UNT Libraries Government Documents Department - Browse

ABOUT BROWSE FEED

Cybersecurity: Continued Federal Efforts Are Needed to Protect Critical Systems and Information

Description: Testimony issued by the Government Accountability Office with an abstract that begins "Federal laws and policy have assigned important roles and responsibilities to the Department of Homeland Security (DHS) and the National Institute of Standards and Technology (NIST) for securing computer networks and systems. DHS is charged with coordinating the protection of computer-reliant critical infrastructure--much of which is owned by the private sector--and securing its own computer systems, while NIST is responsible for developing standards and guidelines for implementing security controls over information and information systems. GAO was asked to describe cybersecurity efforts at DHS and NIST--including partnership activities with the private sector--and the use of cybersecurity performance metrics in the federal government. To do so, GAO relied on its reports on federal information security and federal efforts to fulfill national cybersecurity responsibilities."
Date: June 25, 2009
Creator: United States. Government Accountability Office.

Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress

Description: This report identifies cybersecurity policy issues that have been proposed for priority consideration. The report lists and synopsizes current legislation that has been developed to address various aspects of the cybersecurity problem. It then lists the current status of the legislation and compares legislation with existing executive branch initiatives. Finally, analysis of information contained in executive branch initiatives and congressional legislation is used to further highlight related considerations for Congress.
Date: September 30, 2009
Creator: Theohary, Catherine A. & Rollins, John

Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress

Description: This report identifies cybersecurity policy issues that have been proposed for priority consideration. The report lists and synopsizes current legislation that has been developed to address various aspects of the cybersecurity problem. It then lists the current status of the legislation and compares legislation with existing executive branch initiatives. Finally, analysis of information contained in executive branch initiatives and congressional legislation is used to further highlight related considerations for Congress.
Date: January 12, 2010
Creator: Theohary, Catherine A. & Rollins, John

Cybersecurity: Cyber Crime Protection Security Act (S. 2111, 112th Congress)— A Legal Analysis

Description: This report discusses the Cyber Crime Protection Security Act (S. 2111) that would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, password trafficking, and extortion committed against computers and computer networks. S. 2111 contains some of the enhancements approved by the Senate Judiciary Committee when it reported the Personal Data Privacy and Security Act (S. 1151), S.Rept. 112-91 (2011).
Date: January 28, 2013
Creator: Doyle, Charles

Cybersecurity: Cyber Crime Protection Security Act (S. 2111)—A Legal Analysis

Description: The Cyber Crime Protection Security Act (S. 2111) would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, password trafficking, and extortion committed against computers and computer networks. S. 2111 contains some of the enhancements approved by the Senate Judiciary Committee when it reported the Personal Data Privacy and Security Act (S. 1151), S.Rept. 112-91 (2011).
Date: March 12, 2012
Creator: Doyle, Charles

Cybersecurity: Data, Statistics, and Glossaries

Description: This report describes data and statistics from government, industry, and information technology (IT) security firms regarding the current state of cybersecurity threats in the United States and internationally. These include incident estimates, costs, and annual reports on data security breaches, identity thefts, cybercrimes, malwares, and network securities.
Date: February 5, 2015
Creator: Tehan, Rita

Cybersecurity: Data, Statistics, and Glossaries

Description: This report describes data and statistics from government, industry, and information technology (IT) security firms regarding the current state of cybersecurity threats in the United States and internationally. These include incident estimates, costs, and annual reports on data security breaches, identity thefts, cybercrimes, malwares, and network securities.
Date: September 8, 2015
Creator: Tehan, Rita

Cybersecurity: FISMA Reform

Description: This report briefly discusses current requirements under the Federal Information Security Management Act (FISMA) and two bills currently being considered by Congress that would revise the conditions and authority granted by FISMA.
Date: November 24, 2014
Creator: Fischer, Eric A.

Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination

Description: A letter report issued by the Government Accountability Office with an abstract that begins "Threats to federal information technology (IT) infrastructure and systems continue to grow in number and sophistication. The ability to make federal IT infrastructure and systems secure depends on the knowledge, skills, and abilities of the federal and contractor workforce that implements and maintains these systems. In light of the importance of recruiting and retaining cybersecurity personnel, GAO was asked to assess (1) the extent to which federal agencies have implemented and established workforce planning practices for cybersecurity personnel and (2) the status of and plans for governmentwide cybersecurity workforce initiatives. GAO evaluated eight federal agencies with the highest IT budgets to determine their use of workforce planning practices for cybersecurity staff by analyzing plans, performance measures, and other information. GAO also reviewed plans and programs at agencies with responsibility for governmentwide cybersecurity workforce initiatives."
Date: November 29, 2011
Creator: United States. Government Accountability Office.

Cybersecurity Issues and Challenges: In Brief

Description: The information and communications technology (ICT) industry has evolved greatly over the last half century. The technology is ubiquitous and increasingly integral to almost every facet of modern society. ICT devices and components are generally interdependent, and disruption of one may affect many others. Over the past several years, experts and policy makers have expressed increasing concerns about protecting ICT systems from cyberattacks, which many experts expect to increase in frequency and severity over the next several years. This report discusses the concept of cybersecurity, the management of cybersecurity risks, and the federal government's role in managing such risks.
Date: December 16, 2014
Creator: Fischer, Eric A.

Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development

Description: A letter report issued by the Government Accountability Office with an abstract that begins "Computer networks and infrastructures, on which the United States and much of the world rely to communicate and conduct business, contain vulnerabilities that can leave them susceptible to unauthorized access, disruption, or attack. Investing in research and development (R&D) is essential to protect critical systems and to enhance the cybersecurity of both the government and the private sector. Federal law has called for improvements in cybersecurity R&D, and, recently, President Obama has stated that advancing R&D is one of his administration's top priorities for improving cybersecurity. GAO was asked to determine the key challenges in enhancing national-level cybersecurity R&D efforts among the federal government and private companies. To do this, GAO consulted with officials from relevant federal agencies and experts from private sector companies and academic institutions as well as analyzed key documents, such as agencies' research plans."
Date: June 3, 2010
Creator: United States. Government Accountability Office.

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Description: This report provides a list of executive orders and presidential directives pertaining to information and computer security. Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have various targets, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, engaging in cybercrime, or intimidating political activists; additionally attributing an attack to a specific location can be difficult, which may make responding problematic.
Date: September 8, 2015
Creator: Tehan, Rita