You limited your search to:

 Collection: Congressional Research Service Reports
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: December 14, 2001
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: February 17, 2005
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: July 15, 2004
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: July 12, 2005
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: July 18, 2002
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: February 4, 2002
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: December 17, 2002
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Risk Management and Critical Infrastructure Protection: Assessing, Integrating, and Managing Threats, Vulnerabilities and Consequences

Risk Management and Critical Infrastructure Protection: Assessing, Integrating, and Managing Threats, Vulnerabilities and Consequences

Date: September 2, 2004
Creator: Moteff, John D
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructure and Key Assets: Definition and Identification

Critical Infrastructure and Key Assets: Definition and Identification

Date: October 1, 2004
Creator: Moteff, John D & Parfomak, Paul W
Description: This report reviews the concept and definition of “critical infrastructure” as it has appeared in federal reports, legislation and regulation since the early 1980s. The report highlights the changes and expansion of that definition as the focus of public policy debates shifted from infrastructure adequacy to infrastructure protection. Finally the report summarizes current policy issues associated with critical infrastructure identification by federal agencies and the private sector. The report is intentionally limited to definitional issues and categorization of infrastructure.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructure Information Disclosure and Homeland Security

Critical Infrastructure Information Disclosure and Homeland Security

Date: August 31, 2002
Creator: Moteff, John D & Stevens, Gina Marie
Description: This report discusses the Freedom of Information Act (FOIA) that was passed to ensure by statute citizen access to government information. Nine categories of information may be exempted from disclosure. Three of the nine exemptions provide possible protection against the release of critical infrastructure information: exemption 1 (national security information); exemption 3 (information exempted by statute); and exemption 4 (confidential business information). Congress has considered several proposals to exempt critical infrastructure information from the FOIA.
Contributing Partner: UNT Libraries Government Documents Department