Hidden fields
Books Books
" These six areas are (1) security program management, which provides the framework for ensuring that risks are understood and that effective controls are selected and properly implemented, (2) access controls... "
Creating the Department of Homeland Security: Consideration of the ... - Page 353
by United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Oversight and Investigations - 2002 - 368 pages
Full view - About this book

Information Security: Hearing Before the Committee on Governmental Affairs ...

United States. Congress. Senate. Committee on Governmental Affairs - Political Science - 1998 - 204 pages
...variety of areas that we have categorized into six areas of "general controls." General controls are the policies, procedures, and technical controls that...information systems and help ensure their proper operation. The most widely reported weakness was poor control over access to sensitive data and systems. This...
Full view - About this book

Information Security: Serious Weaknesses Place Critical Federal Operations ...

Jean H. Boltz - 1999 - 99 pages
...variety of areas that we have categorized into six areas of "general controls." General controls are the policies, procedures, and technical controls that...information systems and help ensure their proper operation. The most widely reported weakness was poor control over access to sensitive data and systems. This...
Full view - About this book

Financial Management: Status of Financial Management Issues at the Small ...

United States. General Accounting Office - 2000 - 60 pages
...financial management systems and disaster loan processing, and Phase HI on 2General computer controls are the policies, procedures, and technical controls that...information systems and help ensure their proper operation. GAO has issued the Federal Information System Controls Audit Manual (FISCAM) to provide guidance to...
Full view - About this book

Information Security: Congressional Hearing

Fred Thompson - 2000 - 203 pages
...variety of areas that we have categorized into six areas of "general controls." General controls are the policies, procedures, and technical controls that...information systems and help ensure their proper operation. The most widely reported weakness was poor control over access to sensitive data and systems. This...
Full view - About this book

Protecting America's Critical Infrastructure: How Secure are ..., Volume 4

United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Oversight and Investigations - Computers - 2001 - 348 pages
...agencies covered by our review. These weaknesses covered all six major areas of general controls — the policies, procedures, and technical controls that...information systems and help ensure their proper operation. These six areas are (1) security program management, which provides the framework for ensuring that...
Full view - About this book

Protecting America's Critical Infrastructure: How Secure are ..., Volume 4

United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Oversight and Investigations - Computers - 2001 - 236 pages
...agencies covered by our review. These weaknesses covered all six major areas of general controls—the policies, procedures, and technical controls that...information systems and help ensure their proper operation. These six areas are (1) security program management, which provides the framework for ensuring that...
Full view - About this book

Information Technology--essential Yet Vulnerable: How Prepared are We for ...

United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations - Administrative agencies - 2002 - 192 pages
...the 24 agencies covered by our review, and they covered all six major areas of general controls — the policies, procedures, and technical controls that...information systems and help ensure their proper operation. These six areas are (I) security program management, which provides the framework for ensuring that...
Full view - About this book

Information Security: Additional Actions Needed to Fully Implement Reform ...

United States. General Accounting Office - Computer security - 2002 - 48 pages
...significant information security weaknesses in all major areas of the agencies' general controls — the policies, procedures, and technical controls that...information systems and help ensure their proper operation. Figure 1 illustrates the distribution of weaknesses across the 24 agencies for the following six general...
Full view - About this book

Computer Security in the Federal Government: How Do the Agencies Rate ...

United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations - Administrative agencies - 2002 - 84 pages
...the 24 agencies mcluded in our review, and they covered all six major areas of general controls — the policies, procedures, and technical controls that...information systems and help ensure their proper operation. These six areas are (I) security program management, which provides the framework for ensurmg that...
Full view - About this book

How Secure is Our Critical Infrastructure?: Hearing Before the Committee on ...

United States. Congress. Senate. Committee on Governmental Affairs - Computers - 2002 - 96 pages
...the 24 agencies covered by our review, and they covered all six major areas of general controls — the policies, procedures, and technical controls that...information systems and help ensure their proper operation. These six areas are (1) security program management, which provides the framework for ensuring that...
Full view - About this book




  1. My library
  2. Help
  3. Advanced Book Search
  4. Download EPUB
  5. Download PDF