Implementation of the Computer Security Act: Hearing Before the Subcommittee on Transportation, Aviation, and Materials and the Subcommittee on Science, Research, and Technology of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred First Congress, First Session, March 21, 1989, Volume 4
United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Transportation, Aviation, and Materials
U.S. Government Printing Office, 1989 - 148 pages
Other editions - View all
access control activities automated information systems Chairman classified information Commission COMMITTEE ON SCIENCE compliance computer networks Computer Security Act computer security awareness computer security plans Computer Security Program computer security training Computer System Security CONGRESS LIBRARY CONGRESS THE LIBRARY contractors Data Encryption Standard Defense Department Director effort evaluation federal agencies federal computer systems Federal Information FIPS PUB GLICKMAN guidance guidelines identify implementing the Computer Institute of Standards issue JAY PLAGER KAMMER LIBRARY OF CONGRESS MCDONOUGH McMILLEN Memorandum of Understanding Message Authentication Code MORELLA National Computer National Security Agency NBS SPEC PUB NIST and NSA NIST's NSA and NIST OPM's PLAGER plans to NIST problem process sensitive information protection questionnaire reported requirements response RHILE Security and Privacy smart card Standards and Technology submitted technical Thank TIM VALENTINE training programs unclassified users VALENTINE Vice Admiral STUDEMAN virus viruses WALGREN
Page 47 - Presents a technique for conducting a risk analysis of an ADP facility and related assets. Provides guidance on collecting, quantifying, and analyzing data related to the frequency of caused by adverse events. This guideline describes the characteristics and attributes of a computer system that must be known for a risk analysis and gives an example of the risk analysis process. GUIDELINES FOR SECURITY OF COMPUTER APPLICATIONS...
Page 54 - This document provides, in the form of questions and answers, the background, and basic essential information required to understand the developmental process for automatic data processing (ADP) contingency plans. The primary intended audience consists of executives and managers who depend on ADP resources and services, yet may not be directly responsible for the daily management or supervision of data processing activities or facilities.
Page 5 - Mr. Chairman and members of the subcommittees, I appreciate the opportunity to testify before you today on HR 8005 which would prohibit the importation of chrome and other products from Rhodesia.
Page 49 - August 1981 Provides explicit advice on achieving database Integrity and security control. Identifies Integrity and security problems and discusses procedures and methods which have proven effective In addressing these problems. Provides an explicit, step-by-step procedure for examining and verifying the accuracy and completeness of a database. FIPS PUB 94 GUIDELINE ON ELECTRICAL POWER FOR ADP INSTALLATIONS September 1982 Provides information on factors in the electrica' environment that affect the...
Page 58 - Kammer has chaired several important evaluation committees for the Department of Commerce, including reviews of satellite systems for weather monitoring and the US LANDSAT program, and...
Page 45 - These publications are available through the Government Printing Office (GPO) and the National Technical Information Service (NTIS). The source and price for each publication are Indicated.
Page 58 - Materials, a major international society for the development of voluntary standards for materials, products, systems, and services. His awards include both the Gold and Silver Medals of the Department of Commerce, the William A. Jump Award for Exceptional Achievement in Public Administration, the Federal Government Meritorious Executive Award, and the Roger W. Jones Award for Executive Leadership. Mr. Kammer received his Bachelor of Arts degree from the University of Maryland in 1969.
Page 46 - Provides guidance in the selection of technical and related procedural methods for protecting personal data in automated information systems. Discusses categories of risks and the related safeguards for physical security, information management practices, and system controls to improve system security.
Page 46 - FIPS PUBS are sold by the National Technical Information Service (NTIS), US Department of Commerce. A list of current FIPS covering all...
Page 46 - Provides guidance to Federal organizations in developing physical security and risk management programs for their ADP facilities. Covers security analysis, natural disasters, failure of supporting utilities, system reliability, procedural measures and controls, protection of off-site facilities, contingency plans, security awareness, and security audit. Can be used as a checklist for planning and evaluating security of computer systems.