How secure is sensitive Commerce Department data and operations?: a review of the department's computer security policies and practices : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, August 3, 2001, Volumes 73-78
United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Oversight and Investigations
U.S. G.P.O., Jan 1, 2001 - Computers - 159 pages
11 pages matching Task Force in this book
Results 1-3 of 11
What people are saying - Write a review
We haven't found any reviews in the usual places.
access controls adequate agencies audit trail Bodman bureaus we reviewed Burr BXA personnel Chairman Tauzin Chief Information Officer CIO's Commerce bureaus Commerce Final Report computer security computer security policies computer systems configured Dacey database administrator Department of Commerce detected developing ECASS employees ensure evaluation export control classification Federal files financial management systems Frazier functions Greenwood hackers identification numbers identified implemented improve individual information security manager information security program information systems Information Technology Inspector General June interconnectivity Internet intrusions issues NIST NOAA Office of Inspector OMB Circular A-130 operating system operating unit CIO oversight passwords penetration testing performed problems procedures protect Pyke recommendations requirements risk assessments Secretary security awareness security controls security officer security plans security policies security reviews segregation of duties sensitive data sensitive information sensitive systems seven bureaus specific system administrator Task Force thank U.S. Department updated users vulnerabilities web bugs