Implementation of the Computer Security Act: Hearing Before the Subcommittee on Transportation, Aviation, and Materials of the Committee on Science, Space, and Technology, House of Representatives, One Hundredth Congress, Second Session, September 22, 1988, Volume 4
United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Transportation, Aviation, and Materials
U.S. Government Printing Office, 1989 - Administrative agencies - 112 pages
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
activities Admiral appropriate areas asked assistance assure awareness base believe Board briefing BURRows called Center Chairman closely Committee Computer Security Act computer security training computer systems concern conduct continue contract determine develop directed Director discuss documentation effective efforts employees established Evaluation Federal agencies follows GLICKMAN going guidance guidelines hearing identified implementation important initial interest issues January July kind legislation look materials McCURDY meeting National Security NIST Office Office of Personnel operating organizations PLAGER prepared problems procedures programs protect questionnaire questions record regulation reported requirements responsibilities RHILE risk SCIENCE security awareness security plans sensitive information sensitive systems September specific staff standards statement Subcommittee sure technical Technology term Thank things Trusted understand
Page 10 - ... means any information the loss, misuse, or unauthorized access to or modification of which could adversely affect the national interest or the conduct of Federal programs, or the privacy to which individuals are entitled under section 552a of title 5, United States Code (the Privacy Act...
Page 10 - (4) the term 'sensitive information' means any information, the loss, misuse, or unauthorized access to or modification of which could adversely affect the national interest or the conduct of Federal programs, or the privacy to which individuals are entitled under section 552a of title 5, United States Code (the Privacy Act), but which has not been specifically authorized under criteria established by an Executive order or an Act of Congress to be kept secret in the interest of national defense or...
Page 73 - Each Federal agency shall provide for the mandatory periodic training in computer security awareness and accepted computer security practice of all employees who are involved with the management, use, or operation of each Federal computer system within or under the supervision of that agency. Such training shall be— (1) provided in accordance with the guidelines developed pursuant to section 20(a)(5) of the National Bureau of Standards Act...
Page 104 - This concludes my prepared statement, Mr. Chairman. I will be pleased to answer any questions you and the Members of the Committee may have.
Page 48 - A research physicist at the National Bureau of Standards (now the National Institute of Standards and Technology) from 1951-1969, he was its director from 1 969- 1 972.
Page 1 - Washington, DC. The subcommittee met, pursuant to notice, at 9:35 am, in room 2325, Rayburn House Office Building, Hon.
Page 95 - SEC. 2. PURPOSE. (a) IN GENERAL.— The Congress declares that improving the security and privacy of sensitive information in Federal computer systems is in the public interest, and hereby creates a means for establishing minimum acceptable security practices for such systems, without limiting the scope of security measures already planned or in use.
Page 60 - ... of all existing and planned programs, materials, studies, and reports relating to computer systems security and privacy...
Page 60 - ... (B) to assure, to the maximum extent feasible, that standards developed pursuant to subsection (a) (3) and (5) are consistent and compatible with standards and procedures developed for the protection of information in Federal computer systems which is authorized under criteria established by Executive order or an Act of Congress to be kept secret in the interest of national defense or foreign policy.
Page 10 - ... (10) through (13). Security. Security of information systems means both the protection of information while it is within the systems and also the assurance that the systems do exactly what they are supposed to do and nothing more. Information system security entails management controls to ensure the integrity of operations including such matters as proper access to the information in the systems and proper handling of input and output. In this sense, security of information systems is first and...