You limited your search to:

 Collection: Congressional Research Service Reports
Maritime and Port Security: A Comparison of Major Provisions of S. 1214 and H.R. 3983

Maritime and Port Security: A Comparison of Major Provisions of S. 1214 and H.R. 3983

Date: October 4, 2002
Creator: Frittelli, John F
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Maritime and Port Security: A Comparison of Major Provisions of S. 1214 and H.R. 3983

Maritime and Port Security: A Comparison of Major Provisions of S. 1214 and H.R. 3983

Date: July 15, 2002
Creator: Frittelli, John F
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Date: April 1, 2005
Creator: Wilson, Clay
Description: This report provides background information for three types of attacks against computers (cyber-attack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The report also describes the possible effects of a coordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists.
Contributing Partner: UNT Libraries Government Documents Department
Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

Date: October 17, 2003
Creator: Wilson, Clay
Description: This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity interferes with individual privacy; whether the roles and responsibilities for protecting against a possible cyber terrorist attack need more clarity for government, industry, and home users; and, whether information sharing on cyber threats and vulnerabilities must be further increased between private industry and the federal government. The final section describes possible policy options for improving protection against threats from possible cyber terrorism.
Contributing Partner: UNT Libraries Government Documents Department
Year 2000 Problem: Potential Impacts on National Infrastructures

Year 2000 Problem: Potential Impacts on National Infrastructures

Date: December 4, 1998
Creator: Nunno, Richard M
Description: The year 2000 (Y2K) computer problem poses a potential threat to the continued proper functioning of many national infrastructures. These include telecommunications, utilities, financial services, health care, transportation, government services, and military preparedness. Other sectors -- such as water, agriculture, food processing and distribution, emergency services, and small and medium sized businesses -- have also been identified as having potentially significant Y2K problems but, due to space constraints, are not discussed here. While public and private sector entities report progress toward resolving their Y2K problems, much uncertainty remains regarding which systems are most vulnerable to failures. The overall impact resulting from the Y2K problem to some degree still depends on remediation progress made in 1999.
Contributing Partner: UNT Libraries Government Documents Department
Spinning the Web: The History and Infrastructure of the Internet

Spinning the Web: The History and Infrastructure of the Internet

Date: August 12, 1999
Creator: Tehan, Rita
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Risk Management and Critical Infrastructure Protection: Assessing, Integrating, and Managing Threats, Vulnerabilities and Consequences

Risk Management and Critical Infrastructure Protection: Assessing, Integrating, and Managing Threats, Vulnerabilities and Consequences

Date: September 2, 2004
Creator: Moteff, John D
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Port and Maritime Security: Potential for Terrorist Nuclear Attack Using Oil Tankers

Port and Maritime Security: Potential for Terrorist Nuclear Attack Using Oil Tankers

Date: December 7, 2004
Creator: Medalia, Jonathan
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Terrorist Nuclear Attacks on Seaports: Threat and Response

Terrorist Nuclear Attacks on Seaports: Threat and Response

Date: January 24, 2005
Creator: Medalia, Jonathan
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Terrorist Nuclear Attacks on Seaports: Threat and Response

Terrorist Nuclear Attacks on Seaports: Threat and Response

Date: August 13, 2003
Creator: Medalia, Jonathan
Description: None
Contributing Partner: UNT Libraries Government Documents Department