Computer Security Research and Training Act of 1985: Hearing Before a Subcommittee of the Committee on Government Operations, House of Representatives, Ninety-ninth Congress, First Session, on H.R. 2889 ... September 18, 1985

Front Cover
 

Other editions - View all

Common terms and phrases

Popular passages

Page 75 - The government shall encourage, advise, and, where appropriate, assist the private sector to: identify systems which handle sensitive non-government information, the loss of which could adversely affect the national security...
Page 77 - Staff ; the Chief of Staff, United States Army ; the Chief of Naval Operations ; and the Chief of Staff, United States Air Force. The...
Page 13 - Thank you very much, Mr. Chairman. We are pleased to be here today to discuss...
Page 77 - Staff, which shall consist of the Chief of Staff, United States Army; the Chief of Naval Operations; the Chief of Staff, United States Air Force; and the Chief of Staff to the Commander in Chief, if there be one.
Page 75 - Intonation, the loss of which could adversely affect the national security Interest, shall be protected in proportion to the threat of exploitation and the associated potential damage to the national security. c. The government shall encourage, advise, and, where appropriate, assist the private sector to: Identify systems which handle sensitive non-government information, the loss of which could adversely affect the national security; determine the threat to, and vulnerability of these systems; and...
Page 82 - Such protection results from the application of security measures (including cryptosecurity, transmission security, emission security, and computer security) to systems which generate, store, process, transfer, or communicate information of use to an adversary, and also includes the physical protection of sensitive technical security material and sensitive technical security information. d. Technical security material means equipment, components, devices, and associated documentation or other media...
Page 15 - That completes my prepared statement, Mr. Chairman. We would be pleased to answer any questions you or any other members of the subcommittee may have.
Page 75 - ... by such means as are necessary to prevent compromise or exploitation. b. Systems handling other sensitive, but unclassified, government or government-derived information, the loss of which could adversely affect the national security interest, shall be protected in proportion to the threat of exploitation and the associated potential damage to the national security.
Page 73 - Although this trend promises greatly improved efficiency and effectiveness, it also poses significant security challenges. Telecommunications and automated information processing systems are highly susceptible to interception, unauthorized electronic access, and related forms of technical exploitation, as well as other dimensions of the hostile intelligence threat. The technology to exploit these electronic systems is widespread and is used extensively by foreign nations and can be employed, ' as...
Page 78 - Committee member departments and agencies of plans and programs to fulfill the objectives of this Directive, including the development of necessary security architectures...

Bibliographic information