You limited your search to:

 Country: United States
 Collection: Congressional Research Service Reports
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D) digital.library.unt.edu/ark:/67531/metadc462636/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D) digital.library.unt.edu/ark:/67531/metadc462922/
Cybersecurity: Authoritative Reports and Resources
Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues and will be updated as needed. digital.library.unt.edu/ark:/67531/metadc87226/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc99065/
Cybersecurity: Authoritative Reports and Resources
Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues and will be updated as needed. digital.library.unt.edu/ark:/67531/metadc85416/
Cybersecurity: Authoritative Reports and Resources
Report that provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc227761/
Cybersecurity: Authoritative Reports and Resources
Report that provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc227758/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc122226/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc93941/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc98018/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cyber security issues, including: legislation, hearings in the 112th Congress, data and statistics, and cyber security glossaries. digital.library.unt.edu/ark:/67531/metadc93928/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc93929/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc93930/
Cybersecurity: Authoritative Reports and Resources
Report that provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc227759/
Cybersecurity: Authoritative Reports and Resources
This report provides links to cybersecurity hearings and legislation under consideration in the 113th Congress and those considered in the 112th Congress, as well as executive orders and presidential directives, data and statistics, glossaries, and authoritative reports. digital.library.unt.edu/ark:/67531/metadc227760/
Cybersecurity: Authoritative Reports and Resources
Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues. digital.library.unt.edu/ark:/67531/metadc86630/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc284460/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc306502/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc306561/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc306484/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc462338/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc462557/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc462130/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under a variety of cybersecurity topics. digital.library.unt.edu/ark:/67531/metadc503534/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc505562/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc503611/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc503613/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under a variety of cybersecurity topics. digital.library.unt.edu/ark:/67531/metadc627154/
Cybersecurity: Authoritative Reports and Resources, by Topic
Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. This report provides links to selected authoritative resources related to cybersecurity issues. digital.library.unt.edu/ark:/67531/metadc822541/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. In addition, the report lists selected cybersecurity-related websites for congressional and government agencies, news, international organizations, and organizations or institutions. digital.library.unt.edu/ark:/67531/metadc822526/
Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress
This report identifies cybersecurity policy issues that have been proposed for priority consideration. The report lists and synopsizes current legislation that has been developed to address various aspects of the cybersecurity problem. It then lists the current status of the legislation and compares legislation with existing executive branch initiatives. Finally, analysis of information contained in executive branch initiatives and congressional legislation is used to further highlight related considerations for Congress. digital.library.unt.edu/ark:/67531/metadc505547/
Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress
This report identifies cybersecurity policy issues that have been proposed for priority consideration. The report lists and synopsizes current legislation that has been developed to address various aspects of the cybersecurity problem. It then lists the current status of the legislation and compares legislation with existing executive branch initiatives. Finally, analysis of information contained in executive branch initiatives and congressional legislation is used to further highlight related considerations for Congress. digital.library.unt.edu/ark:/67531/metadc505404/
Cybersecurity: Cyber Crime Protection Security Act (S. 2111, 112th Congress)— A Legal Analysis
This report discusses the Cyber Crime Protection Security Act (S. 2111) that would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, password trafficking, and extortion committed against computers and computer networks. S. 2111 contains some of the enhancements approved by the Senate Judiciary Committee when it reported the Personal Data Privacy and Security Act (S. 1151), S.Rept. 112-91 (2011). digital.library.unt.edu/ark:/67531/metadc462558/
Cybersecurity: Cyber Crime Protection Security Act (S. 2111)—A Legal Analysis
The Cyber Crime Protection Security Act (S. 2111) would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, password trafficking, and extortion committed against computers and computer networks. S. 2111 contains some of the enhancements approved by the Senate Judiciary Committee when it reported the Personal Data Privacy and Security Act (S. 1151), S.Rept. 112-91 (2011). digital.library.unt.edu/ark:/67531/metadc86604/
Cybersecurity: FISMA Reform
This report briefly discusses current requirements under the Federal Information Security Management Act (FISMA) and two bills currently being considered by Congress that would revise the conditions and authority granted by FISMA. digital.library.unt.edu/ark:/67531/metadc491497/
Cybersecurity Issues and Challenges: In Brief
