You limited your search to:

 Resource Type: Report
 Collection: Congressional Research Service Reports
Critical Infrastructure: Control Systems and the Terrorist Threat

Critical Infrastructure: Control Systems and the Terrorist Threat

Date: October 1, 2002
Creator: Shea, Dana A
Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructure: Control Systems and the Terrorist Threat

Critical Infrastructure: Control Systems and the Terrorist Threat

Date: February 21, 2003
Creator: Shea, Dana A
Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructure: Control Systems and the Terrorist Threat

Critical Infrastructure: Control Systems and the Terrorist Threat

Date: April 23, 2003
Creator: Shea, Dana A
Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructure: Control Systems and the Terrorist Threat

Critical Infrastructure: Control Systems and the Terrorist Threat

Date: July 14, 2003
Creator: Shea, Dana A
Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Homeland Security - Reducing the Vulnerability of Public and Private Information Infrastructures to Terrorism: An Overview

Homeland Security - Reducing the Vulnerability of Public and Private Information Infrastructures to Terrorism: An Overview

Date: December 12, 2002
Creator: Seifert, Jeffrey W
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Intellectual Property Protection for Noncreative Databases

Intellectual Property Protection for Noncreative Databases

Date: September 15, 1999
Creator: Schrader, Dorothy & Jeweler, Robin
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Fair Use on the Internet

Fair Use on the Internet

Date: May 21, 2002
Creator: Jennings, Christopher Alan
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Safe Harbor for Service Providers Under the Digital Millennium Copyright Act

Safe Harbor for Service Providers Under the Digital Millennium Copyright Act

Date: January 9, 2004
Creator: Yeh, Brian T & Jeweler, Robin
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Intellectual Property, Computer Software and the Open Source Movement

Intellectual Property, Computer Software and the Open Source Movement

Date: March 11, 2004
Creator: Thomas, John R
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Encryption Technology: Congressional Issues

Encryption Technology: Congressional Issues

Date: July 9, 1998
Creator: Nunno, Richard M
Description: This report discusses primarily, the controversy over encryption concerns what access the government should have to encrypted stored computer data or electronic communications (voice and data, wired and wireless) for law enforcement purposes.
Contributing Partner: UNT Libraries Government Documents Department