Information Security: Agencies Make Progress in Implementation of Requirements, But Significant Weaknesses Persist

Information Security: Agencies Make Progress in Implementation of Requirements, But Significant Weaknesses Persist
Author: Gregory C. Wilshusen
Publisher: DIANE Publishing
Total Pages: 16
Release: 2009-12
Genre:
ISBN: 1437917631

Without proper safeguards, fed. agencies' computer systems are vulnerable to intrusions by individuals and groups who have malicious intentions and can obtain sensitive info., commit fraud, disrupt operations, or launch attacks against other computer systems and networks. Concerned by reports of significant weaknesses in fed. systems, Congress passed the Fed. Info. Security Mgmt. Act (FISMA), which permanently authorized and strengthened info. security program, evaluation, and annual reporting requirements for fed. agencies. This is testimony on a draft report on: (1) the adequacy and effectiveness of fed. agencies' info. security policies and practices; and (2) their implementation of FISMA requirements.

Information Security: Concerted Response Needed to Resolve Persistent Weakness

Information Security: Concerted Response Needed to Resolve Persistent Weakness
Author: Gregory C. Wilshusen
Publisher: DIANE Publishing
Total Pages: 21
Release: 2010-08
Genre: Computers
ISBN: 1437931235

Without proper safeguards, fed. computer systems are vulnerable to intrusions by individuals who have malicious intentions and can obtain sensitive info. The need for a vigilant approach to info. security (IS) has been demonstrated by the pervasive and sustained cyber attacks against the U.S. Concerned by reports of weaknesses in fed. systems, Congress passed the Fed. IS Management Act (FISMA), which authorized and strengthened IS program, evaluation, and annual reporting requirements for fed. agencies. This testimony discusses fed. IS and agency efforts to comply with FISMA. It summarizes: (1) fed. agencies¿ efforts to secure info. systems and (2) opportunities to enhance fed. cybersecurity. Charts and tables.

The State of Federal Information Security

The State of Federal Information Security
Author: United States. Congress. House. Committee on Oversight and Government Reform. Subcommittee on Government Management, Organization, and Procurement
Publisher:
Total Pages: 88
Release: 2010
Genre: Computers
ISBN:

Identity Theft: Governments Have Acted to Protect Personally Identifiable Information, But Vulnerabilities Remain

Identity Theft: Governments Have Acted to Protect Personally Identifiable Information, But Vulnerabilities Remain
Author: Daniel Bertoni
Publisher: DIANE Publishing
Total Pages: 24
Release: 2009-11
Genre: Computers
ISBN: 1437918239

The loss of personally identifiable information, such as an individual's Social Security number, name, and date of birth can result in serious harm, including identity theft. Identity theft, a serious crime that impacts millions of individuals each year, occurs when such information is used without authorization to commit fraud or other crimes. While progress has been made protecting personally identifiable information in the public and private sectors, challenges remain. This testimony summarizes: (1) the problem of identity theft; (2) steps taken at the fed., state, and local level to prevent potential identity theft; and (3) vulnerabilities that remain to protecting personally identifiable information, including in fed. information systems. Illustrations.

Agencies in Peril

Agencies in Peril
Author: United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security
Publisher:
Total Pages: 216
Release: 2008
Genre: Administrative agencies
ISBN:

Upcoming Transition: Efforts to Assist the 111th Congress and the Next Administration

Upcoming Transition: Efforts to Assist the 111th Congress and the Next Administration
Author: Gene L. Dodaro
Publisher: DIANE Publishing
Total Pages: 23
Release: 2009-02
Genre: Political Science
ISBN: 1437909744

The next admin. will fill thousands of positions across gov¿t.; there will be a number of new faces in Congress as well. Making these transitions as seamlessly as possible is pivotal to effectively and efficiently help accomplish the fed. govt¿s. many essential missions. The Presidential Transition Act points to the Government Accountability Office (GAO) as a resource to incoming admin. The GAO is a source of briefings and other materials to help presidential appointees make the leap from campaigning to governing by informing them of the major mgmt. issues, risks, and challenges they will face. This testimony provides an overview of GAO¿s objectives for assisting the 111th Congress and the next admin. in their transition efforts.

Computer Security in the Federal Government

Computer Security in the Federal Government
Author: United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations
Publisher:
Total Pages: 76
Release: 2002
Genre: Computers
ISBN: