Congressional Research Service Reports - Browse

ABOUT BROWSE FEED

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: February 4, 2002
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: July 18, 2002
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: December 17, 2002
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: February 10, 2003
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: April 9, 2003
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: May 6, 2003
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: August 7, 2003
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: September 25, 2003
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: February 17, 2005
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructure: Control Systems and the Terrorist Threat

Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Date: October 1, 2002
Creator: Shea, Dana A
Partner: UNT Libraries Government Documents Department

Critical Infrastructure: Control Systems and the Terrorist Threat

Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Date: February 21, 2003
Creator: Shea, Dana A
Partner: UNT Libraries Government Documents Department

Critical Infrastructure: Control Systems and the Terrorist Threat

Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Date: April 23, 2003
Creator: Shea, Dana A
Partner: UNT Libraries Government Documents Department

Critical Infrastructure: Control Systems and the Terrorist Threat

Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Date: July 14, 2003
Creator: Shea, Dana A
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: What Makes an Infrastructure Critical?

Description: A fluid definition of what constitutes a critical infrastructure could complicate policymaking and actions. At the very least, a growing list of infrastructures in need of protection will require the federal government to prioritize its efforts. Essentially the federal government will have to try to minimize the impact on the nation’s critical infrastructure of any future terrorist attack, taking into account what those impacts might be and the likelihood of their occurring.
Date: August 30, 2002
Creator: Moteff, John D.; Copeland, Claudia & Fischer, John W.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: What Makes an Infrastructure Critical?

Description: A fluid definition of what constitutes a critical infrastructure could complicate policymaking and actions. At the very least, a growing list of infrastructures in need of protection will require the federal government to prioritize its efforts. Essentially the federal government will have to try to minimize the impact on the nation’s critical infrastructure of any future terrorist attack, taking into account what those impacts might be and the likelihood of their occurring.
Date: January 29, 2003
Creator: Moteff, John D.; Copeland, Claudia & Fischer, John W.
Partner: UNT Libraries Government Documents Department

Critical Infrastructure and Key Assets: Definition and Identification

Description: This report reviews the concept and definition of “critical infrastructure” as it has appeared in federal reports, legislation and regulation since the early 1980s. The report highlights the changes and expansion of that definition as the focus of public policy debates shifted from infrastructure adequacy to infrastructure protection. Finally the report summarizes current policy issues associated with critical infrastructure identification by federal agencies and the private sector. The report is intentionally limited to definitional issues and categorization of infrastructure.
Date: October 1, 2004
Creator: Moteff, John D. & Parfomak, Paul W.
Partner: UNT Libraries Government Documents Department