How secure is sensitive Commerce Department data and operations?: a review of the department's computer security policies and practices : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, August 3, 2001, Volume 4
United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Oversight and Investigations
U.S. G.P.O., 2001 - Computers - 159 pages
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
access controls adequate agencies audit trail Bodman bureaus we reviewed Burr BXA personnel CERT Coordination Center Chairman Tauzin Chief Information Officer Commerce bureaus Commerce CIO Commerce Final Report Commerce systems computer security computer systems configured Dacey database administrator Denial-of-service attacks Department of Commerce department-wide department's detected developing disruption documented ECASS employees ensure evaluated export control classification federal files Frazier functions Greenwood hacker identification numbers identified implemented improve individuals information security manager information security program information systems Information Technology Inspector General June interconnectivity Internet intrusions issues network security NIST NOAA Office of Inspector OMB Circular A-130 operating system operating unit CIO oversight passwords problems procedures protect Pyke requirements risk assessments Secretary security awareness security controls security plans security policies sensitive data sensitive information sensitive systems seven bureaus specific system administrator Task Force testing thank U.S. Department updated users vulnerabilities Web bugs