Hidden fields
Books Books
" To fully understand the significance of the weaknesses we identified, it is necessary to link them to the risks they present to federal operations and assets. Virtually all federal operations are supported by automated systems and electronic data, and... "
Creating the Department of Homeland Security: Consideration of the ... - Page 355
by United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Oversight and Investigations - 2002 - 368 pages
Full view - About this book

Information Security: Hearing Before the Committee on Governmental Affairs ...

United States. Congress. Senate. Committee on Governmental Affairs - Political Science - 1998 - 256 pages
...the significance of the weaknesses summarized in table 1 , it is necessary to link them to the risks they present to federal operations and assets. Virtually...their resources without these information assets. Descriptions of reported weaknesses and related risks to selected major federal operations follow....
Full view - About this book

Information Security: Hearing Before the Committee on Governmental Affairs ...

United States. Congress. Senate. Committee on Governmental Affairs - Political Science - 1998 - 216 pages
...summarized In table I, It Is necessary to link them to the risks they present to federal operation and assets. Virtually all federal operations are supported...their resources without these information assets. Descriptions of reported weaknesses and related risks to selected major federal operations follow....
Full view - About this book

Information Security: Serious Weaknesses Place Critical Federal Operations ...

Jean H. Boltz - 1999 - 99 pages
...the significance of the weaknesses summarized in table 1, it is necessary to link them to the risks they present to federal operations and assets. Virtually...their resources without these information assets. Descriptions of reported weaknesses and related risks to selected major federal operations follow....
Full view - About this book

United States Global Defense Posture: Hearings Before the ..., Volume 4

United States. Congress. House. Committee on Armed Services - History - 2005 - 1004 pages
...understand the significance of the weaknesses we identified, it ta necessary to link them to the risks they present to federal operations and assets. Virtually...systems and electronic data, and agencies would find U difficult, if not impossible, to carry out their missions and account for their resources without...
Full view - About this book

Information Security: Congressional Hearing

Fred Thompson - 2000 - 203 pages
...the significance of the weaknesses summarized in table 1, it is necessary to link them to the risks they present to federal operations and assets. Virtually...their resources without these information assets. Descriptions of reported weaknesses and related risks to selected major federal operations follow....
Full view - About this book

Protecting America's Critical Infrastructure: How Secure are ..., Volume 4

United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Oversight and Investigations - Computers - 2001 - 246 pages
...understand the significance of the weaknesses we identified, it is necessary to link them to the risks they present to federal operations and assets. Virtually...risk caused by security weaknesses is extremely high. 3 Information Security: Opportunities for Improved OMB Oversight of Agency Practices (GAO/ AIMD-96-110,...
Full view - About this book

Computer Security in the Federal Government: How Do the Agencies Rate ...

United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations - Administrative agencies - 2002 - 76 pages
...them to the risks they present to federal operations and assets. Virtually all federal operations arc supported by automated systems and electronic data,...risk caused by security weaknesses is extremely high. review the adequacy of federal agencies' implementation of PDD63.The March 2001 report is based on...
Full view - About this book

Computer Security in the Federal Government: How Do the Agencies Rate ...

United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations - Administrative agencies - 2002 - 84 pages
...them to the nski they present to federal operations and assets Virtually all federal operations arc supported by automated systems and electronic data,...missions and account for their resources without these mformation assets Hence, the degree of risk caused by security weaknesses is extremely high. review...
Full view - About this book

Computer Security in the Federal Government: How Do the Agencies Rate ...

United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations - Administrative agencies - 2002 - 78 pages
...understand the significance of the weaknesses we identified, it is necessary to link them to the risks they present to federal operations and assets Virtually...automated systems and electronic data, and agencies would fiod it difficult, if not impossible, to carry out their missions and account for their resources without...
Full view - About this book

Information Technology--essential Yet Vulnerable: How Prepared are We for ...

United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations - Administrative agencies - 2002 - 192 pages
...These weaknesses present substantial risks to Federal operations, assets, and confidentiality. Because virtually all Federal operations are supported by automated systems and electronic data, the risks are very high and the breadth of the potential impact is very wide. The risks cover areas...
Full view - About this book




  1. My library
  2. Help
  3. Advanced Book Search
  4. Download EPUB
  5. Download PDF