Computer Security: Hearing Before the Subcommittee on Technology and Competitiveness of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Second Congress, First Session, June 27, 1991, Volume 4

Front Cover
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Other editions - View all

Common terms and phrases

Popular passages

Page 125 - Materials, a major international society for the development of voluntary standards for materials, products, systems, and services. His awards include both the Gold and Silver Medals of the Department of Commerce, the William A. Jump Award for Exceptional Achievement in Public Administration, the Federal Government Meritorious Executive Award, and the Roger W. Jones Award for Executive Leadership. Mr. Kammer received his Bachelor of Arts degree from the University of Maryland in 1969.
Page 125 - Kammer has chaired several important evaluation committees for the Department of Commerce, including reviews of satellite systems for weather monitoring and the US LANDSAT program, and...
Page 127 - Council studied the issue and reported that "as computer systems become more prevalent, sophisticated, embedded in physical processes and interconnected, society becomes more vulnerable to poor system design, accidents that disable systems, and attacks on computer systems.
Page 156 - Federal computer system identified by that agency pursuant to subsection (a) that is commensurate with the risk and magnitude of the harm resulting from the loss, misuse, or unauthorized access to or modification of the information contained in such system.
Page 104 - Departmental computer security programs, and (2) report the computer security deficiencies as a material internal control weakness under the Federal Managers
Page 4 - ... and financial services. They are used to store vital information, from medical records to business plans to criminal records. Although we trust them, they are vulnerable — to the effects of poor design and insufficient quality control, to accident, and perhaps most alarmingly, to deliberate attack. The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb.
Page 145 - Guidance for Preparation of Security Plans for Federal Computer Systems That Contain Sensitive Information,
Page 25 - I thank the chairman and the members of this committee for their patience.
Page 15 - Association desires a new climate in meeting conservation and recreation needs — one of mutual and amicable efforts on the part of both the Government and the private sector. The bankruptcy of the present climate is clear. We are not alone in advocating a change in climate. Industry and government alike see its necessity. May I insert a portion of our recent "Legislative Review"?
Page 32 - I am here as a member of the Computer Systems Security and Privacy Advisory Board (hereafter, the Board), established by the CSA.

Bibliographic information