Government Information Security Reform Act Implementation PDF Download

Are you looking for read ebook online? Search for your book and save it on your Kindle device, PC, phones or tablets. Download Government Information Security Reform Act Implementation PDF full book. Access full book title Government Information Security Reform Act Implementation.

Information security additional actions needed to fully implement reform legislation.

Information security additional actions needed to fully implement reform legislation.
Author:
Publisher: DIANE Publishing
Total Pages: 43
Release: 2002
Genre:
ISBN: 1428945059

Download Information security additional actions needed to fully implement reform legislation. Book in PDF, ePub and Kindle

In March, we testified before your subcommittee on the federal governments first-year efforts to implement legislative provisions for Government Information Security Reform (the reform provisions).1 In brief, we reported that initial implementation of the reform provisions is a significant step in improving federal agencies information security programs and addressing their serious, pervasive information security weaknesses, and has resulted in agency benefits and important actions by the administration to address information security.


Information System Security: Government Information Security Reform Act Implementation: Noncombatant Evacuation Operations Tracking System

Information System Security: Government Information Security Reform Act Implementation: Noncombatant Evacuation Operations Tracking System
Author:
Publisher:
Total Pages: 31
Release: 2002
Genre:
ISBN:

Download Information System Security: Government Information Security Reform Act Implementation: Noncombatant Evacuation Operations Tracking System Book in PDF, ePub and Kindle

Public Law 106-398, Government Information Security Reform, title X, subtitle G of the Floyd D. Spence National Defense Authorization Act for FY 2001, October 30, 2000, requires that each agency obtain an independent assessment of its security posture. The Inspector General of each agency is required to evaluate the agency security posture based on a review of an independently selected subset of information systems. The DoD uses information technology for thousands of processes that are integral to support and operational functions. Mission-critical, mission-essential, and support-function processes, or applications, reside on computer systems throughout DoD. DoD selected a sample of 560 automated information systems from the almost 4,000 automated information systems in DoD. For those 560 systems, DoD developed a Government Information Security Reform Act collection matrix that was used to gather data on assessments of the effectiveness of DoD information assurance policies, procedures, and practices. DoD reported the aggregate results of the assessments for FY 2001 in GISR Report FY01: Government Information Security Reform Act, Report of the Department of Defense, October 2001. Of the 560 systems, the Office of the Inspector General of the Department of Defense; the Defense Information Systems Agency Inspector General; and Military Department Audit Agencies assessed a sample of 115 systems. This report is one in a series of Government Information Security Reform Act audits and is an assessment of the Noncombatant Evacuation Operations Tracking System.


Lessons learned from the Government Information Security Reform Act of 2000

Lessons learned from the Government Information Security Reform Act of 2000
Author: United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations
Publisher:
Total Pages: 160
Release: 2002
Genre: Business & Economics
ISBN:

Download Lessons learned from the Government Information Security Reform Act of 2000 Book in PDF, ePub and Kindle


H.R. 3844, the Federal Information Security Management Act of 2002

H.R. 3844, the Federal Information Security Management Act of 2002
Author: United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations
Publisher:
Total Pages: 188
Release: 2003
Genre: Computers
ISBN:

Download H.R. 3844, the Federal Information Security Management Act of 2002 Book in PDF, ePub and Kindle