Creating the Department of Homeland Security: consideration of the Administration's proposal : hearings before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, second session, June 25 and July 9, 2002, Volume 4

Front Cover

From inside the book

What people are saying - Write a review

We haven't found any reviews in the usual places.



Other editions - View all

Common terms and phrases

Popular passages

Page 336 - Advisory Panel to Assess Domestic Response Capabilities for Terrorism Involving Weapons of Mass Destruction (Gilmore Commission.
Page 73 - Mr. Chairman and Members of the Committee: I appreciate the opportunity to be here today to discuss the proposed creation of the Department of Homeland Security.
Page 115 - Public Health Security and Bioterrorism Preparedness and Response Act of 2002, which expands controls on certain dangerous biological agents and toxins.
Page 139 - The Public Health Security and Bioterrorism Preparedness and Response Act of 2002...
Page 79 - Grant Programs: Design Features Shape Flexibility, Accountability, and Performance Information. GAO/GGD-98-137. Washington, DC: June 22, 1998. Federal Grants: Design Improvements Could Help Federal Resources Go Further. GAO/AIMD-97-7. Washington, DC: December 18, 1996. Block Grants: Issues in Designing Accountability Provisions.
Page 355 - To fully understand the significance of the weaknesses we identified, it is necessary to link them to the risks they present to federal operations and assets. Virtually all federal operations are supported by automated systems and electronic data, and agencies would find it difficult, if not impossible, to carry out their missions and account for their resources without these information assets. Hence, the degree of risk caused by security weaknesses is high.
Page 353 - These six areas are (1) security program management, which provides the framework for ensuring that risks are understood and that effective controls are selected and properly implemented, (2) access controls...
Page 353 - ... implemented; (2) access controls, which ensure that only authorized individuals can read, alter, or delete data; (3) software development and change controls, which ensure that only authorized software programs...
Page 354 - As in 2000, our current analysis shows that weaknesses were most often identified for security program management and access controls. For security program management, we found weaknesses for all 24 agencies in 2001 as compared to 21 of the 24 agencies (88 percent) in 2000. Security program management, which is fundamental to the appropriate selection and effectiveness of the other categories of controls, covers a range of activities related to understanding information security risks; selecting...
Page 317 - Mr. Chairman, this completes my prepared statement. I would be happy to respond to any questions you or other Members of the Subcommittee may have at this time.

Bibliographic information