Information Security

Information Security
Author: U.s. Government Accountability Office
Publisher: Createspace Independent Publishing Platform
Total Pages: 54
Release: 2017-07-28
Genre:
ISBN: 9781973962380

" Small federal agencies-generally those with 6,000 or fewer employees-are, like larger agencies, at risk from threats to information systems that support their operations and the information they contain, which can include personally identifiably information. Federal law and policy require small agencies to meet information security and privacy requirements and assign responsibilities to OMB for overseeing agencies' activities. OMB has assigned several of these duties to DHS. GAO was asked to review cybersecurity and privacy at small agencies. The objectives of this review were to determine the extent to which (1) small agencies are implementing federal information security and privacy laws and policies and (2) OMB and DHS are overseeing and assisting small agencies in implementing their information security and privacy programs. GAO selected six small agencies with varying characteristics for review; reviewed agency documents and selected systems; and interviewed agency, OMB, and DHS officials. "

Information Security Additional Oversight Needed to Improve Programs at Small Agencies

Information Security Additional Oversight Needed to Improve Programs at Small Agencies
Author: United States Government Accountability
Publisher: CreateSpace
Total Pages: 56
Release: 2015-06-26
Genre:
ISBN: 9781511423328

Safeguarding government computer systems and sensitive information, including personally identifiable information (PII) that resides on them, is an ongoing challenge due to the complexity and interconnectivity of systems, the ease of obtaining and using hacking tools, the steady advances in the sophistication and effectiveness of attack technology, and the emergence of new and more destructive attacks. To help address this challenge, federal agencies, regardless of their size, must abide by federally mandated standards, guidelines, and requirements related to federal information systems.

Information Security

Information Security
Author: U S Government Accountability Offi Gao
Publisher:
Total Pages: 56
Release: 2019-06-20
Genre:
ISBN: 9781073870059

INFORMATION SECURITY: Additional Oversight Needed to Improve Programs at Small Agencies

Information security additional actions needed to fully implement reform legislation.

Information security additional actions needed to fully implement reform legislation.
Author:
Publisher: DIANE Publishing
Total Pages: 43
Release: 2002
Genre:
ISBN: 1428945059

In March, we testified before your subcommittee on the federal governments first-year efforts to implement legislative provisions for Government Information Security Reform (the reform provisions).1 In brief, we reported that initial implementation of the reform provisions is a significant step in improving federal agencies information security programs and addressing their serious, pervasive information security weaknesses, and has resulted in agency benefits and important actions by the administration to address information security.

Federal Information Security Issues

Federal Information Security Issues
Author: Gregory C. Wilshusen
Publisher: DIANE Publishing
Total Pages: 7
Release: 2010-08
Genre: Computers
ISBN: 1437918638

Addresses additional questions arising from the May 19, 2009, hearing on federal information security held by the Subcommittee on Government Management, Organization, and Procurement. In that hearing, there was a discussion on the current state of information security throughout the federal government and agency efforts to comply with the requirements of the Federal Information Security Management Act of 2002 (FISMA). Congress had the following two questions: (1) Comment on the need for improved cyber security relating to S.773, the proposed Cybersecurity Act of 2009; and (2) Provide recommendations to improve the Federal Information Security Management Act. This report provides the responses.

Hybrid Warfare and the Gray Zone Threat

Hybrid Warfare and the Gray Zone Threat
Author: Douglas C. Lovelace
Publisher: Oxford University Press
Total Pages: 393
Release: 2016
Genre: Law
ISBN: 0190255315

Terrorism: Commentary on Security Documents is a series that provides primary source documents and expert commentary on various topics relating to the worldwide effort to combat terrorism, as well as efforts by the United States and other nations to protect their national security interests. Volume 141, Hybrid Warfare and the Gray Zone Threat, considers the mutation of the international security environment brought on by decades of unrivaled U.S. conventional military power. The term "hybrid warfare" encompasses conventional warfare, irregular warfare, cyberwarfare, insurgency, criminality, economic blackmail, ethnic warfare, "lawfare," and the application of low-cost but effective technologies to thwart high-cost technologically advanced forces. This volume is divided into five sections covering different aspects of this topic, each of which is introduced by expert commentary written by series editor Douglas C. Lovelace, Jr. This volume contains thirteen useful documents exploring various facets of the shifting international security environment, including a detailed report on hybrid warfare issued by the Joint Special Operations University and a White Paper on special operations forces support to political warfare prepared by the U.S. Army Special Operations Command, as well as a GAO report and a CRS report covering similar topics. Specific coverage is also given to topics such as cybersecurity and cyberwarfare, the efficacy of sanctions in avoiding and deterring hybrid warfare threats, and the intersection of the military and domestic U.S. law enforcement.

TERRORISM: COMMENTARY ON SECURITY DOCUMENTS VOLUME 141

TERRORISM: COMMENTARY ON SECURITY DOCUMENTS VOLUME 141
Author: Douglas Lovelace Jr.
Publisher: Oxford University Press
Total Pages: 400
Release: 2016-02-24
Genre: Law
ISBN: 019061465X

Terrorism: Commentary on Security Documents is a series that provides primary source documents and expert commentary on various topics relating to the worldwide effort to combat terrorism, as well as efforts by the United States and other nations to protect their national security interests. Volume 141, Hybrid Warfare and the Gray Zone Threat, considers the mutation of the international security environment brought on by decades of unrivaled U.S. conventional military power. The term "hybrid warfare" encompasses conventional warfare, irregular warfare, cyberwarfare, insurgency, criminality, economic blackmail, ethnic warfare, "lawfare", and the application of low-cost but effective technologies to thwart high-cost technologically advanced forces. This volume is divided into five sections covering different aspects of this topic, each of which is introduced by expert commentary written by series editor Douglas C. Lovelace, Jr. This volume contains thirteen useful documents exploring various facets of the shifting international security environment, including a detailed report on hybrid warfare issued by the Joint Special Operations University and a White Paper on special operations forces support to political warfare prepared by the U.S. Army Special Operations Command, as well as a GAO report and a CRS report covering similar topics. Specific coverage is also given to topics such as cybersecurity and cyberwarfare, the efficacy of sanctions in avoiding and deterring hybrid warfare threats, and the intersection of the military and domestic U.S. law enforcement.

Terrorism: Commentary on Security Documents Volume 140

Terrorism: Commentary on Security Documents Volume 140
Author: Douglas Lovelace
Publisher: Oxford University Press, USA
Total Pages: 374
Release: 2015
Genre: Law
ISBN: 0199351112

Terrorism: Commentary on Security Documents is a series that provides primary source documents and expert commentary on various topics relating to the worldwide effort to combat terrorism, as well as efforts by the United States and other nations to protect their national security interests. Volume 140, The Cyber Threat considers U.S. policy in relation to cybersecurity and cyberterrorism, and examines opposing views on cybersecurity and international law by nations such as Russia and China. The documents in this volume include testimony of FBI officials before Congressional committees, as well as detailed reports from the Strategic Studies Institute/U.S. Army War College Press and from the Congressional Research Service. The detailed studies in this volume tackling the core issues of cybersecurity and cyberterrorism include: Legality in Cyberspace; An Adversary View and Distinguishing Acts of War in Cyberspace; and Assessment Criteria, Policy Considerations, and Response Implications.