Computer Security: DEA is Not Adequately Protecting National Security Information : Report to the Chairman, Government Information, Justice, and Agriculture Subcommittee, Committee on Government Operations, House of Representatives
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
access to areas accordance action addition adequate controls adequate security adequately protected agency allowed Appendix approved areas where computers Assistant Attorney card-key cessed Chairman complying compromise computer equipment computer security computer systems computer-generated materials computers process national contained controlling access copies correct DEA employee DEA headquarters DEA officials DEA personnel DEA's Department of Justice determine Director disclosure discussed division offices documents domestic Drug Drug Enforcement Administration ensure establish example Exist fact federal federal requirements field Further guidelines identified individuals Information Systems Security instances interest inventory Justice's keys labeled lacking left unattended limited major ment national security clearances national security information necessary non-DEA observed Office Automation system operations Orders Planning process classified information process national security protecting national security relating request requirements response risk security safeguards security weaknesses sensitive serious Staff stored told unauthorized unauthorized access unescorted unsecured workstations
Page 1 - Official information or material which requires protection against unauthorized disclosure in the interest of the national defense or foreign relations of the United States (hereinafter collectively termed "national security") shall be classified in one of three categories, namely "Top Secret," "Secret," or "Confidential," depending upon the degree of its significance to national security.
Page 2 - Controls shall be established by each agency to ensure that classified Information is used, processed, stored, reproduced, transmitted, and destroyed only under conditions that will provide adequate protection and prevent access by unauthorized persons.
Page 4 - Weak ADP Security Compromises Sensitive Data (Public Version), (GAO/T-IMTEC-91-6, Mar. 21, 1991).