Search Results

Control Systems Cyber Security: Defense-in-Depth Strategies

Description: Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: • Maintenance of various field devices, telemetry collection, and/or industrial-level process systems • Access to facilities via remote data link or modem • Public facing services for customer or corporate operations • A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.
Date: October 1, 2007
Creator: Fabro, Mark
Partner: UNT Libraries Government Documents Department

Encryption and Evolving Technology: Implications for U.S. Law Enforcement Investigations

Description: This report provides an overview of the perennial issue involving technology outpacing law enforcement and discusses how policy makers and law enforcement officials have dealt with this issue in the past. It discusses the current debate surrounding smartphone data encryption and how this may impact U.S. law enforcement operations. The report also discusses existing law enforcement capabilities, the debate over whether law enforcement is "going dark" because of rapid technological advances, and resulting issues that policy makers may consider.
Date: September 8, 2015
Creator: Finklea, Kristin
Partner: UNT Libraries Government Documents Department

JPMorgan Data Breach Involves Information on 76 Million Households, 7 Million Small Businesses

Description: This report discusses the JP Morgan data breach. According to the filing, although account information was not compromised, hackers had access to information of users of Chase.com, JPMorganOnline, Chase Mobile, and JPMorgan Mobile, covering "name, address, phone number and email address [information] -- and internal JPMorgan Chase information relating to ... approximately 76 million households and 7 million small businesses."
Date: October 23, 2014
Creator: Murphy, M. Maureen
Partner: UNT Libraries Government Documents Department

Court-Ordered Access to Smart Phones: In Brief

Description: This report specifically examines certain encryption issues that have been raised in the investigation of the December 2, 2015, terrorist attack in San Bernardino, CA. This report highlights certain issues that policymakers may examine as they follow the ongoing dispute between law enforcement and technology companies, and it focuses on questions related to the government's request.
Date: February 23, 2016
Creator: Finklea, Kristin; Thompson, Richard M., II & Jaikaran, Chris
Partner: UNT Libraries Government Documents Department

Encryption and Evolving Technology: Implications for U.S. Law Enforcement Investigations

Description: This report provides an overview of the perennial issue involving technology outpacing law enforcement and discusses how policy makers and law enforcement officials have dealt with this issue in the past. It also outlines the current debate surrounding smartphone data encryption and how this may impact U.S. law enforcement operations, as well as existing law enforcement capabilities, the debate over whether law enforcement is "going dark" because of rapid technological advances, and resulting issues that policy makers may consider.
Date: February 18, 2016
Creator: Finklea, Kristin
Partner: UNT Libraries Government Documents Department

Renewed Crypto Wars?

Description: This report briefly examines renewed tensions between tech companies and the government regarding encryption "back doors" and how quickly-advancing technologies could impact law enforcement investigations.
Date: February 9, 2016
Creator: Finklea, Kristin
Partner: UNT Libraries Government Documents Department

Encryption: Selected Legal Issues

Description: This report first provides background to the ongoing encryption debate, including a primer on encryption basics and an overview of Apple, Google, and Facebook's new encryption policies. Next, it provides an overview of the Fifth Amendment right to be free from self-incrimination.
Date: March 3, 2016
Creator: Thompson, Richard M., II & Jaikaran, Chris
Partner: UNT Libraries Government Documents Department

Encryption Export Controls

Description: This report discusses encryption export controls, beginning with background on the development and use of encryption, and continuing with a description of export controls imposed under the Arms Export Control Act (AECA) and the Export Administration Act (EAA); a discussion of recent federal court rulings in First Amendment challenges to AECA and EAA regulations; and a summary of 106th Congress legislation aimed at liberalizing law and policy affecting encryption exports.
Date: January 11, 2001
Creator: Grimmett, Jeanne J.
Partner: UNT Libraries Government Documents Department

Encryption: Frequently Asked Questions

Description: This report discusses encryption, which is a process to secure information from unwanted access or use. Encryption uses the art of cryptography to change information which can be read (plaintext) and make it so that it cannot be read (ciphertext).
Date: unknown
Creator: Jaikaran, Chris
Partner: UNT Libraries Government Documents Department

Electronic Signatures: Technology Developments and Legislative Issues

Description: Electronic signatures, a means of verifying the identity of the user of a computer system to control access or authorize a transaction, are increasingly being used in electronic commerce. Several technologies can be used to produce electronic signatures, the most prominent being digital signatures, which use cryptographic techniques to provide data integrity and nonrepudiation. Legislation enacted in the 106th Congress enables the legal recognition of electronic signatures in interstate commerce. Other legislation introduced but not enacted was intended to promote federal agency use of electronic signatures to enable electronic filing of information.
Date: January 19, 2001
Creator: Nunno, Richard M
Partner: UNT Libraries Government Documents Department