Information Security


Book Description

The U.S. Government Accountability Office (GAO) is an independent agency that works for Congress. The GAO watches over Congress, and investigates how the federal government spends taxpayers dollars. The Comptroller General of the United States is the leader of the GAO, and is appointed to a 15-year term by the U.S. President. The GAO wants to support Congress, while at the same time doing right by the citizens of the United States. They audit, investigate, perform analyses, issue legal decisions and report anything that the government is doing. This is one of their reports.




Information Security


Book Description

Information Security: Progress Made, But Challenges Remain to Protect Federal Systems and the Nation's Critical Infrastructures




Information Security


Book Description




Information Security


Book Description




Cybersecurity: Continued Efforts Are Needed to Protect Information Systems Form Evolving Threats


Book Description

Pervasive and sustained cyber attacks continue to pose a potentially devastating threat to the systems and operations of the fed. government. In recent months, fed. officials have cited the continued efforts of foreign nations and criminals to target government and private sector networks; terrorist groups have expressed a desire to use cyber attacks to target the U.S.; and press accounts have reported attacks on the Web sites of government agencies. This statement describes: (1) cyber threats to fed. information systems and cyber-based critical infrastructures; (2) control deficiencies at fed. agencies that make these systems and infrastructures vulnerable to cyber threats; and (3) opportunities that exist for improving fed. cybersecurity.




High-risk Series


Book Description




Cybersecurity: Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats


Book Description

Pervasive and sustained cyber attacks continue to pose a potentially devastating threat to the systems and operations of the fed. gov¿t. Many nation states, terrorist networks, and organized criminal groups have the capability to target elements of the U.S. info. infrastructure for intelligence collection, intellectual property theft, or disruption. The dependence of fed. agencies on info. systems to carry out essential, everyday operations can make them vulnerable to an array of cyber-based risks. This statement describes: (1) cyber threats to fed. info. systems and cyber-based critical infrastructures; (2) control deficiencies that make fed. systems vulnerable to those threats; and (3) opportunities that exist for improving fed. cybersecurity.




Critical infrastructure protection significant challenges in safeguarding government and privately controlled systems from computerbased attacks


Book Description

I am pleased to be here today to discuss efforts to protect federal agency information systems and our nation's critical computer-dependent infrastructures. Federal agencies, and other public and private entities, rely extensively on computerized systems and electronic data to support their missions. Accordingly, the security of these systems and data is essential to avoiding disruptions in critical operations, data tampering, fraud, and inappropriate disclosure of sensitive information. Further, as the Comptroller General stated in testimony last week, protecting against computer-based attacks on critical infrastructures is an important aspect of homeland security.