Search Results

Critical Infrastructure Information Disclosure and Homeland Security
This report discusses the Freedom of Information Act (FOIA) that was passed to ensure by statute citizen access to government information. Nine categories of information may be exempted from disclosure. Three of the nine exemptions provide possible protection against the release of critical infrastructure information: exemption 1 (national security information); exemption 3 (information exempted by statute); and exemption 4 (confidential business information). Congress has considered several proposals to exempt critical infrastructure information from the FOIA.
Critical Infrastructure Protections: The 9/11 Commission Report
No Description Available.
Critical Infrastructure Protections: The 9/11 Commission Report and Congressional Response
This report provides the 9/11 Commission report and Congressional response regarding Critical Infrastructure protections.
Critical Infrastructure Protections: The 9/11 Commission Report and Congressional Response
No Description Available.
Critical Infrastructure Resilience: The Evolution of Policy and Programs and Issues for Congress
This report discusses the concept of resilience in the context of critical infrastructure and homeland security. It also identifies and discusses issues related to the evolution of policy and programs at the Department of Homeland Security (DHS) that are meant to, or could, promote the resiliency of the nation's critical infrastructure. The purpose of the report is to aid Congress in its oversight of critical infrastructure programs and activities at DHS.
Critical Infrastructure Security: CRS Experts
This report contains a table which provides access to names and contact information for CRS experts on policy concerns relating to critical infrastructure security. Policy areas identified include: mission; security services; and specific sectors: assessing vulnerabilities, planning and implementation.
Critical Infrastructure: The National Asset Database
The purpose of this report is to discuss the National Asset Database: what is in it, how it is populated, what the Database apparently is, what is not, and how it is intended to be used. The report also discusses some of the issues on which Congress could focus its oversight.
Critical Infrastructure: The National Asset Database
The purpose of this report is to discuss the National Asset Database: what is in it, how it is populated, what the Database apparently is, what it is not, and how it is intended to be used. The report also discusses some of the issues on which Congress could focus its oversight, including appropriation bill language.
Critical Infrastructures: A Primer
No Description Available.
Critical Infrastructures: A Primer
The nation’s health, wealth, and security rely on the supply and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures. Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together.
Critical Infrastructures: Background and Early Implementation of PDD-63
No Description Available.
Critical Infrastructures: Background and Early Implementation of PDD-63
The nation's health, wealth, and security rely on the supply and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed or financial capital, the institutions that manage it, and the record- keeping and communications that move it from one institution to another).
Critical Infrastructures: Background and Early Implementation of PDD-63
The nation's health, wealth, and security rely on the supply and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed or financial capital, the institutions that manage it, and the record- keeping and communications that move it from one institution to another).
Critical Infrastructures: Background, Policy, and Implementation
This report discusses the evolution of a national critical infrastructure policy and the institutional structures established to implement it. Critical infrastructure includes physical assets used to produce and distribute services such as electricity (including the power plants and electric grid), communications, and computers. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and regulation.
Critical Infrastructures: Background, Policy, and Implementation
This report discusses the evolution of a national critical infrastructure policy and the institutional structures established to implement it. Critical infrastructure includes physical assets used to produce and distribute services such as electricity (including the power plants and electric grid), communications, and computers. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and regulation.
Critical Infrastructures: Background, Policy, and Implementation
The Nation's health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, functions, and systems across which these goods and services move are called critical infrastructures. This report discusses in more detail the evolution of a national critical infrastructure policy and the institutional structures established to implement it. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and, regulation.
Critical Infrastructures: Background, Policy, and Implementation
This report discusses in more detail the evolution of a national critical infrastructure policy and the institutional structures established to implement it. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and, regulation.
Critical Infrastructures: Background, Policy, and Implementation
No Description Available.
Critical Infrastructures: Background, Policy, and Implementation
No Description Available.
Critical Infrastructures: Background, Policy, and Implementation
This report discusses in more detail the evolution of a national critical infrastructure policy and the institutional structures established to implement it. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and, regulation.
Critical Infrastructures: Background, Policy, and Implementation
This report discusses in more detail the evolution of a national critical infrastructure policy and the institutional structures established to implement it. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities; allocating resources; information sharing; and, regulation. This report provides an historical background and tracks the evolution of such an overall policy and its implementation.
Critical Infrastructures: Background, Policy, and Implementation
The nation's health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, functions, and systems across which these goods and services move are called critical infrastructures. This report discusses in more detail the evolution of a national critical infrastructure policy and the institutional structures established to implement it. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and, regulation.
Critical Infrastructures: Background, Policy, and Implementation
This report discusses the evolution of a national critical infrastructure policy and the institutional structures established to implement it. Critical infrastructure includes physical assets used to produce and distribute services such as electricity (including the power plants and electric grid), communications, and computers. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and regulation.
Critical Infrastructures: Background, Policy, and Implementation
This report discusses in more detail the evolution of a national critical infrastructure policy and the institutional structures established to implement it. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and regulation.
