Implementation of the Computer Security Act: Hearing Before the Subcommittee on Transportation, Aviation, and Materials and the Subcommittee on Science, Research, and Technology of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred First Congress, First Session, March 21, 1989, Volume 4U.S. Government Printing Office, 1989 - 148 pages |
From inside the book
Results 1-5 of 39
Page 8
... requirements of the Act . In a few instances that involvement called for discussions with agency staff to assure that complete submissions would be sent . As I noted earlier , NIST and NSA have received more than 1500 plans for review ...
... requirements of the Act . In a few instances that involvement called for discussions with agency staff to assure that complete submissions would be sent . As I noted earlier , NIST and NSA have received more than 1500 plans for review ...
Page 9
... requirements of Bulletin 88-16 . The net result was that certain assumptions that each had been making about the security of the systems were discussed and clarified . In the first instance , this process raised the awareness to the ...
... requirements of Bulletin 88-16 . The net result was that certain assumptions that each had been making about the security of the systems were discussed and clarified . In the first instance , this process raised the awareness to the ...
Page 10
... Requirements of the Computer Security Act of 1987 " . Virtually all of the agencies have taken some action to establish awareness and training programs . Furthermore , most agencies reported that they were satisfied with the OPM ...
... Requirements of the Computer Security Act of 1987 " . Virtually all of the agencies have taken some action to establish awareness and training programs . Furthermore , most agencies reported that they were satisfied with the OPM ...
Page 12
... requirements of the Computer Security Act and the processes we are setting in place . On the other hand , there may be other programs where only a small part of the program activity actually affects or might affect federal activities ...
... requirements of the Computer Security Act and the processes we are setting in place . On the other hand , there may be other programs where only a small part of the program activity actually affects or might affect federal activities ...
Page 26
... requirements of the legislation , and $ 2 million to augment our technical program to meet future technology challenges . This level of funding will enable us to conduct a focused laboratory - based program , to assist in the ...
... requirements of the legislation , and $ 2 million to augment our technical program to meet future technology challenges . This level of funding will enable us to conduct a focused laboratory - based program , to assist in the ...
Other editions - View all
Common terms and phrases
access control activities Administration BURROWS Chairman classified information Commerce Commission COMMITTEE ON SCIENCE compliance computer networks Computer Security Act computer security awareness computer security plans Computer Security Program computer security training CONGRESS LIBRARY CONGRESS THE LIBRARY contractors Data Encryption Standard Defense Department Director effort evaluation federal agencies federal computer systems Federal Information FIPS PUB GLICKMAN guidance guidelines identify implementing the Computer Institute of Standards issue JAY PLAGER KAMMER LIBRARY OF CONGRESS MCDONOUGH McMILLEN Memorandum of Understanding Message Authentication Code MORELLA National Computer National Security Agency NBS SPEC PUB NIST and NSA NIST's NSA and NIST operating systems OPM's PLAGER plans to NIST problem process sensitive information protection questionnaire reported requirements response RHILE Security and Privacy smart card Standards and Technology submitted technical Thank TIM VALENTINE training programs unclassified users VALENTINE Vice Admiral STUDEMAN virus viruses WALGREN
Popular passages
Page 47 - Presents a technique for conducting a risk analysis of an ADP facility and related assets. Provides guidance on collecting, quantifying, and analyzing data related to the frequency of caused by adverse events. This guideline describes the characteristics and attributes of a computer system that must be known for a risk analysis and gives an example of the risk analysis process. GUIDELINES FOR SECURITY OF COMPUTER APPLICATIONS...
Page 54 - This document provides, in the form of questions and answers, the background, and basic essential information required to understand the developmental process for automatic data processing (ADP) contingency plans. The primary intended audience consists of executives and managers who depend on ADP resources and services, yet may not be directly responsible for the daily management or supervision of data processing activities or facilities.
Page 5 - Mr. Chairman and members of the subcommittees, I appreciate the opportunity to testify before you today on HR 8005 which would prohibit the importation of chrome and other products from Rhodesia.
Page 49 - August 1981 Provides explicit advice on achieving database Integrity and security control. Identifies Integrity and security problems and discusses procedures and methods which have proven effective In addressing these problems. Provides an explicit, step-by-step procedure for examining and verifying the accuracy and completeness of a database. FIPS PUB 94 GUIDELINE ON ELECTRICAL POWER FOR ADP INSTALLATIONS September 1982 Provides information on factors in the electrica' environment that affect the...
Page 58 - Kammer has chaired several important evaluation committees for the Department of Commerce, including reviews of satellite systems for weather monitoring and the US LANDSAT program, and...
Page 45 - These publications are available through the Government Printing Office (GPO) and the National Technical Information Service (NTIS). The source and price for each publication are Indicated.
Page 58 - Materials, a major international society for the development of voluntary standards for materials, products, systems, and services. His awards include both the Gold and Silver Medals of the Department of Commerce, the William A. Jump Award for Exceptional Achievement in Public Administration, the Federal Government Meritorious Executive Award, and the Roger W. Jones Award for Executive Leadership. Mr. Kammer received his Bachelor of Arts degree from the University of Maryland in 1969.
Page 46 - Provides guidance in the selection of technical and related procedural methods for protecting personal data in automated information systems. Discusses categories of risks and the related safeguards for physical security, information management practices, and system controls to improve system security.
Page 46 - FIPS PUBS are sold by the National Technical Information Service (NTIS), US Department of Commerce. A list of current FIPS covering all...
Page 46 - Provides guidance to Federal organizations in developing physical security and risk management programs for their ADP facilities. Covers security analysis, natural disasters, failure of supporting utilities, system reliability, procedural measures and controls, protection of off-site facilities, contingency plans, security awareness, and security audit. Can be used as a checklist for planning and evaluating security of computer systems.