You limited your search to:

 Collection: Congressional Research Service Reports
The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress

The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress

Date: December 15, 2014
Creator: Fischer, Eric A.; Liu, Edward C.; Rollins, John W. & Theohary, Catherine A.
Description: The federal role in cybersecurity has been a topic of discussion and debate for over a decade. Despite significant legislative efforts in the 112th Congress on bills designed to improve the cybersecurity of U.S. critical infrastructure (CI), no legislation on that issue was enacted in that Congress. This report discusses the ramifications of Executive Order 13636, which issued in February 2013 was an attempt to enhance security and resiliency of CI through voluntary, collaborative efforts involving federal agencies and owners and operators of privately owned CI, as well as use of existing federal regulatory authorities.
Contributing Partner: UNT Libraries Government Documents Department
Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis

Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis

Date: February 23, 2015
Creator: Weiss, N. E.
Description: This report analyzes the incentives for companies to share information about cybersecurity breaches with other companies and the federal government.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: February 27, 2015
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under a variety of cybersecurity topics.
Contributing Partner: UNT Libraries Government Documents Department
Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis

Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis

Date: February 23, 2015
Creator: Weiss, N. Eric
Description: This report analyzes the sharing of cyberattack information by government with private companies, by private companies with the government, and among private companies. Sharing information with consumers is mentioned but is not the central focus of this report.
Contributing Partner: UNT Libraries Government Documents Department
Access to Broadband Networks: The Net Neutrality Debate

Access to Broadband Networks: The Net Neutrality Debate

Date: February 26, 2015
Creator: Gilroy, Angele A.
Description: This report discusses the continued debate amongst congressional policymakers regarding telecommunications reform. A major point of the ongoing discussion is whether action is needed to ensure unfettered access to the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: March 13, 2015
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Contributing Partner: UNT Libraries Government Documents Department
Access to Broadband Networks: The Net Neutrality Debate

Access to Broadband Networks: The Net Neutrality Debate

Date: March 9, 2015
Creator: Gilroy, Angele A.
Description: This report discusses the continued debate amongst congressional policymakers regarding telecommunications reform. A major point of the ongoing discussion is whether action is needed to ensure unfettered access to the Internet.
Contributing Partner: UNT Libraries Government Documents Department
The Network for Manufacturing Innovation

The Network for Manufacturing Innovation

Date: January 8, 2015
Creator: Sargent, John F., Jr.
Description: This report discusses the Revitalize American Manufacturing and Innovation Act of 2014 (RAMIA). RAMIA includes provisions authorizing the Commerce Department's National Institute of Standards and Technology (NIST), the Department of Energy, and other agencies to support the establishment of centers for manufacturing innovation, as well as establishing and providing for the operation of a Network for Manufacturing Innovation.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: January 9, 2015
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: February 3, 2015
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Contributing Partner: UNT Libraries Government Documents Department