You limited your search to:

 Collection: Congressional Research Service Reports
Western Water Resource Issues
No Description digital.library.unt.edu/ark:/67531/metacrs3608/
Western Water Resource Issues
No Description digital.library.unt.edu/ark:/67531/metacrs3607/
Western Water Resource Issues
No Description digital.library.unt.edu/ark:/67531/metacrs3606/
Western Water Resource Issues
No Description digital.library.unt.edu/ark:/67531/metacrs2042/
San Diego Wastewater Treatment: Current Issues
No Description digital.library.unt.edu/ark:/67531/metacrs272/
Maritime and Port Security: A Comparison of Major Provisions of S. 1214 and H.R. 3983
No Description digital.library.unt.edu/ark:/67531/metacrs3589/
Maritime and Port Security: A Comparison of Major Provisions of S. 1214 and H.R. 3983
No Description digital.library.unt.edu/ark:/67531/metacrs3588/
Maritime and Port Security: A Comparison of Major Provisions of S. 1214 and H.R. 3983
No Description digital.library.unt.edu/ark:/67531/metacrs3587/
Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
This report provides background information for three types of attacks against computers (cyber-attack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The report also describes the possible effects of a coordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists. digital.library.unt.edu/ark:/67531/metacrs6315/
Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress
This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity interferes with individual privacy; whether the roles and responsibilities for protecting against a possible cyber terrorist attack need more clarity for government, industry, and home users; and, whether information sharing on cyber threats and vulnerabilities must be further increased between private industry and the federal government. The final section describes possible policy options for improving protection against threats from possible cyber terrorism. digital.library.unt.edu/ark:/67531/metacrs5513/
Year 2000 Problem: Potential Impacts on National Infrastructures
The year 2000 (Y2K) computer problem poses a potential threat to the continued proper functioning of many national infrastructures. These include telecommunications, utilities, financial services, health care, transportation, government services, and military preparedness. Other sectors -- such as water, agriculture, food processing and distribution, emergency services, and small and medium sized businesses -- have also been identified as having potentially significant Y2K problems but, due to space constraints, are not discussed here. While public and private sector entities report progress toward resolving their Y2K problems, much uncertainty remains regarding which systems are most vulnerable to failures. The overall impact resulting from the Y2K problem to some degree still depends on remediation progress made in 1999. digital.library.unt.edu/ark:/67531/metacrs807/
Spinning the Web: The History and Infrastructure of the Internet
No Description digital.library.unt.edu/ark:/67531/metacrs1026/
Risk Management and Critical Infrastructure Protection: Assessing, Integrating, and Managing Threats, Vulnerabilities and Consequences
No Description digital.library.unt.edu/ark:/67531/metacrs6033/
Port and Maritime Security: Potential for Terrorist Nuclear Attack Using Oil Tankers
No Description digital.library.unt.edu/ark:/67531/metacrs5955/
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description digital.library.unt.edu/ark:/67531/metacrs6264/
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description digital.library.unt.edu/ark:/67531/metacrs5048/
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description digital.library.unt.edu/ark:/67531/metacrs5047/
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description digital.library.unt.edu/ark:/67531/metacrs5046/
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description digital.library.unt.edu/ark:/67531/metacrs5045/
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description digital.library.unt.edu/ark:/67531/metacrs3180/
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description digital.library.unt.edu/ark:/67531/metacrs3179/
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description digital.library.unt.edu/ark:/67531/metacrs3178/
Maritime Security: Overview of Issues
No Description digital.library.unt.edu/ark:/67531/metacrs5044/
Maritime Security: Overview of Issues
No Description digital.library.unt.edu/ark:/67531/metacrs5043/
Maritime Security: Overview of Issues
No Description digital.library.unt.edu/ark:/67531/metacrs3177/
Critical Infrastructure and Key Assets: Definition and Identification
This report reviews the concept and definition of “critical infrastructure” as it has appeared in federal reports, legislation and regulation since the early 1980s. The report highlights the changes and expansion of that definition as the focus of public policy debates shifted from infrastructure adequacy to infrastructure protection. Finally the report summarizes current policy issues associated with critical infrastructure identification by federal agencies and the private sector. The report is intentionally limited to definitional issues and categorization of infrastructure. digital.library.unt.edu/ark:/67531/metacrs5954/
Homeland Security: Banking and Financial Infrastructure Continuity
No Description digital.library.unt.edu/ark:/67531/metacrs5042/
Homeland Security Act of 2002: Critical Infrastructure Information Act
No Description digital.library.unt.edu/ark:/67531/metacrs5041/
Port and Maritime Security: Background and Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs5040/
Critical Infrastructures: What Makes an Infrastructure Critical?
A fluid definition of what constitutes a critical infrastructure could complicate policymaking and actions. At the very least, a growing list of infrastructures in need of protection will require the federal government to prioritize its efforts. Essentially the federal government will have to try to minimize the impact on the nation’s critical infrastructure of any future terrorist attack, taking into account what those impacts might be and the likelihood of their occurring. digital.library.unt.edu/ark:/67531/metacrs5039/
Critical Infrastructures: What Makes an Infrastructure Critical?
A fluid definition of what constitutes a critical infrastructure could complicate policymaking and actions. At the very least, a growing list of infrastructures in need of protection will require the federal government to prioritize its efforts. Essentially the federal government will have to try to minimize the impact on the nation’s critical infrastructure of any future terrorist attack, taking into account what those impacts might be and the likelihood of their occurring. digital.library.unt.edu/ark:/67531/metacrs3176/
Homeland Security - Reducing the Vulnerability of Public and Private Information Infrastructures to Terrorism: An Overview
No Description digital.library.unt.edu/ark:/67531/metacrs3175/
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet. digital.library.unt.edu/ark:/67531/metacrs5038/
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet. digital.library.unt.edu/ark:/67531/metacrs5037/
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet. digital.library.unt.edu/ark:/67531/metacrs5031/
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet. digital.library.unt.edu/ark:/67531/metacrs3173/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs6265/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs5036/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs5035/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs5034/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs5033/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs5032/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs3174/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs3172/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs3171/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs1828/
Critical Infrastructures: Background and Early Implementation of PDD-63
The nation's health, wealth, and security rely on the supply and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed or financial capital, the institutions that manage it, and the record- keeping and communications that move it from one institution to another). digital.library.unt.edu/ark:/67531/metacrs1827/
Critical Infrastructures: Background and Early Implementation of PDD-63
The nation's health, wealth, and security rely on the supply and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed or financial capital, the institutions that manage it, and the record- keeping and communications that move it from one institution to another). digital.library.unt.edu/ark:/67531/metacrs1253/
The National Information Infrastructure: The Federal Role
No Description digital.library.unt.edu/ark:/67531/metacrs129/
Appalachian Development Highway Program (ADHP): An Overview
This report discusses the Appalachian Development Highway Program (ADHP). After a brief description of the ADHP system, the report describes the ADHP's operation, organization, spending history and status. It then describes changes in its funding mechanism resultant from TEA 21 and issues of interest to Congress related to the ADHP. digital.library.unt.edu/ark:/67531/metacrs725/