You limited your search to:

 Collection: Congressional Research Service Reports
OPM Data Breach: Personnel Security Background Investigation Data

OPM Data Breach: Personnel Security Background Investigation Data

Date: July 24, 2015
Creator: Christensen, Michelle D.
Description: This report provides information on the types of data that may be collected in a typical personnel security background investigation. In a July 9, 2015, news release on the cyber-intrusions of its systems, OPM "concluded with high confidence that sensitive information, including the Social Security Numbers (SSNs) of 21.5 million individuals, was stolen from the background investigation databases." This report is not an official statement of the data that was compromised in the OPM breach.
Contributing Partner: UNT Libraries Government Documents Department
Cyber Intrusion into U.S. Office of Personnel Management: In Brief

Cyber Intrusion into U.S. Office of Personnel Management: In Brief

Date: July 17, 2015
Creator: Finklea, Kristin; Christensen, Michelle D.; Fischer, Eric A.; Lawrence, Susan V. & Theohary, Catherine A.
Description: This report provides an overview of the current understanding of the recent U.S. Office of Personnel Management (OPM) breaches, which may have compromised personal information of former and current federal employees. It also discusses issues and questions raised about the source of the breaches, possible uses of the information exfiltrated, potential national security ramifications, and implications for the cybersecurity of federal information systems.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Date: July 15, 2015
Creator: Tehan, Rita
Description: This report provides links to cybersecurity-related committee hearings in the 112th and 113th Congresses. It also provides a list of executive orders and presidential directives pertaining to information and computer security.
Contributing Partner: UNT Libraries Government Documents Department
Dark Web

Dark Web

Date: July 7, 2015
Creator: Finklea, Kristin
Description: This report illuminates information on the various layers of the Internet, with a particular focus on the Dark Web. It discusses both legitimate and illicit uses of the Dark Web, including how the government may rely upon it. Throughout, the report raises issues that policy makers may consider as they explore means to curb malicious activity online.
Contributing Partner: UNT Libraries Government Documents Department
Internet Governance and the Domain Name System: Issues for Congress

Internet Governance and the Domain Name System: Issues for Congress

Date: June 24, 2015
Creator: Kruger, Lennard G.
Description: This report provides a definition regarding Internet governance and how the Internet is currently governed. The report discusses the role of United States government and future model of Internet governance.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731 as Passed by the House

Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731 as Passed by the House

Date: June 18, 2015
Creator: Fischer, Eric A. & Logan, Stephanie M.
Description: This report compares provisions in two bills in the House of Representatives that address information sharing and related activities in cybersecurity. Both bills focus on information sharing among private entities and between them and the federal government.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity and Information Sharing: Comparison of Legislative Proposals in the 114th Congress

Cybersecurity and Information Sharing: Comparison of Legislative Proposals in the 114th Congress

Date: June 18, 2015
Creator: Fischer, Eric A. & Logan, Stephanie M.
Description: This report compares two House bills and one Senate bill that address information sharing and related activities in cybersecurity. The report consists of an overview of those and other legislative proposals on information sharing, along with selected associated issues, followed by a side-by-side analysis of the National Cybersecurity Protection Advancement Act of 2015 (NCPAA), the Protecting Cyber Networks Act (PCNA), and the Cybersecurity Information Sharing Act of 2015 (CISA).
Contributing Partner: UNT Libraries Government Documents Department
Protecting Civil Aviation from Cyberattacks

Protecting Civil Aviation from Cyberattacks

Date: June 18, 2015
Creator: Elias, Bart
Description: This report briefly discusses cyber-security issues in civil aviation. unclear. A recent probe into alleged hacking incidents unfolded just weeks after the Federal Bureau of Investigation (FBI) and the Transportation Security Administration (TSA) alerted airlines to be on the lookout for passengers trying to tap into aircraft electronics and for evidence of tampering or network intrusions.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity and Information Sharing: Comparison of Legislative Proposals in the 114th Congress

Cybersecurity and Information Sharing: Comparison of Legislative Proposals in the 114th Congress

Date: June 12, 2015
Creator: Fischer, Eric A.
Description: This report compares two House bills and one Senate bill that address information sharing and related activities in cybersecurity. It also discusses some of the issues that those and other bills address.
Contributing Partner: UNT Libraries Government Documents Department
The Internet Tax Freedom Act: In Brief

