Computer Security: Hearing Before the Subcommittee on Technology and Competitiveness of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Second Congress, First Session, June 27, 1991, Volume 4
United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Technology and Competitiveness
U.S. Government Printing Office, 1991 - Computer networks - 157 pages
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
able actions activities agencies awareness become Board Chairman Committee companies computer security Computer Security Act computer systems concerns concludes consider continue crime criteria Department discuss effective efforts electronic established evaluation existing export fact Federal follows function GLICKMAN going Government hackers happen hearing identified implementation important improve individual industry information exchange interest issue Justice kind mean meeting national security network security NIST NS/EP NSTAC Office operational organizations panel plans potential problem procedures protection questions recommendations requirements response result risk role Schwartau sector sensitive information specific standards statement steps Subcommittee switched talk task force technical techniques telecommunications Thank things threat tion trusted United users visits vulnerabilities WALKER weaknesses
Page 125 - Materials, a major international society for the development of voluntary standards for materials, products, systems, and services. His awards include both the Gold and Silver Medals of the Department of Commerce, the William A. Jump Award for Exceptional Achievement in Public Administration, the Federal Government Meritorious Executive Award, and the Roger W. Jones Award for Executive Leadership. Mr. Kammer received his Bachelor of Arts degree from the University of Maryland in 1969.
Page 127 - Council studied the issue and reported that "as computer systems become more prevalent, sophisticated, embedded in physical processes and interconnected, society becomes more vulnerable to poor system design, accidents that disable systems, and attacks on computer systems.
Page 156 - Federal computer system identified by that agency pursuant to subsection (a) that is commensurate with the risk and magnitude of the harm resulting from the loss, misuse, or unauthorized access to or modification of the information contained in such system.
Page 104 - Departmental computer security programs, and (2) report the computer security deficiencies as a material internal control weakness under the Federal Managers
Page 4 - ... and financial services. They are used to store vital information, from medical records to business plans to criminal records. Although we trust them, they are vulnerable — to the effects of poor design and insufficient quality control, to accident, and perhaps most alarmingly, to deliberate attack. The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb.
Page 145 - Guidance for Preparation of Security Plans for Federal Computer Systems That Contain Sensitive Information,
Page 25 - I thank the chairman and the members of this committee for their patience.
Page 15 - Association desires a new climate in meeting conservation and recreation needs — one of mutual and amicable efforts on the part of both the Government and the private sector. The bankruptcy of the present climate is clear. We are not alone in advocating a change in climate. Industry and government alike see its necessity. May I insert a portion of our recent "Legislative Review"?