliance systems are operated tems operated tive computer systems
Popular passages
Page 1 - The Honorable Robert A. Roe Chairman, Committee on Science, Space, and Technology House of Representatives The Honorable Robert S.
Page 3 - ... and law enforcement (see Box 4-1). The agencies that receive significant funding from domestic discretionary appropriations are among the most visible in government; they include the Departments of Agriculture, Education, Energy, Health and Human Services, Housing and Urban Development, and Justice, as well as the Environmental Protection Agency and the National Aeronautics and Space Administration. Many of the programs and activities funded under the domestic discretionary category are also...
Page 3 - These agencies are the Departments of Agriculture, Defense, Energy, Health and Human Services, Interior, Justice, Labor, Treasury, as well as the Environmental Protection Agency and the National Aeronautics and Space Administration.
Page 2 - ... along with their reporting instructions. The agencies' headquarters consolidated the information they received and prepared an agency response.