Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Cybersecurity
  • Language: en
  • Pages: 36

Cybersecurity

  • Type: Book
  • -
  • Published: 2013-04-08
  • -
  • Publisher: Unknown

Statement of Gregory C. Wilshusen, Dir., Information Security Issues, GAO. Federal government agencies and the nation’s critical infrastructures have become increasingly dependent on computerized information systems and electronic data to carry out their operations. While creating significant benefits, this can also introduce vulnerabilities to cyber-threats which could have a serious impact on national security, the economy, and public health and safety. GAO has designated federal information security as a high-risk area since 1997 and in 2003 expanded this to include cyber critical infrastructure protection. This testimony discusses challenges facing the government in effectively implementing cybersecurity and the extent to which the national cybersecurity strategy includes desirable characteristics of a national strategy. Figures. This is a print on demand report.

Cybersecurity: Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats
  • Language: en
  • Pages: 15

Cybersecurity: Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats

Pervasive and sustained cyber attacks continue to pose a potentially devastating threat to the systems and operations of the fed. gov¿t. Many nation states, terrorist networks, and organized criminal groups have the capability to target elements of the U.S. info. infrastructure for intelligence collection, intellectual property theft, or disruption. The dependence of fed. agencies on info. systems to carry out essential, everyday operations can make them vulnerable to an array of cyber-based risks. This statement describes: (1) cyber threats to fed. info. systems and cyber-based critical infrastructures; (2) control deficiencies that make fed. systems vulnerable to those threats; and (3) opportunities that exist for improving fed. cybersecurity.

Cybersecurity: Continued Attention Needed to Protect Our Nation¿s Critical Infrastructure and Federal Information Systems
  • Language: en
  • Pages: 21

Cybersecurity: Continued Attention Needed to Protect Our Nation¿s Critical Infrastructure and Federal Information Systems

Discusses the cyber threats to critical infrastructure and the Amer. economy. Pervasive and sustained cyber attacks against the U.S. continue to pose a potentially devastating impact on fed. and non-fed. systems and operations. In Feb. 2011, the Dir. of National Intelligence testified that, in the past year, there had been a dramatic increase in malicious cyber activity targeting U.S. computers and networks, incl. a more than tripling of the vol. of malicious software since 2009. This testimony describes: (1) cyber threats to cyber-reliant critical infrastructures and federal information systems; and (2) the continuing challenges federal agencies face in protecting the nation's cyber-reliant critical infrastructures and federal systems. A print on demand report.

Cybersecurity: Continued Efforts Are Needed to Protect Information Systems Form Evolving Threats
  • Language: en
  • Pages: 24

Cybersecurity: Continued Efforts Are Needed to Protect Information Systems Form Evolving Threats

Pervasive and sustained cyber attacks continue to pose a potentially devastating threat to the systems and operations of the fed. government. In recent months, fed. officials have cited the continued efforts of foreign nations and criminals to target government and private sector networks; terrorist groups have expressed a desire to use cyber attacks to target the U.S.; and press accounts have reported attacks on the Web sites of government agencies. This statement describes: (1) cyber threats to fed. information systems and cyber-based critical infrastructures; (2) control deficiencies at fed. agencies that make these systems and infrastructures vulnerable to cyber threats; and (3) opportunities that exist for improving fed. cybersecurity.

Cybersecurity: Continued Federal Efforts are Needed to Protect Critical Systems and Information
  • Language: en
  • Pages: 24

Cybersecurity: Continued Federal Efforts are Needed to Protect Critical Systems and Information

Federal laws and policy have assigned important roles and responsibilities to the Dept. of Homeland Security (DHS) and the Nat. Inst. of Standards and Tech. (NIST) for securing computer networks and systems. DHS is charged with coordinating the protection of computer-reliant critical infrastructure -- much of which is owned by the private sector -- and securing its own computer systems, while NIST is responsible for developing standards and guidelines for implementing security controls over information and information systems. This report describes cybersecurity efforts at DHS and NIST -- including partnership activities with the private sector -- and the use of cybersecurity performance metrics in the fed. gov¿t. Table and graphs.

Information Security: Cyber Threats and Vulnerabilities Place Federal Systems at Risk
  • Language: en
  • Pages: 21

Information Security: Cyber Threats and Vulnerabilities Place Federal Systems at Risk

Information security is a critical consideration for any organization that depends on info. systems and computer networks to carry out its mission or business. It is especially important for gov¿t. agencies, where maintaining the public's trust is essential. The need for a vigilant approach to info. security has been demonstrated by the pervasive and sustained computerbased (cyber) attacks againimpactst the U.S. and others that continue to pose a potentially devastating to systems and the operations and critical infrastructures that they support. This report describes: (1) cyber threats to fed. info. systems and cyberbased critical infrastructures; and (2) control deficiencies that make these systems and infrastructures vulnerable to those threats. Ill.

Information Security
  • Language: en
  • Pages: 26

Information Security

In carrying out its mission to ensure that securities markets are fair, orderly, & efficiently maintained, the Securities & Exchange Comm. (SEC) relies extensively on computerized systems. Integrating effective information security controls into a layered control strategy is essential to ensure that SEC¿s financial & sensitive information is protected from inadvertent or deliberate misuse, disclosure, or destruction. This report assessed: (1) SEC¿s actions to correct previously reported information security weaknesses; & (2) the effectiveness of controls for ensuring the confidentiality, integrity, & availability of SEC¿s information systems & information. Includes recommendations. Charts & tables.

Information Security: Concerted Response Needed to Resolve Persistent Weakness
  • Language: en
  • Pages: 21

Information Security: Concerted Response Needed to Resolve Persistent Weakness

Without proper safeguards, fed. computer systems are vulnerable to intrusions by individuals who have malicious intentions and can obtain sensitive info. The need for a vigilant approach to info. security (IS) has been demonstrated by the pervasive and sustained cyber attacks against the U.S. Concerned by reports of weaknesses in fed. systems, Congress passed the Fed. IS Management Act (FISMA), which authorized and strengthened IS program, evaluation, and annual reporting requirements for fed. agencies. This testimony discusses fed. IS and agency efforts to comply with FISMA. It summarizes: (1) fed. agencies¿ efforts to secure info. systems and (2) opportunities to enhance fed. cybersecurity. Charts and tables.

Information Security
  • Language: en
  • Pages: 66

Information Security

Weaknesses in info. security (IS) are a widespread problem that can have serious consequences -- such as intrusions by malicious users, compromised networks, and the theft of intellectual property and personally identifiable info. -- and has identified IS as a governmentwide high-risk issue since 1997. Concerned by reports of significant vulnerabilities in fed. computer systems, Congress passed the Fed. IS Mgmt. Act of 2002 (FISMA), which authorized and strengthened IS program, evaluation, and reporting requirements for fed. agencies. This report evaluates: (1) the adequacy and effectiveness of agencies' IS policies and practices; and (2) fed. agencies' implementation of FISMA requirements. Includes recommendations. Illustrations.