Implementation of the Computer Security Act (Public Law 100-235): Hearing Before the Subcommittee on Transportation, Aviation, and Materials of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred First Congress, Second Session, July 10, 1990, Volumen4

Portada
 

Páginas seleccionadas

Otras ediciones - Ver todas

Términos y frases comunes

Pasajes populares

Página 48 - Federal function; (4) the term "sensitive information" means any information, the loss, misuse, or unauthorized access to or modification of which could adversely affect the national interest or the conduct of Federal programs, or the privacy to which individuals are entitled under section 552a of title 5, United States Code (the Privacy Act), but which has not been specifically authorized under criteria established by an Executive order or an Act of Congress to be kept secret in the interest of...
Página 71 - ... involves intelligence activities; involves cryptologic activities related to national security; involves command and control of military forces; involves equipment that is an integral part of a weapon or weapons system; or is critical to the direct fulfillment of military or intelligence missions...
Página 51 - Federal computer system identified by that agency pursuant to subsection (a) that is commensurate with the risk and magnitude of the harm resulting from the loss, misuse, or unauthorized access to or modification of the information contained in such system.
Página 152 - Lyons is a member of the National Academy of Engineering, a Fellow of the American Association for the Advancement of Science, a Fellow of the Washington Academy of Science, a member of the Naval Research Laboratory Naval Research Advisory Committee, a member of the Office of Science and Technology Policy Committee on Federal Laboratories, member of the American Chemical Society (past chairman of the St. Louis Section) and member of Sigma Xi.
Página 64 - ... (2) involves cryptologic activities related to national security; (3) involves the command and control of military forces; (4) involves equipment that is an integral part of a weapon or weapons system; or (5) subject to subsection (b), is critical to the direct fulfillment of military or intelligence missions.
Página 71 - Security means protection afforded to telecommunications and automated information systems, in order to prevent exploitation through interception, unauthorized electronic access, or related technical intelligence threats, and to ensure authenticity. Such protection results from the application of security measures (including cryptosecurity, transmission security, emission security, and computer security) to systems which generate, store, process, transfer, or communicate information of use to an...
Página 141 - Standards responsibility for developing standards and guidelines for Federal computer Systems, including responsibility for developing standards and guidelines needed to assure the costeffective security and privacy of sensitive information in Federal computer systems...
Página 29 - NIAP is a collaboration between the National Institute of Standards and Technology (NIST) and the National Security Agency (NSA) in fulfilling their respective responsibilities under the Computer Security Act of 1987.
Página 152 - Director of the National Institute of Standards and Technology (NIST) , formerly the National Bureau of Standards, for all arrangements within the scope of that organization's program responsibility.
Página 69 - It is intended to assure full participation and cooperation among the various existing centers of technical expertise throughout the Executive Branch, to promote a coherent and coordinated defense against the hostile intelligence threat to these systems, and to foster an appropriate partnership between government and the private sector in attaining these goals. This Directive specifically recognizes the special requirements for protection of intelligence...

Información bibliográfica