You limited your search to:

 Collection: Congressional Research Service Reports
Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Date: April 1, 2005
Creator: Wilson, Clay
Description: This report provides background information for three types of attacks against computers (cyber-attack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The report also describes the possible effects of a coordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructure and Key Assets: Definition and Identification

Critical Infrastructure and Key Assets: Definition and Identification

Date: October 1, 2004
Creator: Moteff, John D & Parfomak, Paul W
Description: This report reviews the concept and definition of “critical infrastructure” as it has appeared in federal reports, legislation and regulation since the early 1980s. The report highlights the changes and expansion of that definition as the focus of public policy debates shifted from infrastructure adequacy to infrastructure protection. Finally the report summarizes current policy issues associated with critical infrastructure identification by federal agencies and the private sector. The report is intentionally limited to definitional issues and categorization of infrastructure.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructure: Control Systems and the Terrorist Threat

Critical Infrastructure: Control Systems and the Terrorist Threat

Date: February 21, 2003
Creator: Shea, Dana A
Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructure: Control Systems and the Terrorist Threat

Critical Infrastructure: Control Systems and the Terrorist Threat

Date: April 23, 2003
Creator: Shea, Dana A
Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructure: Control Systems and the Terrorist Threat

Critical Infrastructure: Control Systems and the Terrorist Threat

Date: July 14, 2003
Creator: Shea, Dana A
Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructure: Control Systems and the Terrorist Threat

Critical Infrastructure: Control Systems and the Terrorist Threat

Date: October 1, 2002
Creator: Shea, Dana A
Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructure Information Disclosure and Homeland Security

Critical Infrastructure Information Disclosure and Homeland Security

Date: August 31, 2002
Creator: Moteff, John D & Stevens, Gina Marie
Description: This report discusses the Freedom of Information Act (FOIA) that was passed to ensure by statute citizen access to government information. Nine categories of information may be exempted from disclosure. Three of the nine exemptions provide possible protection against the release of critical infrastructure information: exemption 1 (national security information); exemption 3 (information exempted by statute); and exemption 4 (confidential business information). Congress has considered several proposals to exempt critical infrastructure information from the FOIA.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructure Information Disclosure and Homeland Security

Critical Infrastructure Information Disclosure and Homeland Security

Date: January 29, 2003
Creator: Moteff, John D & Stevens, Gina Marie
Description: This report discusses the Freedom of Information Act (FOIA) that was passed to ensure by statute citizen access to government information. Nine categories of information may be exempted from disclosure. Three of the nine exemptions provide possible protection against the release of critical infrastructure information: exemption 1 (national security information); exemption 3 (information exempted by statute); and exemption 4 (confidential business information). Congress has considered several proposals to exempt critical infrastructure information from the FOIA.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructure Resilience: The Evolution of Policy and Programs and Issues for Congress

Critical Infrastructure Resilience: The Evolution of Policy and Programs and Issues for Congress

Date: August 23, 2012
Creator: Moteff, John D.
Description: This report discusses the concept of resilience in the context of critical infrastructure and homeland security. It also identifies and discusses issues related to the evolution of policy and programs at the Department of Homeland Security (DHS) that are meant to, or could, promote the resiliency of the nation's critical infrastructure. The purpose of the report is to aid Congress in its oversight of critical infrastructure programs and activities at DHS.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructure: The National Asset Database

Critical Infrastructure: The National Asset Database

Date: September 14, 2006
Creator: Moteff, John D
Description: The purpose of this report is to discuss the National Asset Database: what is in it, how it is populated, what the Database apparently is, what it is not, and how it is intended to be used. The report also discusses some of the issues on which Congress could focus its oversight, including appropriation bill language.
Contributing Partner: UNT Libraries Government Documents Department