The Computer Security Enhancement Act of 1997 to Amend the National Institute of Standards and Technology Act to Enhance the Ability of the National Institute of Standards and Technology to Improve Computer Security, and for Other Purposes: Hearing Before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Fifth Congress, First Session, June 19, 1997, Volume 4 |
Other editions - View all
Common terms and phrases
Advanced Encryption Standard algorithm assistance Bachula Bidzos bill Chairwoman civil agencies civilian agencies Clipper Chip commercial products Computer Security Act Computer Security Enhancement computer security standards Computer System Security Congress cryptography policy CSEA CSSPAB Data Encryption Standard Defense Diffie Digital Signature Standard efforts EHLERS electronic commerce encryption products encryption technologies Escrowed Encryption Standard evaluation export control federal agencies Federal Government FIPS foreign availability going guidelines implementation important industry information security information technology input Institute of Standards Internet issues key escrow legislation MORELLA National Institute National Security Agency networks NIST NIST's Privacy Advisory Board private sector problem promote protect public key infrastructure question recognized recommendations requires NIST responsibility role Rotenberg RSA Data Security Secretary of Commerce Section Security and Privacy Security Enhancement Act security products Standards and Technology Sun Microsystems Thank things Trusted Information Systems users Walker
Popular passages
Page 33 - TA fulfills its broad responsibilities through its three component organizations: the Office of Technology Policy, the National Institute of Standards and Technology, and the National Technical Information Service.
Page 97 - (b) The duties of the Board shall be— "(1) to identify emerging managerial, technical, administrative, and physical safeguard issues relative to computer systems security and privacy...
Page 72 - ... including but not limited to research, development, evaluation, or endorsement. 4. Establish the standards and endorse products for application to secure systems covered in 10 USC Section 2315 (the Warner Amendment) 5. Upon request by Federal agencies, their contractors and other government-sponsored entities, conduct assessments of the hostile intelligence threat to federal information systems, and provide technical assistance and recommend endorsed products for application to secure systems...
Page 16 - MIS m 10 1 House of Representatives and the Committee on Com2 merce, Science, and Transportation of the Senate a report 3 setting forth the findings, conclusions, and recommenda4 tions of the National Research Council for public policy 5 related to public key infrastructures for use by individuals, 6 businesses, and government. Such report shall be sub7 mitted in unclassified form. 8 (e) AUTHORIZATION OK APPROPRIATIONS.
Page 24 - Just as in the private sector, many federal agencies are reluctant to make the investments required in this area [of computer security] because of limited budgets, lack of direction and prioritization from senior officials, and general ignorance of the threat. " - Statement of Gary R. Bachula, Acting Under Secretary for Technology, Department of Commerce, before House Science Subcommittee on Technology, June 19, 1997 Unfortunately, federal agencies are not adequately protecting their systems and...
Page 71 - A research physicist at the National Bureau of Standards (now the National Institute of Standards and Technology) from 1951-1969, he was its director from 1 969- 1 972.
Page 5 - To amend the National Institute of Standards and Technology Act to enhance the ability of the National Institute of Standards and Technology to improve computer security, and for other purposes.
Page 128 - In OTA's view, both the EES and the DSS are federal standards that are part of a long-term control strategy intended to retard the general availability of "unbreakable" or "hard to break" cryptography within the United States, for reasons of national security and law enforcement. It appears that the EES is intended to complement the DSS in this overall encryption-control strategy, by discouraging future development and use of encryption without built-in law enforcement access, in favor of key-escrow...
Page 13 - USC 1511e(c)) is 19 amended — 20 (1) by striking "and" at the end of paragraph 21 (6); 22 (2) by striking the period at the end of para23 graph (7) and inserting a semicolon; and 24 (3) by adding at the end the following: 25 "(8) licensing private sector parties to operate 26 private remote sensing space systems; and...
Page 31 - I have determined that the export of encryption products described in this section could harm national security and foreign policy interests even where comparable products are or appear to be available from sources outside the United States...