Computer Security: Identification of Sensitive Systems Operated on Behalf of Ten Agencies : Congressional Requesters |
From inside the book
Results 6-8 of 8
Page 15
According to its response , Treasury identified the additional system during its review of components ' computer security plans . Number of Sensitive Systems Reported and Approaches Used by the Page 15 GAO / IMTEC - 89-70 Computer ...
According to its response , Treasury identified the additional system during its review of components ' computer security plans . Number of Sensitive Systems Reported and Approaches Used by the Page 15 GAO / IMTEC - 89-70 Computer ...
Page 16
According to EPA's Information Security Officer , this was done before enactment of the Computer Security Act of 1987. A Systems Manager from one component , the Office of Administration and Resources Management , confirmed that EPA ...
According to EPA's Information Security Officer , this was done before enactment of the Computer Security Act of 1987. A Systems Manager from one component , the Office of Administration and Resources Management , confirmed that EPA ...
Page 17
According to the Computer Security Officer , the Center determined that it has no sensitive systems that are operated by contractors , states , or other organizations . Response to Committees ' Request of March 7 , 1989 NASA reported ...
According to the Computer Security Officer , the Center determined that it has no sensitive systems that are operated by contractors , states , or other organizations . Response to Committees ' Request of March 7 , 1989 NASA reported ...
What people are saying - Write a review
We haven't found any reviews in the usual places.
Common terms and phrases
According accurate Administrator ADP Security Agencies to Identify Agriculture analyst Appendix Assistant behalf Center Commit compiled complete comply components requesting Computer Security Act computer security plans computer systems operated contacted contractor-operated copy Defense Department Department of Defense Department's determine Director Division Environmental Protection Agency five Forest Service's four Geological Survey Health and Human Human Services identified its sensitive Identify the Systems identify their sensitive Information Resources Management instructions Interior inventory of sensitive Justice Labor letter requesting lists of sensitive November 1988 request November 29 Number of Sensitive obtain operated by contrac operated by contractors organizations preparing its response received Reported and Approaches Request of March Request of November Requirements Response to Committees reviewed revise Senior sensitive computer sys sensitive computer systems sensitive information sensitive systems operated Sensitive Systems Reported sent a letter Space Administration Status of Compliance tees tion tive computer systems tors Treasury update verified
Popular passages
Page 1 - The Honorable Robert A. Roe Chairman, Committee on Science, Space, and Technology House of Representatives The Honorable Robert S.
Page 3 - ... and law enforcement (see Box 4-1). The agencies that receive significant funding from domestic discretionary appropriations are among the most visible in government; they include the Departments of Agriculture, Education, Energy, Health and Human Services, Housing and Urban Development, and Justice, as well as the Environmental Protection Agency and the National Aeronautics and Space Administration. Many of the programs and activities funded under the domestic discretionary category are also...
Page 3 - These agencies are the Departments of Agriculture, Defense, Energy, Health and Human Services, Interior, Justice, Labor, Treasury, as well as the Environmental Protection Agency and the National Aeronautics and Space Administration.
Page 2 - ... along with their reporting instructions. The agencies' headquarters consolidated the information they received and prepared an agency response.