Implementation of the Computer Security Act (Public Law 100-235): Hearing Before the Subcommittee on Transportation, Aviation, and Materials of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred First Congress, Second Session, July 10, 1990, Volume 4

Front Cover
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Other editions - View all

Common terms and phrases

Popular passages

Page 48 - Federal function; (4) the term "sensitive information" means any information, the loss, misuse, or unauthorized access to or modification of which could adversely affect the national interest or the conduct of Federal programs, or the privacy to which individuals are entitled under section 552a of title 5, United States Code (the Privacy Act), but which has not been specifically authorized under criteria established by an Executive order or an Act of Congress to be kept secret in the interest of...
Page 71 - ... involves intelligence activities; involves cryptologic activities related to national security; involves command and control of military forces; involves equipment that is an integral part of a weapon or weapons system; or is critical to the direct fulfillment of military or intelligence missions...
Page 51 - Federal computer system identified by that agency pursuant to subsection (a) that is commensurate with the risk and magnitude of the harm resulting from the loss, misuse, or unauthorized access to or modification of the information contained in such system.
Page 71 - Security means protection afforded to telecommunications and automated information systems, in order to prevent exploitation through interception, unauthorized electronic access, or related technical intelligence threats, and to ensure authenticity. Such protection results from the application of security measures (including cryptosecurity, transmission security, emission security, and computer security) to systems which generate, store, process, transfer, or communicate information of use to an...
Page 141 - Standards responsibility for developing standards and guidelines for Federal computer Systems, including responsibility for developing standards and guidelines needed to assure the costeffective security and privacy of sensitive information in Federal computer systems...
Page 29 - NIAP is a collaboration between the National Institute of Standards and Technology (NIST) and the National Security Agency (NSA) in fulfilling their respective responsibilities under the Computer Security Act of 1987.
Page 152 - Director of the National Institute of Standards and Technology (NIST) , formerly the National Bureau of Standards, for all arrangements within the scope of that organization's program responsibility.
Page 69 - It is intended to assure full participation and cooperation among the various existing centers of technical expertise throughout the Executive Branch, to promote a coherent and coordinated defense against the hostile intelligence threat to these systems, and to foster an appropriate partnership between government and the private sector in attaining these goals. This Directive specifically recognizes the special requirements for protection of intelligence...
Page 69 - Policy for the Security of National Security Telecommunications and Information Systems) Continuing advances in microelectronics technology have stimulated an unprecedented growth in the demand for and supply of telecommunications and information processing services within the government and throughout the private sector. As new technologies have been applied, traditional distinctions between telecommunications and information systems have begun to disappear.
Page 44 - I would ask that my written statement be submitted for the record and I would be pleased to answer any questions that you might have.

Bibliographic information