How Secure is Sensitive Commerce Department Data and Operations?: A Review of the Department's Computer Security Policies and Practices : Hearing Before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, First Session, August 3, 2001, Volume 4 |
Other editions - View all
Common terms and phrases
access controls adequate agencies audit trail BODMAN bureaus we reviewed BURR BXA personnel Chairman TAUZIN Chief Information Officer Commerce bureaus Commerce Office computer security computer security policies computer systems configured critical infrastructure protection DACEY database administrator denial-of-service attack Department of Commerce department-wide detected developing documented ECASS employees ensure evaluation Federal files Final Report IPE-11488 FRAZIER functions GREENWOOD hackers identification numbers identified implemented improve information security manager information security program information systems Information Technology Inspector General Final interconnectivity Internet intrusions issues NIST NOAA Office of Inspector OMB Circular A-130 operating system operating unit CIO oversight passwords penetration testing performed problems procedures Pyke recommendations Report IPE-11488 June requirements risk assessments Secretary security awareness security controls security officer security plans security policies security reviews security weaknesses sensitive data sensitive information sensitive systems seven bureaus specific system administrator Task Force U.S. Department updated users vulnerabilities web bugs