You limited your search to:

 Decade: 2000-2009
 Collection: Congressional Research Service Reports
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: May 6, 2003
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: August 7, 2003
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: September 25, 2003
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: February 17, 2005
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructure: Control Systems and the Terrorist Threat

Critical Infrastructure: Control Systems and the Terrorist Threat

Date: October 1, 2002
Creator: Shea, Dana A
Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructure: Control Systems and the Terrorist Threat

Critical Infrastructure: Control Systems and the Terrorist Threat

Date: February 21, 2003
Creator: Shea, Dana A
Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructure: Control Systems and the Terrorist Threat

Critical Infrastructure: Control Systems and the Terrorist Threat

Date: April 23, 2003
Creator: Shea, Dana A
Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructure: Control Systems and the Terrorist Threat

Critical Infrastructure: Control Systems and the Terrorist Threat

Date: July 14, 2003
Creator: Shea, Dana A
Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Homeland Security - Reducing the Vulnerability of Public and Private Information Infrastructures to Terrorism: An Overview

Homeland Security - Reducing the Vulnerability of Public and Private Information Infrastructures to Terrorism: An Overview

Date: December 12, 2002
Creator: Seifert, Jeffrey W
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: What Makes an Infrastructure Critical?

Critical Infrastructures: What Makes an Infrastructure Critical?

Date: August 30, 2002
Creator: Moteff, John D; Copeland, Claudia & Fischer, John W
Description: A fluid definition of what constitutes a critical infrastructure could complicate policymaking and actions. At the very least, a growing list of infrastructures in need of protection will require the federal government to prioritize its efforts. Essentially the federal government will have to try to minimize the impact on the nation’s critical infrastructure of any future terrorist attack, taking into account what those impacts might be and the likelihood of their occurring.
Contributing Partner: UNT Libraries Government Documents Department