Search Results

Advanced search parameters have been applied.
open access

The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress

Description: This report provides background information regarding the threats and consequences of cybersecurity. The federal legislative framework for cybersecurity is complex, with more than 50 statutes addressing various aspects of it either directly or indirectly.
Date: November 8, 2013
Creator: Fischer, Eric A.; Liu, Edward C.; Rollins, John W. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to cybersecurity hearings and legislation under consideration in the 113th Congress and those considered in the 112th Congress, as well as executive orders and presidential directives, data and statistics, glossaries, and authoritative reports.
Date: August 16, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to cybersecurity hearings and legislation under consideration in the 113th Congress and those considered in the 112th Congress, as well as executive orders and presidential directives, data and statistics, glossaries, and authoritative reports.
Date: September 20, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: April 3, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability

Description: In September 2010, media reports emerged about a new form of cyber attack that appeared to target Iran, although the actual target, if any, is unknown. This report discusses this cyber attack, a malicious software program known as Stuxnet, which infected computer systems that were used to control the functioning of a nuclear power plant. Once inside the system, Stuxnet had the ability to degrade or destroy the software on which it operated. Although early reports focused on the impact on facili… more
Date: December 9, 2010
Creator: Kerr, Paul K.; Rollins, John & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: May 2, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: May 22, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: May 30, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Spyware: Background and Policy Issues for Congress

Description: The Anti-Spyware Coalition (ASC) defines spyware as "technologies deployed without appropriate user consent and/or implemented in ways that impair user control over (1) material changes that affect their user experience, privacy, or system security; (2) use of their system resources, including what programs are installed on their computers; and/or (3) collection, use, and distribution of their personal or other sensitive information. The main issue for Congress over spyware is whether to enact … more
Date: September 8, 2010
Creator: Figliola, Patricia Moloney
Partner: UNT Libraries Government Documents Department
open access

Privacy Protections for Personal Information Online

Description: This report examines some of the efforts being made to protect of personal information, through federal laws and regulations. This report provides a brief overview of selected recent developments in the area of federal privacy law. This report does not cover workplace privacy laws or state privacy laws.
Date: April 6, 2011
Creator: Stevens, Gina
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to cybersecurity hearings and legislation under consideration in the 113th Congress and those considered in the 112th Congress, as well as executive orders and presidential directives, data and statistics, glossaries, and authoritative reports.
Date: August 2, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity and Information Sharing: Legal Challenges and Solutions

Description: While considerable debate exists with regard to the best strategies for protecting America’s various cyber-systems and promoting cybersecurity, one point of general agreement amongst cyber-analysts is the perceived need for enhanced and timely exchange of cyber-threat intelligence both within the private sector and between the private sector and the government. This report examines the various legal issues that arise with respect to the sharing of cybersecurity intelligence, with a special focu… more
Date: March 16, 2015
Creator: Nolan, Andrew
Partner: UNT Libraries Government Documents Department
Back to Top of Screen