GAO Survey, Federal Government Computer Security: Hearing Before the Subcommittee on Transportation, Aviation, and Materials of the Committee on Science, Space, and Technology, House of Representatives, One Hundredth Congress, First Session, May 19, 1987, Volume 4
United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Transportation, Aviation, and Materials
U.S. Government Printing Office, 1987 - Computer security - 31 pages
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
activities Administration agency management apply appropriate security controls ASSESSMENT ASSESSMENT RESULTS audit automated information systems basis believe benefit bring build built Chairman civilian agencies Committee concepts concern consideration considered construction Contingency criteria critical currently decisions DEFINITION development process Examination example existing feasibility federal federal guidance follow formal functional GIAMMO GLICKMAN guidance identified important improvement incorporated INITIATION Integrated Internal issue It's kind look major manual ment mission-critical nine agencies observed Office operation Overall system Performed Performed Not Performed phase Phase Assurance PoDELL practices prepared problems procedures proceeded Program reason regarding RESULTS Risk analysis Security activities security requirements security test plans sense sensitive Service side significant Social Security Administration specific studied subcommittee Supports In Phase system development talking TECHNOLOGY tend that's things treated trying WALKER
Page 1 - Washington, DC. The subcommittee met, pursuant to notice, at 2:15 pm, in room 2325, Rayburn House Office Building, Hon.
Page 19 - ... for providing reasonable assurance that appropriate security controls were being successfully incorporated into the development of the nine* systems.
Page 18 - Consequently, we believe that the systems currently in development at many civilian agencies (and intended to be used at least through the 1990s) are likely to possess many of the same security deficiencies we had previously found in the older systems already in operation.
Page 2 - We identified significant deficiencies in the controls of those systems that exposed them to abuse, destruction, error, fraud, and waste.
Page 2 - STATEMENT OF THOMAS P. GIAMMO, ASSOCIATE DIRECTOR, INFORMATION MANAGEMENT AND TECHNOLOGY DIVISION, GENERAL ACCOUNTING OFFICE Mr.
Page 19 - None of the agencies we reviewed, however, treated information security as one of the system's integral functional requirements. In particular, we found that the agencies were significantly weak in making overall assessments of their systems...
Page 2 - Chairman, members of the subcommittee, we are pleased to be here today to provide the subcommittee information on our...