Computer networks + Security measures + Government policy -- United States
Label
Computer networks + Security measures + Government policy -- United States
Name
Computer networks + Security measures + Government policy
Actions
Incoming Resources
- Subject of43
- Information technology, federal laws, regulations, and mandatory standards for securing private sector information technology systems and data in critical infrastructure sectors, [by David A. Powner]
- Framework for improving critical infrastructure cybersecurity
- Report of the President of the United States on the status of federal critical infrastructure protection activities
- Protecting Cyberspace as a National Asset Act of 2010, report of the Committee on Homeland Security and Governmental Affairs, United States Senate to accompany S. 3480, to amend the Homeland Security Act of 2002 and other laws to enhance the security and resiliency of the cyber and communications infrastructure of the United States
- Cyber Intelligence Sharing and Protection Act, report together with additional views (to accompany H.R. 624) (Including cost estimate of the Congressional Budget Office)
- Addressing the nation's cybersecurity challenges, reducing vulnerabilities requires strategic investment and immediate action : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, April 25, 2007
- Recommended security controls for federal information systems and organizations, Joint Task Force Transformation Initiative
- Cyber security, 2010, hearings before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Eleventh Congress, second session
- Protecting cyberspace, assessing the White House proposal : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Twelfth Congress, first session, May 23, 2011
- Reviewing the federal cybersecurity mission, hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Eleventh Congress, first session, March 10, 2009
- Information security, FBI needs to address weaknesses in critical network : report to the Honorable F. James Sensenbrenner Jr., House of Representatives
- Draft legislative proposal on cybersecurity, hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Twelfth Congress, first session, December 6, 2011
- Cybersecurity, threats to communications networks and public-sector responses : hearing before the Subcommittee on Communications and Technology of the Committee on Energy and Commerce, House of Representatives, One Hundred Twelfth Congress, second session, March 28, 2012
- The DHS cybersecurity mission, promoting innovation and securing critical infrastructure : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Twelfth Congress, first session, April 15, 2011
- Critical infrastructure protection strategic simulation report, report to the President's Commission on Critical Infrastructure Protection
- Examining the Homeland Security impact of the Obama administration's cybersecurity proposal, hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Twelfth Congress, first session, June 24, 2011
- Guide for security authorization of federal information systems, a security life cycle approach, Joint Task Force Transformation Initiative
- Cybersecurity, DHS's role, federal efforts, and national policy : hearing before the Committee on Homeland Security, House of Representatives, One Hundred Eleventh Congress, second session, June 16, 2010
- Recommended security controls for federal information systems, Ron Ross [and others]
- Security and privacy controls for federal information systems and organizations, Joint Task Force Transformation Initiative
- Recommended security controls for federal information systems and organizations, Joint Task Force Transformation Initiative
- Enhancing and implementing the cybersecurity elements of the sector-specific plans, joint hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology joint with the Subcommittee on Transportation Security and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, October 31, 2007
- Oversight of Executive Order 13636 and development of the cybersecurity framework, hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, July 18, 2013
- Recommended security controls for federal information systems, public draft, Ron Ross [and others]
- Transportation challenges and cybersecurity post-9/11, hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, first session, December 2, 2009
- Cyber security, hearing before the Committee on Energy and Natural Resources, United States Senate, One Hundred Eleventh Congress, first session ... May 7, 2009
- Cyber Intelligence Sharing and Protection Act, report together with minority views (to accompany H.R. 3523) (including cost estimate of the Congressional Budget Office)
- 2008-2015 Army CIO/G-6 campaign plan, delivering a joint net-centric information enterprise
- Private sector perspectives on Department of Defense information technology and cybersecurity activities, hearing before the Subcommittee on Terrorism, Unconventional Threats, and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Eleventh Congress, second session, hearing held February 25, 2010
- Improving critical infrastructure cybersecurity, Executive Order 13636, preliminary cybersecurity framework
- Cybersecurity activities at NIST's Information Technology Laboratory, hearing before the Subcommittee on Technology and Innovation, Committee on Science and Technology, House of Representatives, One Hundred Eleventh Congress, first session, October 22, 2009
- Critical infrastructure protection, challenges for selected agencies and industry sectors
- Guidelines for the secure deployment of IPv6, recommendations of the National Institute of Standards and Technology, Sheila Frankel [and others]
- Cyberspace operations, United States Air Force
- Hacking the homeland, investigating cybersecurity vulnerabilities at the Department of Homeland Security : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, June 20, 2007
- Critical infrastructure protection, challenges in addressing cybersecurity : testimony before the Subcommittee on Federal Financial Management, Government Information, and International Security, Senate Committee on Homeland Security and Governmental Affairs, statement of David A. Powner
- Cyber security, protecting your small business : hearing before the Subcommittee on Healthcare and Technology of the Committee on Small Business, United States House of Representatives, One Hundred Twelfth Congress, first session, hearing held December 1, 2011
- Guide for assessing the security controls in federal information systems, building effective security assessment plans, Ron Ross [and others]
- Recommended security controls for federal information systems and organizations, [Ron Ross [and others]]
- Guidelines for the secure deployment of IPv6 (draft), recommendations of the National Institute of Standards and Technology, Sheila Frankel, Richard Graveman, John Pearce
- National strategy for trusted identities in cyberspace, enhancing online choice, efficiency, security, and privacy
- Cybersecurity, preventing terrorist attacks and protecting privacy in cyberspace : hearing before the Subcommittee on Terrorism and Homeland Security of the Committee on the Judiciary, United States Senate, One Hundred Eleventh Congress, second [i.e. first session], November 17, 2009
- Digital warriors, improving military capabilities for cyber operations : hearing before the Subcommittee on Emerging Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, second session, hearing held July 25, 2012