157 Matching Results

Search Results

Advanced search parameters have been applied.

Computer Security: A Summary of Selected Federal Laws, Executive Orders, and Presidential Directives

Description: This report provides a short summary of selected federal laws, executive orders, and presidential directives, currently in force, that govern computer security. The report focuses on the major roles and responsibilities assigned various federal agencies in the area of computer security.
Date: April 16, 2004
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Encryption: Frequently Asked Questions

Description: This report discusses encryption, which is a process to secure information from unwanted access or use. Encryption uses the art of cryptography to change information which can be read (plaintext) and make it so that it cannot be read (ciphertext).
Date: unknown
Creator: Jaikaran, Chris
Partner: UNT Libraries Government Documents Department

Cybersecurity: Critical Infrastructure Authoritative Reports and Resources

Description: This report provides resources for congressional staff researching cybersecurity issues and critical infrastructure.The annotated descriptions of these sources are listed in reverse chronological order with an emphasis on material published in the past several years.The report includes resources and studies from government agencies (federal, state, local, and international), think tanks, academic institutions, news organizations, and other sources. Table 1 contains overview reports and resources, Table 2 lists energy industry resources, Table 3 lists financial industry resources, Table 4 contains healthcare industry resources, Table 5 contains telecommunications and communication industry resources, and Table 6 contains transportation industry resources.
Date: April 21, 2017
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Description: This report discusses cybersecurity legislation and provides links to cybersecurity legislation in the 112th, 113th, 114th, and 115th Congresses. Congress has held cybersecurity hearings every year since 2001. This report also provides links to cybersecurity-related committee hearings in the 113th, 114th, and 115th Congresses.
Date: June 23, 2017
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Cybersecurity and Information Sharing: Comparison of Legislative Proposals in the 114th Congress

Description: This report compares two House bills and one Senate bill that address information sharing and related activities in cybersecurity. The report consists of an overview of those and other legislative proposals on information sharing, along with selected associated issues, followed by a side-by-side analysis of the National Cybersecurity Protection Advancement Act of 2015 (NCPAA), the Protecting Cyber Networks Act (PCNA), and the Cybersecurity Information Sharing Act of 2015 (CISA).
Date: June 18, 2015
Creator: Fischer, Eric A. & Logan, Stephanie M.
Partner: UNT Libraries Government Documents Department

Cybersecurity: Selected Issues for the 115th Congress

Description: This report covers a variety of topics related to cybersecurity in order to provide context and a framework for further discussion on selected policy areas. These topics include cybersecurity incidents, major federal agency roles and responsibilities, recent policy actions by Congress and the White House, and descriptions of policy issues that may be of interest for the 115th Congress.
Date: March 9, 2018
Creator: Jaikaran, Chris
Partner: UNT Libraries Government Documents Department

Encryption and Evolving Technology: Implications for U.S. Law Enforcement Investigations

Description: This report provides an overview of the perennial issue involving technology outpacing law enforcement and discusses how policy makers and law enforcement officials have dealt with this issue in the past. It also outlines the current debate surrounding smartphone data encryption and how this may impact U.S. law enforcement operations, as well as existing law enforcement capabilities, the debate over whether law enforcement is "going dark" because of rapid technological advances, and resulting issues that policy makers may consider.
Date: February 18, 2016
Creator: Finklea, Kristin
Partner: UNT Libraries Government Documents Department

The Federal Cybersecurity Workforce: Background and Congressional Oversight Issues for the Departments of Defense and Homeland Security

Description: This report examines congressional oversight of two strategies undertaken by Congress and the executive branch to strengthen the federal cybersecurity workforce: initiatives to define and identify the federal cybersecurity workforce, and hiring and pay flexibilities applicable to cybersecurity positions at the Department of Defense (DOD) and the Department of Homeland Security (DHS).
Date: January 8, 2016
Creator: Francis, Kathryn A. & Ginsberg, Wendy
Partner: UNT Libraries Government Documents Department

Cybersecurity: Overview Reports and Links to Government, News, and Related Resources

Description: This report directs the reader to authoritative sources that address many of the most prominent issues related to cybersecurity. Included in the reports are resources and studies from government agencies (federal, state, local, and international), think tanks, academic institutions, news organizations, and other sources.
Date: March 2, 2016
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Renewed Crypto Wars?

Description: This report briefly examines renewed tensions between tech companies and the government regarding encryption "back doors" and how quickly-advancing technologies could impact law enforcement investigations.
Date: February 9, 2016
Creator: Finklea, Kristin
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to cybersecurity hearings and legislation under consideration in the 113th Congress and those considered in the 112th Congress, as well as executive orders and presidential directives, data and statistics, glossaries, and authoritative reports.
Date: August 2, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Cybersecurity: Critical Infrastructure Authoritative Reports and Resources

Description: This report serves as a starting point for congressional staff assigned to cover cybersecurity issues as they relate to critical infrastructure. Much is written about protecting U.S. critical infrastructure, and this report directs the reader to authoritative sources that address many of the most prominent issues.
Date: March 8, 2016
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Encryption: Selected Legal Issues

Description: This report first provides background to the ongoing encryption debate, including a primer on encryption basics and an overview of Apple, Google, and Facebook's new encryption policies. Next, it provides an overview of the Fifth Amendment right to be free from self-incrimination.
Date: March 3, 2016
Creator: Thompson, Richard M., II & Jaikaran, Chris
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources

Description: Report that provides links to cybersecurity hearings and legislation under consideration in the 113th and 112th Congresses, as well as executive orders and presidential directives, data and statistics, glossaries, and authoritative reports.
Date: June 26, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to cybersecurity hearings and legislation under consideration in the 113th Congress and those considered in the 112th Congress, as well as executive orders and presidential directives, data and statistics, glossaries, and authoritative reports.
Date: September 20, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Smart Toys and the Children's Online Privacy Protection Act of 1998

Description: This report discusses "smart toys" for children that use the internet to interact with the user. It outlines various security concerns regarding the collection and use of information about children, and whether these toys are governed by the Children's Online Privacy Protection Act of 1998.
Date: January 8, 2018
Creator: Stevens, Gina
Partner: UNT Libraries Government Documents Department