Implementation of the Computer Security Act (Public Law 100-235)

Implementation of the Computer Security Act (Public Law 100-235)
Author :
Publisher :
Total Pages : 184
Release :
ISBN-10 : PSU:000017422147
ISBN-13 :
Rating : 4/5 (47 Downloads)

Synopsis Implementation of the Computer Security Act (Public Law 100-235) by : United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Transportation, Aviation, and Materials

Implementation of the Computer Security Act

Implementation of the Computer Security Act
Author :
Publisher :
Total Pages : 152
Release :
ISBN-10 : PSU:000015446268
ISBN-13 :
Rating : 4/5 (68 Downloads)

Synopsis Implementation of the Computer Security Act by : United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Transportation, Aviation, and Materials

Computer Security Act of 1987

Computer Security Act of 1987
Author :
Publisher :
Total Pages : 24
Release :
ISBN-10 : PSU:000020344696
ISBN-13 :
Rating : 4/5 (96 Downloads)

Synopsis Computer Security Act of 1987 by : United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Technology and Competitiveness

Information Security and Privacy in Network Environments

Information Security and Privacy in Network Environments
Author :
Publisher : United States Congress
Total Pages : 252
Release :
ISBN-10 : UCR:31210011107149
ISBN-13 :
Rating : 4/5 (49 Downloads)

Synopsis Information Security and Privacy in Network Environments by :

The use of information networks for business and government is expanding enormously. Government use of networks features prominently in plans to make government more efficient, effective, and responsive. But the transformation brought about by the networking also raises new concerns for the security and privacy of networked information. This Office of Technology Assessment (OTA) report was requested by the Senate Committee on Governmental Affairs and the House Subcommittee on Telecommunications and Finance. The report begins with background information and an overview of the current situation, a statement of the problems involved in safeguarding unclassified networked information, and a summary of policy issues and options. The major part of the report is then devoted to detailed discussions of policy issues in three areas: (1) cryptography policy, including federal information processing standards and export controls; (2) guidance on safeguarding unclassified information in federal agencies; and (3) legal issues and information security, including electronic commerce, privacy, and intellectual property. Appendices include Congressional letters of request; the Computer Security Act and related documents; evolution of the digital signature standard; and lists of workshop participants, reviews, and other contributors. An index is provided. A separately published eight-page OTA Report Summary is included. (JLB).

Military and Civilian Control of Computer Security Issues

Military and Civilian Control of Computer Security Issues
Author :
Publisher :
Total Pages : 324
Release :
ISBN-10 : PURD:32754076883697
ISBN-13 :
Rating : 4/5 (97 Downloads)

Synopsis Military and Civilian Control of Computer Security Issues by : United States. Congress. House. Committee on Government Operations. Legislation and National Security Subcommittee

Federal Cloud Computing

Federal Cloud Computing
Author :
Publisher : Syngress
Total Pages : 538
Release :
ISBN-10 : 9780128096871
ISBN-13 : 012809687X
Rating : 4/5 (71 Downloads)

Synopsis Federal Cloud Computing by : Matthew Metheny

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis. This updated edition will cover the latest changes to FedRAMP program, including clarifying guidance on the paths for Cloud Service Providers to achieve FedRAMP compliance, an expanded discussion of the new FedRAMP Security Control, which is based on the NIST SP 800-53 Revision 4, and maintaining FedRAMP compliance through Continuous Monitoring. Further, a new chapter has been added on the FedRAMP requirements for Vulnerability Scanning and Penetration Testing. - Provides a common understanding of the federal requirements as they apply to cloud computing - Offers a targeted and cost-effective approach for applying the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) - Features both technical and non-technical perspectives of the Federal Assessment and Authorization (A&A) process that speaks across the organization

Issue Update on Information Security and Privacy in Network Environments

Issue Update on Information Security and Privacy in Network Environments
Author :
Publisher : DIANE Publishing
Total Pages : 156
Release :
ISBN-10 : 0788124919
ISBN-13 : 9780788124914
Rating : 4/5 (19 Downloads)

Synopsis Issue Update on Information Security and Privacy in Network Environments by : DIANE Publishing Company

Update of the 1994 report "Information Security and Privacy in Network Environments". Updates and develops issues in three areas: national cryptography policy, guidance on safeguarding unclassified information in federal agencies, and legal issues and information security, including electronic commerce, privacy, and intellectual property. Appendix includes: U.S. Export Controls on Cryptography, and Federal Information Security and the Computer Security Act. Charts and tables.