Search Results

Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Homeland Security - Reducing the Vulnerability of Public and Private Information Infrastructures to Terrorism: An Overview
This report assesses the impact of September 11, 2001 attack on public and private information infrastructures in the context of critical infrastructure protection,continuity of operation (COP) and homeland security.
Critical Infrastructures: What Makes an Infrastructure Critical?
A fluid definition of what constitutes a critical infrastructure could complicate policymaking and actions. At the very least, a growing list of infrastructures in need of protection will require the federal government to prioritize its efforts. Essentially the federal government will have to try to minimize the impact on the nation’s critical infrastructure of any future terrorist attack, taking into account what those impacts might be and the likelihood of their occurring.
Critical Infrastructures: What Makes an Infrastructure Critical?
A fluid definition of what constitutes a critical infrastructure could complicate policymaking and actions. At the very least, a growing list of infrastructures in need of protection will require the federal government to prioritize its efforts. Essentially the federal government will have to try to minimize the impact on the nation’s critical infrastructure of any future terrorist attack, taking into account what those impacts might be and the likelihood of their occurring.
Port and Maritime Security: Background and Issues for Congress
No Description Available.
Homeland Security Act of 2002: Critical Infrastructure Information Act
This report discusses about Critical Infrastructure Information Act of 2002, Protection of Voluntarily shared critical infrastructure information, Congressional Disclosure and other provisions.
Homeland Security: Banking and Financial Infrastructure Continuity
This report outlines the existing recovery modes to mitigate disasters in financial markets that events have tested in recent experience, and recovery arrangements.
Critical Infrastructure and Key Assets: Definition and Identification
This report reviews the concept and definition of “critical infrastructure” as it has appeared in federal reports, legislation and regulation since the early 1980s. The report highlights the changes and expansion of that definition as the focus of public policy debates shifted from infrastructure adequacy to infrastructure protection. Finally the report summarizes current policy issues associated with critical infrastructure identification by federal agencies and the private sector. The report is intentionally limited to definitional issues and categorization of infrastructure.
Maritime Security: Overview of Issues
No Description Available.
Maritime Security: Overview of Issues
No Description Available.
Maritime Security: Overview of Issues
No Description Available.
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description Available.
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description Available.
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description Available.
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description Available.
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description Available.
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description Available.
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description Available.
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description Available.
Port and Maritime Security: Potential for Terrorist Nuclear Attack Using Oil Tankers
No Description Available.
High Altitude Electromagnetic Pulse (HEMP) and High Power Microwave (HPM) Devices: Threat Assessments
This report provides information about the Threat Assessments on High Altitude Electromagnetic Pulse (HEMP) and High Power Microwave (HPM) Devices that can overload at distant numerous systems.
Risk Management and Critical Infrastructure Protection: Assessing, Integrating, and Managing Threats, Vulnerabilities and Consequences
No Description Available.
Spinning the Web: The History and Infrastructure of the Internet
The Internet is an international, cooperative computer "network of networks" that links many types of users, such as governments, schools, libraries, corporations, hospitals, individuals, and others. No single organization owns, manages, or controls the Internet. However, the Internet is not free. The major costs of running the network are shared by its primary users: universities, national laboratories, high-tech corporations, and governments.
Year 2000 Problem: Potential Impacts on National Infrastructures
The year 2000 (Y2K) computer problem poses a potential threat to the continued proper functioning of many national infrastructures. These include telecommunications, utilities, financial services, health care, transportation, government services, and military preparedness. Other sectors -- such as water, agriculture, food processing and distribution, emergency services, and small and medium sized businesses -- have also been identified as having potentially significant Y2K problems but, due to space constraints, are not discussed here. While public and private sector entities report progress toward resolving their Y2K problems, much uncertainty remains regarding which systems are most vulnerable to failures. The overall impact resulting from the Y2K problem to some degree still depends on remediation progress made in 1999.
Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress
This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity interferes with individual privacy; whether the roles and responsibilities for protecting against a possible cyber terrorist attack need more clarity for government, industry, and home users; and, whether information sharing on cyber threats and vulnerabilities must be further increased between private industry and the federal government. The final section describes possible policy options for improving protection against threats from possible cyber terrorism.
Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
This report provides background information for three types of attacks against computers (cyber-attack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The report also describes the possible effects of a coordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists.
