Information security : serious weaknesses place critical federal operations and assets at risk : report to the Committee on Governmental Affairs, U.S. Senate /
| Corporate Author: | United States. General Accounting Office |
|---|---|
| Format: | Government Document Microform Book |
| Language: | English |
| Published: |
Washington, D.C. (P.O. Box 37050, Washington 20013) :
The Office,
[1998]
|
| Subjects: | |
| Online Access: | Adobe Acrobat Reader required |
Similar Items
Information security : serious and widespread weaknesses persist at federal agencies : report to the Chairman, Subcommittee on Government Management, Information and Technology, Committee on Government Reform, House of Representatives /
Published: (2000)
Published: (2000)
Information security : strengthened management needed to protect critical federal operations and assets : statement of Gene L. Dodaro, Assistant Comptroller General, Accounting and Information Management Division, before the Committee on Governmental Affairs, U.S. Senate /
by: Dodaro, Gene L.
Published: (1998)
by: Dodaro, Gene L.
Published: (1998)
Computer security : improvements needed to reduce risk to critical federal operations and assets /
by: Dacey, Robert F.
Published: (2001)
by: Dacey, Robert F.
Published: (2001)
Information security, federal agencies need to enhance responses to data breaches : testimony before the Committee on Homeland Security and Governmental Affairs, U.S. Senate /
by: Wilshusen, Gregory C.
Published: (2014)
by: Wilshusen, Gregory C.
Published: (2014)
Information security : federal agency efforts to encrypt sensitive information are under way, but work remains : report to congressional requesters.
Published: (2008)
Published: (2008)
H.R. 3844, the Federal Information Security Management Act of 2002 : hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, second session on H.R. 3844 to strengthen federal government information security, including through the requirement for the development of mandatory information security risk management standards, May 2, 2002.
Published: (2003)
Published: (2003)
H.R. 3844, the Federal Information Security Management Act of 2002 : hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, second session on H.R. 3844 to strengthen federal government information security, including through the requirement for the development of mandatory information security risk management standards, May 2, 2002.
Published: (2003)
Published: (2003)
Information security : Subcommittee post-hearing questions concerning the additional actions needed to implement reform legislation.
by: Dacey, Robert F.
Published: (2002)
by: Dacey, Robert F.
Published: (2002)
Federal information security : actions needed to address widespread weaknesses : statement of Jack L. Brock, Jr., Director, Governmentwide and Defense Information Systems, Accounting and Information Management Division, before the Subcommittee on Government Management, Information, and Technology, Committee on Government Reform, House of Representatives /
by: Brock, Jack L.
Published: (2000)
by: Brock, Jack L.
Published: (2000)
Information security : fundamental weaknesses place EPA data and operations at risk : statement of David L. McClure, Associate Director, Governmentwide and Defense Information Systems, Accounting and Information Management Division /
by: McClure, David L.
Published: (2000)
by: McClure, David L.
Published: (2000)
Federal computer security : an analysis of congressional initiatives and executive branch responsibilities /
Published: (1983)
Published: (1983)
Federal Cybersecurity Enhancement Act of 2015 : report of the Committee on Homeland Security and Governmental Affairs, United States Senate, to accompany S. 1869 , to improve federal network security and authorize and enhance an existing intrusion detection and prevention system for civilian federal networks.
Published: (2016)
Published: (2016)
Information security : additional actions needed to fully implement reform legislation /
Published: (2002)
Published: (2002)
Computer security in the Federal Government : how do the agencies rate? : hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, second session, November 19, 2002.
Published: (2003)
Published: (2003)
Computer security in the federal government : how do the agencies rate? : hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, first session, November 9, 2001.
Published: (2002)
Published: (2002)
Computer security in the federal government : how do the agencies rate? : hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, first session, November 9, 2001.
Published: (2002)
Published: (2002)
Computer security in the Federal Government : how do the agencies rate? : hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, second session, November 19, 2002.
Published: (2003)
Published: (2003)
Computer security : critical federal operations and assets remain at risk : statement of Joel C. Willemssen, Director, Civil Agencies Information Systems, Accounting and Information Management Division, before the Subcommittee on Government Management, Information and Technology, Committee on Government Reform, House of Representatives /
by: Willemssen, Joel C.
Published: (2000)
by: Willemssen, Joel C.
Published: (2000)
Information security : weak controls place Interior's financial and other data at risk : report to the secretary of the Interior /
Published: (2001)
Published: (2001)
Information security : "ILOVEYOU" Computer virus emphasizes critical need for agency and governmentwide improvements : statement of Keith A. Rhodes, Director, Office of Computer and Information Technology Assessment, Accounting and Information Management Division, before the Subcommittee on Technology, Committee on Science, House of Representatives /
by: Rhodes, Keith A.
Published: (2000)
by: Rhodes, Keith A.
Published: (2000)
Weak computer security in government : is the public at risk? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Fifth Congress, second session, May 19, 1998.
Published: (1998)
Published: (1998)
No computer system left behind : a review of the federal government's D+ information security grade : hearing before the Committee on Government Reform, House of Representatives, One Hundred Ninth Congress, first session, April 7, 2005.
Published: (2005)
Published: (2005)
No computer system left behind : a review of the federal government's D+ information security grade : hearing before the Committee on Government Reform, House of Representatives, One Hundred Ninth Congress, first session, April 7, 2005.
Published: (2005)
Published: (2005)
FY ... report to Congress on implementation of the Federal Information Security Management Act of 2002.
Information security : weaknesses continue amid new federal efforts to implement requirements : report to congressional committees.
Published: (2011)
Published: (2011)
Federal Information Security Modernization Act of 2014 : report of the Committee on Homeland Security and Governmental Affairs, United States Senate, to accompany S. 2521, to amend chapter 35 of title 44, United States Code, to provide for reform to federal information security.
Published: (2014)
Published: (2014)
Improvements needed to secure it assets at EPA-owned research facilities /
Published: (2013)
Published: (2013)
Making federal computers secure : overseeing effective information security management : third report /
Published: (2002)
Published: (2002)
Information Security : Agencies Need To Develop and Implement Adequate Policies for Periodic Testing.
Published: (2006)
Published: (2006)
Information security : fundamental weaknesses place EPA data and operations at risk : report to the Chairman, Committee on Commerce, House of Representatives /
Published: (2000)
Published: (2000)
Enhancing computer security : what tools work best : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, March 29, 2000.
Published: (2001)
Published: (2001)
Enhancing computer security : what tools work best : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, March 29, 2000.
Published: (2001)
Published: (2001)
Information Security : IRS Needs To Address Pervasive Weaknesses.
Published: (2008)
Published: (2008)
Information Security : Improving Oversight of Access to Federal Systems and Data by Contractors Can Reduce Risk.
Published: (2005)
Published: (2005)
Information security : agencies continue to report progress, but need to mitigate persistent weaknesses : report to congressional committees.
Published: (2009)
Published: (2009)
The security risk assessment handbook : a complete guide for performing security risk assessments /
by: Landoll, Douglas J.
Published: (2011)
by: Landoll, Douglas J.
Published: (2011)
Computer Security Act of 1987 : report /
Published: (1992)
Published: (1992)
ECHO data quality audit, phase I results : the integrated compliance information system needs security controls to protect significant non-compliance data.
Published: (2009)
Published: (2009)
Sample statements of work for federal computer security services : for use in-house or contracting out /
Published: (1992)
Published: (1992)
Information security : further efforts needed to address serious weaknesses at USDA.
Published: (2004)
Published: (2004)