Implementation of the Computer Security Act (Public Law 100-235): Hearing Before the Subcommittee on Transportation, Aviation, and Materials of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred First Congress, Second Session, July 10, 1990, Volume 4
United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Transportation, Aviation, and Materials
U.S. Government Printing Office, 1990 - Administrative agencies - 176 pages
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
able activities agencies applications assistance awareness believe BROCK Chairman committee companies completed Computer Security Act computer security planning computer systems concern continue controls correct countries criteria Department direction effective efforts electronic established European evaluation existing export export control fact Federal foreign funding going Government guidance happen hearing identified implementation important improve industry information systems interest involved issue it's limited look MACRAE major means moving national security NIST Office operating organizations policies prepared prevent problem progress protection question requirements responsibilities result risk security planning sensitive information SHAYS specific standards statement STOLL Subcommittee submitted technical testimony Thank things TORRICELLI Treasury trusted systems trying understand United users vendors
Page 48 - Federal function; (4) the term "sensitive information" means any information, the loss, misuse, or unauthorized access to or modification of which could adversely affect the national interest or the conduct of Federal programs, or the privacy to which individuals are entitled under section 552a of title 5, United States Code (the Privacy Act), but which has not been specifically authorized under criteria established by an Executive order or an Act of Congress to be kept secret in the interest of...
Page 71 - ... involves intelligence activities; involves cryptologic activities related to national security; involves command and control of military forces; involves equipment that is an integral part of a weapon or weapons system; or is critical to the direct fulfillment of military or intelligence missions...
Page 51 - Federal computer system identified by that agency pursuant to subsection (a) that is commensurate with the risk and magnitude of the harm resulting from the loss, misuse, or unauthorized access to or modification of the information contained in such system.
Page 71 - Security means protection afforded to telecommunications and automated information systems, in order to prevent exploitation through interception, unauthorized electronic access, or related technical intelligence threats, and to ensure authenticity. Such protection results from the application of security measures (including cryptosecurity, transmission security, emission security, and computer security) to systems which generate, store, process, transfer, or communicate information of use to an...
Page 141 - Standards responsibility for developing standards and guidelines for Federal computer Systems, including responsibility for developing standards and guidelines needed to assure the costeffective security and privacy of sensitive information in Federal computer systems...
Page 29 - NIAP is a collaboration between the National Institute of Standards and Technology (NIST) and the National Security Agency (NSA) in fulfilling their respective responsibilities under the Computer Security Act of 1987.
Page 152 - Director of the National Institute of Standards and Technology (NIST) , formerly the National Bureau of Standards, for all arrangements within the scope of that organization's program responsibility.
Page 69 - It is intended to assure full participation and cooperation among the various existing centers of technical expertise throughout the Executive Branch, to promote a coherent and coordinated defense against the hostile intelligence threat to these systems, and to foster an appropriate partnership between government and the private sector in attaining these goals. This Directive specifically recognizes the special requirements for protection of intelligence...
Page 69 - Policy for the Security of National Security Telecommunications and Information Systems) Continuing advances in microelectronics technology have stimulated an unprecedented growth in the demand for and supply of telecommunications and information processing services within the government and throughout the private sector. As new technologies have been applied, traditional distinctions between telecommunications and information systems have begun to disappear.