The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress

The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress

Date: November 8, 2013
Creator: Fischer, Eric A.; Liu, Edward C.; Rollins, John W. & Theohary, Catherine A.
Description: This report provides background information regarding the threats and consequences of cybersecurity. The federal legislative framework for cybersecurity is complex, with more than 50 statutes addressing various aspects of it either directly or indirectly.
Contributing Partner: UNT Libraries Government Documents Department
Advisory Committee on Online Privacy and Security

Advisory Committee on Online Privacy and Security

Date: April 1, 2003
Creator: Federal Trade Commission Advisory Committee on Online Access and Security
Description: In December 1999 the Federal Trade Commission established the Advisory Committee on Online Access and Security. The purpose of the Advisory Committee was to provide advice and recommendations to the Commission regarding implementation of certain fair information practices by domestic commercial Web sites. In particular, the Advisory Committee addressed providing online consumers reasonable access to personal information collected from and about them and maintaining adequate security for that information. In accordance with its Charter, the Advisory Committee submitted its Final Report to the Commission on May 15, 2000, and was terminated on May 31, 2000.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: April 3, 2014
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: May 22, 2014
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: May 30, 2014
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: May 2, 2014
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Contributing Partner: UNT Libraries Government Documents Department
COPA Commission

COPA Commission

Date: March 7, 2000
Creator: COPA Commission
Description: The COPA Commission, a congressionally appointed panel, was mandated by the Child Online Protection Act, which was approved by Congress in October 1998. The primary purpose of the Commission is to "identify technological or other methods that will help reduce access by minors to material that is harmful to minors on the Internet."
Contributing Partner: UNT Libraries Government Documents Department
Spyware: Background and Policy Issues for Congress

Spyware: Background and Policy Issues for Congress

Date: July 20, 2010
Creator: Figliola, Patricia M.
Description: This report discusses whether to enact new legislation specifically addressing spyware, or to rely on industry self-regulation and enforcement actions by the Federal Trade Commission (FTC) and the Department of Justice under existing law, as well as the opinions of both the opponents and the supporters of industry self-regulation.
Contributing Partner: UNT Libraries Government Documents Department
Federal Lands and Natural Resources: Overview and Selected Issues for the 113th Congress

Federal Lands and Natural Resources: Overview and Selected Issues for the 113th Congress

Date: October 14, 2014
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: October 14, 2014
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Contributing Partner: UNT Libraries Government Documents Department
The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress

The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress

Date: March 1, 2013
Creator: Fischer, Eric A.; Liu, Edward C.; Rollins, John W. & Theohary, Catherine A.
Description: This report provides background information regarding the threats and consequences of cybersecurity. The federal legislative framework for cybersecurity is complex, with more than 50 statutes addressing various aspects of it either directly or indirectly.
Contributing Partner: UNT Libraries Government Documents Department
Smartphone Data Encryption: A Renewed Boundary for Law Enforcement?

Smartphone Data Encryption: A Renewed Boundary for Law Enforcement?

Date: October 17, 2014
Creator: Finklea, Kristin
Description: This report briefly examines new issues for law enforcement regarding data encryption and smartphones including cyber-criminals and Apple's new privacy policy that removes the back-doors that law enforcement used to be able to use to access user data.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Cyber Crime Protection Security Act (S. 2111, 112th Congress)— A Legal Analysis

Cybersecurity: Cyber Crime Protection Security Act (S. 2111, 112th Congress)— A Legal Analysis

Date: January 28, 2013
Creator: Doyle, Charles
Description: This report discusses the Cyber Crime Protection Security Act (S. 2111) that would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, password trafficking, and extortion committed against computers and computer networks. S. 2111 contains some of the enhancements approved by the Senate Judiciary Committee when it reported the Personal Data Privacy and Security Act (S. 1151), S.Rept. 112-91 (2011).
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Selected Legal Issues

Cybersecurity: Selected Legal Issues

Date: April 17, 2013
Creator: Liu, Edward C.; Stevens, Gina; Ruane, Kathleen Ann; Dolan, Alissa M.; Thompson, Richard M., II & Nolan, Andrew
Description: This report discusses selected legal issues that frequently arise in the context of legislation to address vulnerabilities of private critical infrastructure to cyber threats, efforts to protect government networks from cyber threats, and proposals to facilitate and encourage sharing of cyber threat information amongst private sector and government entities. This report also provides an overview of the ways in which federal laws of these types may preempt or affect the applicability of state law.
Contributing Partner: UNT Libraries Government Documents Department
Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Date: October 15, 2014
Creator: Doyle, Charles
Description: This report discusses The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: March 8, 2013
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: March 20, 2013
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: May 22, 2013
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: January 17, 2013
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: April 17, 2013
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: May 24, 2013
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: January 9, 2014
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: January 23, 2014
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Contributing Partner: UNT Libraries Government Documents Department
Cyber Operations in DOD Policy and Plans: Issues for Congress

Cyber Operations in DOD Policy and Plans: Issues for Congress

Date: January 5, 2014
Creator: Theohary, Catherine A. & Harrington, Anne I.
Description: This report presents an overview of the threat landscape in cyberspace, including the types of offensive weapons available, the targets they are designed to attack, and the types of actors carrying out the attacks. It presents a picture of what kinds of offensive and defensive tools exist and a brief overview of recent attacks. The report then describes the current status of U.S. capabilities, and the national and international authorities under which the U.S. Department of Defense carries out cyber operations.
Contributing Partner: UNT Libraries Government Documents Department
FIRST PREV 1 2 3 4 5 NEXT LAST