The Internet Tax Freedom Act: In Brief

Date: June 11, 2015
Creator: Stupak, Jeffrey M.
Description: This report discusses the Internet Tax Freedom Act (ITFA; P.L. 105-277), which enacted in 1998, implemented a three-year moratorium preventing state and local governments from taxing Internet access, or imposing multiple or discriminatory taxes on electronic commerce.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731 as Passed by the House

Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731 as Passed by the House

Date: June 4, 2015
Creator: Fischer, Eric A.
Description: This report compares provisions in two bills in the House of Representatives that address information sharing and related activities in cybersecurity.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731 as Passed by the House

Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731 as Passed by the House

Date: June 4, 2015
Creator: Fischer, Eric A. & Logan, Stephanie M.
Description: This report compares provisions in two bills in the House of Representatives that address information sharing and related activities in cybersecurity. This report consists of an overview of those and other legislative proposals on information sharing, along with selected associated issues, followed by a side-by-side analysis of the two House bills as passed.
Contributing Partner: UNT Libraries Government Documents Department
Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis

Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis

Date: June 3, 2015
Creator: Weiss, N. E.
Description: This report analyzes the sharing of cyberattack information by government with private companies, by private companies with the government, and among private companies. Sharing information with consumers is mentioned but is not the central focus of this report.
Contributing Partner: UNT Libraries Government Documents Department
Tracking Federal Funds: USAspending.gov and Other Data Sources

Tracking Federal Funds: USAspending.gov and Other Data Sources

Date: May 13, 2015
Creator: Gerli, Merete F.
Description: This report discusses USAspending.gov, which collects data on grants, loans, insurance, assistance, and contracts, and it presents various searching and downloading options to Congress and the public.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731 as Passed by the House

Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731 as Passed by the House

Date: April 29, 2015
Creator: Fischer, Eric A.
Description: This report compares provisions in two bills in the House of Representatives that address information sharing and related activities in cybersecurity.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: April 28, 2015
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under a variety of cybersecurity topics.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731

Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731

Date: April 20, 2015
Creator: Fischer, Eric A.
Description: This report compares provisions in two bills in the House of Representatives that address information sharing and related activities in cybersecurity.
Contributing Partner: UNT Libraries Government Documents Department
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities

The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities

Date: April 10, 2015
Creator: Figliola, Patricia Moloney
Description: This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity and Information Sharing: Legal Challenges and Solutions

Cybersecurity and Information Sharing: Legal Challenges and Solutions

Date: March 16, 2015
Creator: Nolan, Andrew
Description: While considerable debate exists with regard to the best strategies for protecting America’s various cyber-systems and promoting cybersecurity, one point of general agreement amongst cyber-analysts is the perceived need for enhanced and timely exchange of cyber-threat intelligence both within the private sector and between the private sector and the government. This report examines the various legal issues that arise with respect to the sharing of cybersecurity intelligence, with a special focus on two distinct concepts: (1) sharing of cyberinformation within the government’s possession and (2) sharing of cyber-information within the possession of the private sector.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: March 13, 2015
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Contributing Partner: UNT Libraries Government Documents Department
Access to Broadband Networks: The Net Neutrality Debate

Access to Broadband Networks: The Net Neutrality Debate

Date: March 9, 2015
Creator: Gilroy, Angele A.
Description: This report discusses the continued debate amongst congressional policymakers regarding telecommunications reform. A major point of the ongoing discussion is whether action is needed to ensure unfettered access to the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Internet Domain Names: Background and Policy Issues

Internet Domain Names: Background and Policy Issues

Date: March 6, 2015
Creator: Kruger, Lennard G.
Description: This report discusses the Domain Name System (DNS), which is the distributed set of databases residing in computers around the world that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information from computers anywhere on the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Internet Governance and the Domain Name System: Issues for Congress

Internet Governance and the Domain Name System: Issues for Congress

Date: March 6, 2015
Creator: Kruger, Lennard G.
Description: This report provides a definition regarding Internet governance and how the Internet is currently governed. The report discusses the role of United States government and future model of Internet governance.
Contributing Partner: UNT Libraries Government Documents Department
Information Warfare: The Role of Social Media in Conflict

Information Warfare: The Role of Social Media in Conflict

Date: March 4, 2015
Creator: Theohary, Catherine A.
Description: This report briefly discusses the use if social media as a tool of information warfare. The ability to rapidly disseminate graphic images and ideas to shape the public narrative transforms social media into a strategic weapon in the hands of terrorists, insurgent groups, or governments engaged in conflict.
Contributing Partner: UNT Libraries Government Documents Department