The information and communications technology (ICT) industry has evolved greatly over the last half century. The technology is ubiquitous and increasingly integral to almost every facet of modern society. ICT devices and components are generally interdependent, and disruption of one may affect many others. Over the past several years, experts and policy makers have expressed increasing concerns about protecting ICT systems from cyberattacks, which many experts expect to increase in frequency and severity over the next several years. This report discusses the concept of cybersecurity, the management of cybersecurity risks, and the federal government's role in managing such risks. digital.library.unt.edu/ark:/67531/metadc501605/
Cybersecurity: Legislation, Hearings, and Executive Branch Documents
This report provides links to cybersecurity-related committee hearings in the 112th and 113th Congresses. It also provides a list of executive orders and presidential directives pertaining to information and computer security. digital.library.unt.edu/ark:/67531/metadc700752/
Cybersecurity: Legislation, Hearings, and Executive Branch Documents
This report provides links to cybersecurity committee hearings and legislation from the 112th, 113th, and 114th Congresses, as well as a list of executive orders and presidential directives pertaining to information and computer security. Summaries of activities and findings are included as a series of tables. digital.library.unt.edu/ark:/67531/metadc743631/
Cybersecurity: Legislation, Hearings, and Executive Branch Documents
This report provides links to cybersecurity-related committee hearings in the 112th, 113th, and 114th Congresses. It also provides a list of executive orders and presidential directives pertaining to information and computer security. digital.library.unt.edu/ark:/67531/metadc795396/
Cybersecurity: Legislation, Hearings, and Executive Branch Documents
This report provides links to cybersecurity-related committee hearings in the 112th, 113th, and 114th Congresses. It also provides a list of executive orders and presidential directives pertaining to information and computer security. digital.library.unt.edu/ark:/67531/metadc824775/
Cybersecurity: Legislation, Hearings, and Executive Branch Documents
This report provides links to cybersecurity-related committee hearings in the 112th, 113th, and 114th Congresses. It also provides a list of executive orders and presidential directives pertaining to information and computer security. digital.library.unt.edu/ark:/67531/metadc847784/
Cybersecurity: Overview Reports and Links to Government, News, and Related Resources
This report directs the reader to authoritative sources that address many of the most prominent issues related to cybersecurity. Included in the reports are resources and studies from government agencies (federal, state, local, and international), think tanks, academic institutions, news organizations, and other sources. digital.library.unt.edu/ark:/67531/metadc824556/
Cybersecurity: Selected Legal Issues
This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats, efforts to protect government networks from cyber threats, and proposals to facilitate and encourage sharing of cyber threat information amongst private sector and government entities. This report also discusses the degree to which federal law may preempt state law. digital.library.unt.edu/ark:/67531/metadc86609/
Dark Web
This report illuminates information on the various layers of the Internet, with a particular focus on the Dark Web. It discusses both legitimate and illicit uses of the Dark Web, including how the government may rely upon it. Throughout, the report raises issues that policy makers may consider as they explore means to curb malicious activity online. digital.library.unt.edu/ark:/67531/metadc700882/
Data Mining and Homeland Security: An Overview
This report explores the issue of data mining in detail and in the context of homeland security, as well as relevant initiatives and pieces of legislation. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. In the context of homeland security, data mining can be a potential means to identify terrorist activities, such as money transfers and communications, and to identify and track individual terrorists themselves, such as through travel and immigration records. digital.library.unt.edu/ark:/67531/metadc770597/
Data Security and Breach Notification Legislation: Selected Legal Issues
This report describes the common elements of several data security and breach notification bills that have been introduced in the 114th Congress, which broadly would impose security and notification requirements on businesses regardless of industry sector. It also discusses state laws that may apply in the event of a data breach and addresses two legal issues that may arise in consideration of new legislation about data security and breach notification. digital.library.unt.edu/ark:/67531/metadc824549/
Data Security: Federal Legislative Approaches
This report discusses the core areas addressed in federal legislation, including the scope of coverage (who is covered and what information is covered); data privacy and security safeguards for sensitive personal information; requirements for security breach notification (when, how, triggers, frequency, and exceptions); restrictions on social security numbers (collection, use, and sale); credit freezes on consumer reports; identity theft penalties; causes of action; and preemption. digital.library.unt.edu/ark:/67531/metadc462159/
Delivery Drones: Coming to the Sky Near You?
This legal sidebar briefly examines the prospect of highly-automated fleets of drones being used routinely to deliver packages, which raises a number of legal questions. digital.library.unt.edu/ark:/67531/metadc855844/
The Department of Defense, Science and Technology Program: An Analysis, FY1998-FY2007
The purpose of this report is to help understand how the budget increases of the last ten years have been allocated. digital.library.unt.edu/ark:/67531/metadc795787/
Desalination and Membrane Technologies: Federal Research and Adoption Issues
This report discusses emerging technologies (e.g., forward osmosis, nanocomposite and chlorine resistant membranes) show promise for reducing desalination costs. It discusses the Research to support development of emerging technologies and to reduce desalination's environmental and social impacts. digital.library.unt.edu/ark:/67531/metadc462780/