Cyber Security: U.S. Vulnerability and Preparedness : Hearing Before the Committee on Science, House of Representatives, One Hundred Ninth Congress, First Session, September 15, 2005, Volume 4U.S. Government Printing Office, 2006 - 101 pages |
From inside the book
Results 1-5 of 61
Page 3
... Information Technology Security and Privacy to the President's Critical Infrastructure Protection Board . Mr. John ... systems ? What are the possible consequences for these sectors of disrup- tion or attack on their information systems ...
... Information Technology Security and Privacy to the President's Critical Infrastructure Protection Board . Mr. John ... systems ? What are the possible consequences for these sectors of disrup- tion or attack on their information systems ...
Page 4
... information technology , the vulnerabilities in in- formation technology systems are myriad . About 10 new entries are added each day to the National Vulnerability Database ( maintained by the National Institute of Standards and Technology ) ...
... information technology , the vulnerabilities in in- formation technology systems are myriad . About 10 new entries are added each day to the National Vulnerability Database ( maintained by the National Institute of Standards and Technology ) ...
Page 5
... systems , and water proc- essing systems . These sectors are increasingly dependent on information sys- tems to administer business operations ( such as billing and supply chain management ) and to monitor and control physical ...
... systems , and water proc- essing systems . These sectors are increasingly dependent on information sys- tems to administer business operations ( such as billing and supply chain management ) and to monitor and control physical ...
Page 6
... systems and as- sets , whether physical or virtual , so vital to the United States that the incapacity or ... information technology for both business operations and process controls , and many of these information systems directly use ...
... systems and as- sets , whether physical or virtual , so vital to the United States that the incapacity or ... information technology for both business operations and process controls , and many of these information systems directly use ...
Page 7
... information technology sector's ISAC . Department of Homeland Security Cyber ... systems.5 Cur- rently , within these broad goals , three areas of particular ... systems , and ( 3 ) improving software assurance ( trying to move from patch ...
... information technology sector's ISAC . Department of Homeland Security Cyber ... systems.5 Cur- rently , within these broad goals , three areas of particular ... systems , and ( 3 ) improving software assurance ( trying to move from patch ...
Other editions - View all
Common terms and phrases
activities AKIN American Electric Power Andy areas assets best practices Chairman BOEHLERT Chief Information Officer collaboration Committee communications companies Control Systems Security coordination critical infra critical infrastructure protection critical infrastructure sectors cyber attacks cyber incidents cyber security research cyber security standards cyber threat cyber vulnerability cyberspace Department of Homeland Directorate disruption Dow Chemical Company efforts Electric Power electricity sector ensure federal agencies focus FREESE GEISSE Homeland Security identify impact industry information security information sharing information systems information technology integrity Internet ISACS issues Katrina Kepler Leggate ment mitigation National Cyber Security National Cyberspace National Response Plan NCRCG NCSD NCSD's networks NIPP NIST operations partnership PCII plans for cyber priority private sector public and private Purdy Research and Development risk management rity role SCADA secu Secure Cyberspace stakeholders Strategy telecommunications Thank threats and vulnerabilities tion US-CERT vendors vulnerability assessments