You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
Statement of Gregory C. Wilshusen, Dir., Information Security Issues, GAO. Federal government agencies and the nation’s critical infrastructures have become increasingly dependent on computerized information systems and electronic data to carry out their operations. While creating significant benefits, this can also introduce vulnerabilities to cyber-threats which could have a serious impact on national security, the economy, and public health and safety. GAO has designated federal information security as a high-risk area since 1997 and in 2003 expanded this to include cyber critical infrastructure protection. This testimony discusses challenges facing the government in effectively implementing cybersecurity and the extent to which the national cybersecurity strategy includes desirable characteristics of a national strategy. Figures. This is a print on demand report.
The Los Alamos National Lab. (LANL) has experienced security lapses protecting information on its unclassified computer network. The unclassified network contains sensitive information. This report: (1) assessed the effectiveness of the security controls LANL has in place to protect information transmitted over its unclassified computer network; (2) assessed whether LANL had implemented an information security program for its unclassified network; and (3) examined expenditures to protect LANL¿s unclassified network from FY 2001 through 2007. The author examined security policies and procedures and reviewed the laboratories' access controls for protecting information on the unclassified network. Includes recommendations. Illustrations.
The Internal Revenue Service (IRS) relies extensively on computerized systems to support its financial and mission-related operations and on information security controls to protect financial and sensitive taxpayer information that resides on those systems. As part of an audit of IRS's FY 2010 and 2009 financial statements, the auditor assessed whether controls over key financial and tax processing systems are effective in ensuring the confidentiality, integrity, and availability of financial and sensitive taxpayer information. To do this, the auditor examined IRS information security policies, plans, and procedures; tested controls over key financial applications; and interviewed key agency officials at four sites. This is a print on demand report.
US National Cyber Security Strategy and Programs Handbook - Strategic Information and Developments
description not available right now.
description not available right now.