Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Books Books 41 - 46 of 46 on Federal computer system identified by that agency pursuant to subsection (a) that....
" Federal computer system identified by that agency pursuant to subsection (a) that is commensurate with the risk and magnitude of the harm resulting from the loss, misuse, or unauthorized access to or modification of the information contained in such system. "
Implementation of the Computer Security Act (Public Law 100-235): Hearing ... - Page 51
by United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Transportation, Aviation, and Materials - 1990 - 176 pages
Full view - About this book

Guide to HIPAA Security and the Law

Stephen S. Wu - Law - 2007 - 324 pages
...magnitude of the loss caused by a threat. "Adequate security" means security commensurate with the risk magnitude of the harm resulting from the loss, misuse, or unauthorized access to or modification of information. This analysis includes assuring that systems and applications operate effectively and...
Limited preview - About this book

National Security Issues in Science, Law, and Technology

Thomas A. Johnson - Law - 2016 - 680 pages
...Security Management Act of 2002, agencies will identify and provide information security protections commensurate with the risk and magnitude of the harm resulting from the unauthorized access, use, disclosure, disruption, modification, or destruction of information. Coordination...
Limited preview - About this book

Understanding, Assessing, and Responding to Terrorism: Protecting Critical ...

Brian T. Bennett - Political Science - 2007 - 466 pages
...Security Management Act of 2002, agencies will identify and provide information security protections commensurate with the risk and magnitude of the harm resulting from the unauthorized access, use, disclosure, disruption, modification, or destruction of information. Coordination...
Limited preview - About this book

Oracle Identity Management: Governance, Risk, and Compliance Architecture ...

Marlin B. Pohlman - Computers - 2008 - 552 pages
...privacy of each federal computer system identified by that agency, pursuant to subsection (a), that is commensurate with the risk and magnitude of the harm...to or modification of the information contained in such system. Public Law 93-579 (Privacy Act of 1974) — The purpose of this act is to provide certain...
Limited preview - About this book

Building and Implementing a Security Certification and Accreditation Program ...

Patrick D. Howard - Computers - 2005 - 344 pages
...application as "an application that requires special attention to security due to the risk and magnitude of harm resulting from the loss, misuse, or unauthorized access to or modification of the information in the application." These definitions help us to focus on the discrete elements of an organization's...
Limited preview - About this book

Information security Department of Homeland Security needs to fully ...

...operations. A major application is one that requires special attention due to the risk and magnitude of harm resulting from the loss, misuse, or unauthorized access to or modification of the information in the application. A general support system is an interconnected set of information resources under...
Full view - About this book




  1. My library
  2. Help
  3. Advanced Book Search
  4. Download EPUB
  5. Download PDF