You limited your search to:

 Collection: Congressional Research Service Reports
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: May 6, 2003
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: February 10, 2003
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: August 7, 2003
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: April 9, 2003
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: September 25, 2003
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: February 17, 2005
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: December 14, 2001
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: June 10, 2015
Creator: Moteff, John D.
Description: This report discusses in more detail the evolution of a national critical infrastructure policy and the institutional structures established to implement it. The report highlights two primary issues confronting Congress going forward, both in the context of cybersecurity: information sharing and regulation.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: What Makes an Infrastructure Critical?

Critical Infrastructures: What Makes an Infrastructure Critical?

Date: August 30, 2002
Creator: Moteff, John D; Copeland, Claudia & Fischer, John W
Description: A fluid definition of what constitutes a critical infrastructure could complicate policymaking and actions. At the very least, a growing list of infrastructures in need of protection will require the federal government to prioritize its efforts. Essentially the federal government will have to try to minimize the impact on the nation’s critical infrastructure of any future terrorist attack, taking into account what those impacts might be and the likelihood of their occurring.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: What Makes an Infrastructure Critical?

Critical Infrastructures: What Makes an Infrastructure Critical?

Date: January 29, 2003
Creator: Moteff, John D; Copeland, Claudia & Fischer, John W
Description: A fluid definition of what constitutes a critical infrastructure could complicate policymaking and actions. At the very least, a growing list of infrastructures in need of protection will require the federal government to prioritize its efforts. Essentially the federal government will have to try to minimize the impact on the nation’s critical infrastructure of any future terrorist attack, taking into account what those impacts might be and the likelihood of their occurring.
Contributing Partner: UNT Libraries Government Documents Department