Homeland Cybersecurity and DHS Enterprise Architecture Budget Hearing for Fiscal Year 2005: Hearing Before the Subcommittee on Cybersecurity, Science, and Research and Development of the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, Second Session, March 30, 2004 |
Other editions - View all
Common terms and phrases
activities agencies areas assessment budget capabilities Chairman Chief Information Officer committee components CONG CONGRESS THE LIBRARY COOPER coordination critical infrastructure cyber attack cyber incidents Cyber Security Division Cyber Security Division's cyber security issues cyber threat Department of Homeland Department's developing Directorate efforts ensure enterprise architecture FISMA groups Homeland Security HSOC IAIP implement improve industry Information Security information sharing information technology Infrastructure Protection initiatives integrated Internet interoperability ISAC law enforcement leverage LIBRARY OF CONGRESS LISCOUSKI LOFGREN MAC THORNBERRY ment mission National Communications System National Cyber Security National Cyberspace Security National Security National Strategy NCAS NCRCG NCSD operational outreach participate partnership physical and cyber priority private sector quick hits Reference Model SAFECOM SCADA Secretary Secure Cyberspace specific stakeholders subcommittee target thank THORNBERRY threat and vulnerability threat information tion US-CERT Version watch center wireless communications
Popular passages
Page 55 - Unfortunately, it would appear that there has been a failure to recognize the important utilization made by the Federal, state and local governments, as well as the private sector or the factual data acquired through an accurate census.
Page 12 - Five industry task forces were established to focus specifically in the areas of: • Increasing awareness • Cyber security early warning • Best practices for information security corporate governance • Technical standards and common criteria • Security across the software development lifecycle Perhaps most importantly, the Summit served as a call to action. It represented a logical transition point from developing a national strategy to energizing the public-private partnership to implement...
Page 14 - Again, thank you for the opportunity to testify before you today. I would be pleased to answer any questions you have at this time.
Page 52 - Order; and (2) the coordination of the planning for and provision of national security and emergency preparedness communications for the Federal government under all circumstances, including crisis or emergency, attack, recovery and reconstitution.
Page 52 - NSEP services," means telecommunication services which are used to maintain a state of readiness or to respond to and manage any event or crisis (local, national, or international), which causes or could cause injury or harm to the population, damage to or loss of property, or degrades or threatens the NSEP posture of the United States.
Page 10 - NCSD will coordinate closely with the Office of Management and Budget and...
Page 22 - Thank you again for the opportunity to testify before you today and I would be happy to answer any questions you may have.
Page 13 - Director shall develop plans and make arrangements for provision of temporary assistance within the United States to any eligible person, after consultation with appropriate offices of the Department of State, the Department of Justice, and the Department of Defense. Temporary assistance shall be provided, to the extent feasible, in accordance with such plans, as modified from time to time by the Director.
Page 11 - FIRST is to: • Provide members with technical information, tools, methods, assistance, and guidance. • Coordinate proactive liaison activities and analytical support. • Encourage the development of quality products and services. • Improve national and international information security for government, private industry, academia, and the individual.
Page 50 - National Response Plan, are as follows: 1. Establish a National Cyberspace Response System to prevent, detect, respond to, and reconstitute rapidly after cyber incidents; 2. Work with public and private sector representatives to reduce vulnerabilities and minimize severity of cyber attacks; 3. Promote a comprehensive awareness plan to empower all Americans to secure their own parts of cyberspace; 4. Foster adequate training and education programs to support the Nation's cyber security needs; 5. Coordinate...