Critical Infrastructures: Background, Policy, and Implementation
This report discusses the evolution of a national critical infrastructure policy and the institutional structures established to implement it. Critical infrastructure includes physical assets used to produce and distribute services such as electricity (including the power plants and electric grid), communications, and computers. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and regulation.
Critical Infrastructures: Background, Policy, and Implementation
This report discusses in more detail the evolution of a national critical infrastructure policy and the institutional structures established to implement it. The report highlights two primary issues confronting Congress going forward, both in the context of cybersecurity: information sharing and regulation.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: What Makes an Infrastructure Critical?
A fluid definition of what constitutes a critical infrastructure could complicate policymaking and actions. At the very least, a growing list of infrastructures in need of protection will require the federal government to prioritize its efforts. Essentially the federal government will have to try to minimize the impact on the nation’s critical infrastructure of any future terrorist attack, taking into account what those impacts might be and the likelihood of their occurring.
Critical Infrastructures: What Makes an Infrastructure Critical?
A fluid definition of what constitutes a critical infrastructure could complicate policymaking and actions. At the very least, a growing list of infrastructures in need of protection will require the federal government to prioritize its efforts. Essentially the federal government will have to try to minimize the impact on the nation’s critical infrastructure of any future terrorist attack, taking into account what those impacts might be and the likelihood of their occurring.
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides information about the Authoritative Reports and Resources on Cyber security.It also lists selected cybersecurity websites for CRS agencies, News, and organizations or institutions.
Cybersecurity: Critical Infrastructure Authoritative Reports and Resources
This report serves as a starting point for congressional staff assigned to cover cybersecurity issues as they relate to critical infrastructure. Much is written about protecting U.S. critical infrastructure, and this report directs the reader to authoritative sources that address many of the most prominent issues.
Cybersecurity: Critical Infrastructure Authoritative Reports and Resources
This report provides resources for congressional staff researching cybersecurity issues and critical infrastructure.The annotated descriptions of these sources are listed in reverse chronological order with an emphasis on material published in the past several years.The report includes resources and studies from government agencies (federal, state, local, and international), think tanks, academic institutions, news organizations, and other sources. Table 1 contains overview reports and resources, Table 2 lists energy industry resources, Table 3 lists financial industry resources, Table 4 contains healthcare industry resources, Table 5 contains telecommunications and communication industry resources, and Table 6 contains transportation industry resources.
The Davis-Bacon Act: Institutional Evolution and Public Policy
This report examines policy issues the Davis-Bacon Act has sparked through the years and which remain a part of the Davis-Bacon debate of the 1990s. These include such questions as: wage rate determination procedures, reporting requirements under the Copeland Act, an appropriate threshold for activation of the statute, interagency relationships with respect to Davis-Bacon enforcement and compliance activity, administrative or judicial appeals procedures, the use of "helpers" and other low-skilled workers on covered projects, and the right of a President to suspend the statute as well as the conditions under which such a suspension may occur. That the fundamental premise of the Act remains in contention after 60 years may be, itself, part of the public policy debate.
DOT's Federal Pipeline Safety Program: Background and Key Issues for Congress
This report reviews the history of federal programs for pipeline safety, significant safety issues, and recent developments focusing on key issues for Congress.
DOT's Federal Pipeline Safety Program: Background and Key Issues for Congress
This report reviews the history of federal programs for pipeline safety, significant safety issues, and recent developments focusing on key issues for Congress.
Drinking Water State Revolving Fund (DWSRF): Program Overview and Issues
The Safe Drinking Water Act (SDWA) Amendments of 1996 authorized a drinking water state revolving loan fund (DWSRF) program to help public water systems finance infrastructure projects needed to comply with federal drinking water regulations and to protect public health. The Environmental Protection Agency's (EPA's) latest (2003) survey of capital improvement needs for public water systems found that water systems need to invest $276.8 billion on infrastructure improvements over 20 years to ensure the provision of safe water. Key issues include the gap between estimated needs and funding, SDWA compliance costs, and the need for cities to update and maintain water infrastructure, apart from SDWA compliance.
Drinking Water State Revolving Fund: Program Overview and Issues
This report discusses the Safe Drinking Water Act (SDWA) Amendments of 1996, which authorized a drinking water state revolving loan fund (DWSRF) program to help public water systems finance infrastructure projects needed to comply with federal drinking water regulations and to protect public health.
Earthquake Risk and U.S. Highway Infrastructure: Frequently Asked Questions
This report addresses a number of frequently asked questions about earthquake risk and highway system components, especially bridges. Earthquakes and related events, such as soil liquefaction, landslides, tsunamis, flooding, and fires, pose risks to highway infrastructure. Concerns about the U.S. highway system's seismic vulnerability stem from interest in protecting public safety, facilitating response and recovery efforts, and minimizing economic loss and social disruption.
Earthquake Risk and U.S. Highway Infrastructure: Frequently Asked Questions
This report addresses frequently asked questions about the risk from earthquakes to highway systems, including bridges, tunnels, pavements, and other highway components. Particular attention is given to highway bridges, which often are the most vulnerable highway structures. The report also discusses federal and nonfederal actions to reduce seismic risk to the U.S. highway system.
Back to Top of Screen