Maritime and Port Security: A Comparison of Major Provisions of S. 1214 and H.R. 3983
No Description Available.
Maritime and Port Security: A Comparison of Major Provisions of S. 1214 and H.R. 3983
No Description Available.
Maritime and Port Security: A Comparison of Major Provisions of S. 1214 and H.R. 3983
No Description Available.
San Diego Wastewater Treatment: Current Issues
No Description Available.
Western Water Resource Issues
Growing populations and changing values continue to place increasing demands on water supplies and river systems, resulting in water use and management conflicts throughout the country. Recent conflicts are particularly evident in the West, where the population is expected to increase 30% in the next 20-25 years and where agricultural needs are often in direct conflict with urban needs, as well as with water demand for threatened and endangered species, recreation, and scenic enjoyment.
Western Water Resource Issues
No Description Available.
Western Water Resource Issues
For more than a century, the federal government has constructed water resource projects for a variety of purposes including flood control, navigation, power generation, and irrigation. While most municipal and industrial water supplies have been built by non-federal entities, most of the large, federal water supply projects in the West, including Hoover and Grand Coulee dams, were constructed by the Bureau of Reclamation (Department of the Interior) to provide water for irrigation.
Western Water Resource Issues
For more than a century, the federal government has constructed water resource projects for a variety of purposes including flood control, navigation, power generation, and irrigation. While most municipal and industrial water supplies have been built by non-federal entities, most of the large, federal water supply projects in the West, including Hoover and Grand Coulee dams, were constructed by the Bureau of Reclamation (Department of the Interior) to provide water for irrigation.
Western Water Resource Issues
For more than a century, the federal government has constructed water resource projects for a variety of purposes, including flood control, navigation, power generation, and irrigation. While most municipal and industrial water supplies have been built by non-federal entities, most of the large, federal water supply projects in the West, including Hoover and Grand Coulee dams, were constructed by the Bureau of Reclamation (Department of the Interior) to provide water for irrigation.
Western Water Resource Issues
For more than a century, the federal government has constructed water resource projects for a variety of purposes, including flood control, navigation, power generation, and irrigation. While most municipal and industrial water supplies have been built by non-federal entities, most of the large, federal water supply projects in the West, including Hoover and Grand Coulee dams, were constructed by the Bureau of Reclamation (Department of the Interior) to provide water for irrigation.
Western Water Resource Issues
For more than a century, the federal government has constructed water resource projects for a variety of purposes, including flood control, navigation, power generation, and irrigation. While most municipal and industrial water supplies have been built by non-federal entities, most of the large, federal water supply projects in the West, including Hoover and Grand Coulee dams, were constructed by the Bureau of Reclamation (Department of the Interior) to provide water for irrigation.
Safeguarding the Nation's Drinking Water: EPA and Congressional Actions
No Description Available.
Safeguarding the Nation's Drinking Water: EPA and Congressional Actions
No Description Available.
Safeguarding the Nation's Drinking Water: EPA and Congressional Actions
No Description Available.
Terrorism and Security Issues Facing the Water Infrastructure Sector
Damage to or destruction of the nation’s water supply and water quality infrastructure by a terrorist attack could disrupt the delivery of vital human services in this country, threatening public health and the environment or possibly causing loss of life. Interest in such problems has increased greatly since September 11, 2001, terrorist attacks in New York City and at the Pentagon.
Terrorism and Security Issues Facing the Water Infrastructure Sector
Damage to or destruction of the nation’s water supply and water quality infrastructure by a terrorist attack could disrupt the delivery of vital human services in this country, threatening public health and the environment or possibly causing loss of life. Interest in such problems has increased greatly since September 11, 2001, terrorist attacks in New York City and at the Pentagon.
Terrorism and Security Issues Facing the Water Infrastructure Sector
No Description Available.
Terrorism and Security Issues Facing the Water Infrastructure Sector
No Description Available.
Terrorism and Security Issues Facing the Water Infrastructure Sector
No Description Available.
Terrorism and Security Issues Facing the Water Infrastructure Sector
No Description Available.
Terrorism and Security Issues Facing the Water Infrastructure Sector
No Description Available.
Port and Maritime Security: Background and Issues for Congress
No Description Available.
Back to Top of Screen