Hidden fields
Books Books
" As in 2000, our current analysis shows that weaknesses were most often identified for security program management and access controls. For security program management, we found weaknesses for all 24 agencies in 2001 as compared to 21 of the 24 agencies... "
Creating the Department of Homeland Security: Consideration of the ... - Page 354
by United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Oversight and Investigations - 2002 - 368 pages
Full view - About this book

Computer Security in the Federal Government: How Do the Agencies Rate ...

United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations - Administrative agencies - 2002 - 76 pages
...Audit report* tccued Juty 2000 tiirouQti September 2001 As in 2000, our current analysis shows that weaknesses were most often identified for security...controls, we also found weaknesses for all 24 agencies in 2001—the same condition we found in 2000. Weak access controls for sensitive data and systems make...
Full view - About this book

Lessons learned from the Government Information Security Reform ..., Volume 4

United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations - Business & Economics - 2002 - 178 pages
...for all 24 agencies in 2001 as compared to 21 agencies (88 pa cent) in a similar analysis in 2000 ^ For access controls, we also found weaknesses for...agencies in 2001 — the same condition we found in 2000. For service continuity controls, we found weaknesses at 19 of the 24 agencies (79 percent) as compared...
Full view - About this book

Information Security: Additional Actions Needed to Fully Implement Reform ...

United States. General Accounting Office - Computer security - 2002 - 48 pages
...for all 24 agencies in 2001 as compared to 21 agencies (88 percent) in a similar analysis in 2000.a For access controls, we also found weaknesses for...agencies in 2001 — the same condition we found in 2000. For service continuity controls, we found weaknesses at 19 of the 24 agencies (79 percent) as compared...
Full view - About this book

Cyberterrorism: Is the Nation's Critical Infrastructure Adequately Protected ...

United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations - Computers - 2003 - 208 pages
...controls, covers a range of activities related to understanding information security risks; selecting end implementing controls commensurate with risk; and...programs for purposes such as personal gain or sabotage, hi today's increasingly interconnected computing environment, poor access controls can expose an agency's...
Full view - About this book

Cyberterrorism: Is the Nation's Critical Infrastructure Adequately Protected ...

United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations - Computers - 2003 - 210 pages
...For security program management, we found weaknesses for all 24 agencies tn 200I as compared to 2I of the 24 agencies (88 percent) in 2000. Security...controls, we also found weaknesses for all 24 agencies in 200I— the same condition we found in 2000. Weak access controls for sensitive data and systems make...
Full view - About this book

Cyber security: the challenges facing our nation in critical infrastructure ...

United States. Congress. House. Committee on Government Reform. Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census - Computers - 2003 - 164 pages
...management, we identified weaknesses for all 24 agencies in 2002— the same as reported for 2001, and compared to 21 of the 24 agencies (88 percent) in...to operate effectively, • For access controls, we found weaknesses for 22 of 24 agencies (g2 percent) in 2002 (no significant weaknesses were found for...
Full view - About this book

Computer Security in the Federal Government: How Do the Agencies Rate ...

United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations - Computers - 2003 - 122 pages
...management, we identified weaknesses for all 24 agencies in 2002 — the same as reported for 2001, and compared to 21 of the 24 agencies (88 percent) in...continue to operate effectively. For access controls, we found weaknesses for 22 of 24 agencies (92 percent) in 2002 (no significant weaknesses were found for...
Full view - About this book

H.R. 3844, the Federal Information Security Management Act of 2002: hearing ...

United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations - Computers - 2003 - 168 pages
...for all 24 agencies in 2001 as compared to 21 agencies (88 percent) in a similar analysis in 2000,' For access controls, we also found weaknesses for...agencies in 2001 — the same condition we found in 2000. Concerned with accounts of attacks on commercial systems via the Internet and reports of significant...
Full view - About this book

Cyber security: the challenges facing our nation in critical infrastructure ...

United States. Congress. House. Committee on Government Reform. Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census - Computers - 2003 - 168 pages
...understanding information security risks; selecting and implementing controls commensurate with risk; mid ensuring that controls, once implemented, continue...to operate effectively. • For access controls, we found weaknesses for 22 of 24 agencies (92 percent) in 2002 (no significant weaknesses were found for...
Full view - About this book

Critical infrastructure protection significant challenges need to be addressed

Computer crimes - 64 pages
...Audit reports issued July 2000 through September 2001. As in 2000, our current analysis shows that weaknesses were most often identified for security...controls, we also found weaknesses for all 24 agencies in 2001—the same condition we found in 2000. Weak access controls for sensitive data and systems make...
Full view - About this book




  1. My library
  2. Help
  3. Advanced Book Search
  4. Download EPUB
  5. Download PDF