Implementation of the Computer Security Act: Hearing Before the Subcommittee on Transportation, Aviation, and Materials and the Subcommittee on Science, Research, and Technology of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred First Congress, First Session, March 21, 1989, Volume 4
United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Transportation, Aviation, and Materials, United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Science, Research, and Technology
U.S. Government Printing Office, 1989 - Administrative agencies - 148 pages
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
activities Administration Admiral applications appreciate asked assess assistance assure attack believe Board Chairman Commission Committee communications completed compliance Computer Security Act computer security plans computer systems concerns contain continue course Defense Department Describes develop Director discuss document effective effort evaluation federal agencies FIPS follows going guidance guidelines identify implementation important Institute of Standards integrity issue KAMMER kind look March materials meeting National Institute National Security NIST NIST and NSA Office operated organizations PLAGER prepared problem procedures progress protection questionnaire questions received regulation reported requirements response risk security plans sensitive information sensitive systems specific standards Standards and Technology started statement Subcommittee submitted systems operated technical Thank things training programs trusted Understanding users VALENTINE WALGREN
Page 118 - House of Representatives The Honorable Robert A. Roe Chairman, Committee on Science, Space, and Technology House of Representatives...
Page 54 - This document provides, in the form of questions and answers, the background, and basic essential information required to understand the developmental process for automatic data processing (ADP) contingency plans. The primary intended audience consists of executives and managers who depend on ADP resources and services, yet may not be directly responsible for the daily management or supervision of data processing activities or facilities.
Page 5 - Mr. Chairman and members of the subcommittees, I appreciate the opportunity to testify before you today on HR 8005 which would prohibit the importation of chrome and other products from Rhodesia.
Page 47 - Name of Standard: Data Encryption Standard (DES). Category of Standard: Operations, Computer Security. Explanation: The Data Encryption Standard (DES) specifies an algorithm to be implemented in electronic hardware devices and used for the cryptographic protection of computer data. This publication provides a complete description of a mathematical algorithm for encrypting (enciphering) and decrypting (deciphering) binary coded information. Encrypting data converts it to an unintelligible form called...
Page 49 - August 1981 Provides explicit advice on achieving database integrity and security control. Identifies integrity and security problems and discusses procedures and methods which have proven effective in addressing these problems. Provides an explicit, step-by-step procedure for examining and verifying the accuracy and completeness of a database.
Page 45 - These publications are available through the Government Printing Office (GPO) and the National Technical Information Service (NTIS). The source and price for each publication are Indicated.
Page 58 - Kammer has chaired several important evaluation committees for the Department of Commerce, including reviews of satellite systems for weather monitoring and the US LANDSAT program, and...
Page 46 - Provides guidance to Federal organizations in developing physical security and risk management programs for their ADP facilities. Covers security analysis, natural disasters, failure of supporting utilities, system reliability, procedural measures and controls, protection of off-site facilities, contingency plans, security awareness, and security audit. Can be used as a checklist for planning and evaluating security of computer systems.
Page 59 - (3) have responsibility within the Federal Government for developing technical, management, physical, and administrative standards and guidelines for the cost-effective security and privacy of sensitive information in Federal computer systems...
Page 47 - Presents a technique for conducting a risk analysis of an ADP facility and related assets. Provides guidance on collecting, quantifying, and analyzing data related to the frequency of caused by adverse events. This guideline describes the characteristics and attributes of a computer system that must be known for a risk analysis and gives an example of the risk analysis process. GUIDELINES FOR SECURITY OF COMPUTER APPLICATIONS...