H.R. 285: Department of Homeland Security Cybersecurity Enhancement Act of 2005 : Hearing Before the Subcommittee on Economic Security, Infrastructure Protection, and Cybersecurity of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, First Session, April 20, 2005

Front Cover
FOG Version 4.0. 3rd revision. Contains information on general responsibilities for disaster responders, formats and eference material for assessing and reporting on populations at risk, Disaster Assistance Response Team (DART) position descriptions and duty checklists, descriptions of Office of U.S. Foreign Disaster Assistance (OFDA) stockpile commodities, general information related to disaster activities, information on working with the military in the field, and a glossary of acronyms and terms used by OFDA and other organizations with whicy OFDA works.
 

Other editions - View all

Common terms and phrases

Popular passages

Page 44 - NCS shall be to assist the President, the National Security Council, the Director of the Office of Science and Technology Policy and the Director of the Office of Management and Budget in...
Page 32 - ... 7. Establish improved coordination procedures across all critical infrastructures and with federal, state, and local government when events occur. Coordination in planning and response between the private sector and public emergency management is inadequate and/or inconsistent. For example, a virtual national command center for the private sector that links to the Homeland Security Operations Center would help to provide consistency.
Page 41 - ... communications. VeriSign." Through our Intelligent Infrastructure Services, we enable businesses and individuals to find, connect, secure, and transact across today's complex Internet, telecom, and converged networks. We operate the systems that manage .com and .net, handling 14-billion Web addresses and emails every day. We run one of the largest telecom signaling networks in the world, enabling services such as cellular roaming, text messaging, caller ID, and multimedia messaging. We manage...
Page 28 - Critical infrastructure industries and the public need to have an understanding of the scope and cause as early as possible when a major event occurs. During the August 2003 blackout, the announcement that the problem was not the result of a terrorist event alleviated public concerns and made for orderly execution of business continuity processes. If it had been a terrorist event, other communications and directives such as "shields up" — in which external communications to institutions are blocked...
Page 29 - ... example, the government should ensure that critical telecom circuits are adequately protected and that redundancy and diversity in the telecommunications networks assured. 6. Invest in the power grid because of its critical and cascading impact on other industries and other critical infrastructures. The power grid must be considered among the most vital of critical infrastructures and needs investment to make sure it works across the nation. 7. Establish improved coordination procedures across...
Page 20 - Government, providing specific warning information, and advice about appropriate protective measures and countermeasures, to State and local government agencies and authorities, the private sector, other entities, and the public.
Page 28 - Diverse and resilient communication channels are essential. Diverse elements — such as cell phones, wireless email devices, landline phones, and the Internet — are required. Both diversity and redundancy are needed within critical infrastructures to assure backup systems are operable and continuity of services will be maintained.
Page 20 - Federal actions to secure cyberspace are warranted for purposes including: forensics and attack attribution, protection of networks and systems critical to national security, indications and warnings, and protection against organized attacks capable of inflicting debilitating damage to the economy.
Page 12 - STATEMENT OF HARRIS N. MILLER, PRESIDENT, INFORMATION TECHNOLOGY ASSOCIATION OF AMERICA Mr. MILLER. Thank you, Mr. Chairman and Members of the Committee.
Page 29 - toolkit" with software security business requirements, sample procurement language, and talking points for discussing security issues with IT vendors was distributed to 400 BITS and Roundtable member company executives.

Bibliographic information