Computer security -- United States
Label
Computer security -- United States
Name
Computer security
Focus
Sub focus
Actions
Incoming Resources
- External penetration test of FHFA's network and systems during 2018
- Breaking and entering, the extraordinary story of a hacker called "Alien", Jeremy N. Smith
- DHS can better mitigate the risks associated with malware, ransomware, and phishing attacks, U.S. Department of Homeland Security
- Cybersecurity for fast charging EV infrastructure, Anuj Sanghvi, Tony Markel
- Distributed energy resources: cybersecurity framework & risk manager, Tami Reynolds
- Cyber security programs for nuclear facilities
- Cyber threats and security solutions, hearing before the Committee on Energy and Commerce, House of Representatives, One Hundred Thirteenth Congress, first session, May 21, 2013
- Information security, Subcommittee post-hearing questions concerning the additional actions needed to implement reform legislation
- Information security, Code Red, Code Red II, and SirCam attacks highlight need for proactive measures, statement of Keith A. Rhodes, Chief Technologist
- Technology assessment, cybersecurity for critical infrastructure protection
- Dawn of the code war, America's battle against Russia, China, and the rising global cyber threat, John P. Carlin with Garrett M. Graff
- Cybersecurity, next steps to protect our critical infrastructure : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, second session, February 23, 2010
- Information security, progress made, but challenges remain to protect federal systems and the nation's critical infrastructures, statement of Robert F. Dacey, Director, Information Security Issues
- Information security, progress made, but weaknesses at the Internal Revenue Service continue to pose risks
- Information resources management strategic plan, FY 2006-2008
- The fifth domain, defending our country, our companies, and ourselves in the age of cyber threats, Richard A. Clarke and Robert K. Knake
- Insider threat study, illicit cyber activity in the government sector, Eileen Kowalski [and six others]
- Test results for hardware write block device, tableau T8 forensic USB bridge (USB interface)
- Breaking and entering, the extraordinary story of a hacker called "Alien", Jeremy N. Smith
- Cyber privacy, who has your data and why you should care, April Falcon Doss
- Vulnerabilities highlight the need for more effective web security management
- System and network security acronyms and abbreviations (draft), Karen Scarfone, Victoria Thompson
- Risk management for distributed energy resources, Anuj Sanghvi
- Cybersecurity, deterrence policy, Chris Jaikaran
- Cybersecurity, threats to the financial sector : hearing before the Subcommittee on Financial Institutions and Consumer Credit of the Committee on Financial Services, U.S. House of Representatives, One Hundred Twelfth Congress, first session, September 14, 2011
- Cybersecurity and cyberwar, what everyone needs to know, P.W. Singer and Allan Friedman
- BEP's computer security incident response capability needs improvement
- Protecting the public, Office of the Comptroller of the Currency's control over computers needs to be improved
- FHFA's 2019 disaster recovery exercise of its general support system was conducted as planned, but its disaster recovery procedures were missing certain required elements and included outdated information
- How to comply with the children's online privacy protection rule
- Top routinely exploited vulnerabilities
- Incidentes de seguridad de datos, qué saber, qué hacer
- Impact of blockchain delay on grid-tied solar inverter performance, preprint, Nanditha Gajanur [and four others]
- Managing cyber supply chain risk for renewable energy technologies, Kelli Urban, Jane Pusch, and Jonathan White
- Ghost in the wires, my adventures as the world's most wanted hacker, Kevin Mitnick ; with William L. Simon ; [foreword by Steve Wozniak]
- ECPA, lawful access to stored content : hearing before the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations of the Committee on the Judiciary, House of Representatives, One Hundred Thirteenth Congress, first session, March 19, 2013, Part I
- Information security, continued efforts needed to fully implement statutory requirements : statement of Robert F. Dacey, Director, Information Security Issues, before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census, House Committee on Government Reform, United States General Accounting Office
- Information security, further efforts needed to fully implement statutory requirements in DOD : statement of Robert F. Dacey, Director, Information Security Issues, before the Subcommittee on Terrorism, Unconventional Threats and Capabilities, Committee on Armed Services, House of Representatives, United States General Accounting Office
- Information security, additional actions needed to fully implement reform legislation, United States General Accounting Office
- Protecting the public, Treasury departmental offices' control over computers needs to be improved
- Protecting the public, Financial Management Service's control over computers needs to be improved
- Personal information, data breaches are frequent, but evidence of resulting identity theft is limited; however, the full extent is unknown : report to congressional requesters
- Guide to NIST information security documents
- Test results for mobile device acquisition tool, Susteen DataPilot Secure View 1.8.0
- National Cyber Awareness System, Cybersecurity & Infrastructure Security Agency
- 21 steps to improve cyber security of SCADA networks, [President's Critical Infrastructure Protection Board and the Department of Energy]
- Timely actions needed to improve DOT's cybersecurity, Department of Transportation, prepared by the Office of Inspector General, U.S. Department of Transportation
- How to comply with the children's online privacy protection rule
- Cybercrime, an overview of the Federal Computer Fraud and Abuse Statute and related federal criminal laws, Charles Doyle
- DHS needs to improve cybersecurity workforce planning, Office of Inspector General
Outgoing Resources
- Focus1
- Sub focus1