Computer networks (51 - 60 of 79 items)
Computer Security: Progress Made, But Critical Federal Operations and Assets Remain at Risk
GAO-03-303T: Published: Nov 19, 2002. Publicly Released: Nov 19, 2002.
Protecting the computer systems that support our critical operations and infrastructures has never been more important because of the concern about attacks from individuals and groups with malicious intent, including terrorism. These concerns are well founded for a number of reasons, including the dramatic increases in reported computer security incidents, the ease of obtaining and using hacking t...
Critical Infrastructure Protection: Federal Efforts Require a More Coordinated and Comprehensive Approach for Protecting Information Systems
GAO-02-474: Published: Jul 15, 2002. Publicly Released: Jul 15, 2002.
Critical infrastructure protection (CIP) involves activities that enhance the security of the nation's cyber and physical public and private infrastructures that are essential to national security, economic activity, and public health and safety. At least 50 federal organizations within 13 major departments and agencies mentioned in Presidential Decision Directive 63 are involved in CIP activities...
Information Security: Progress and Challenges to an Effective Defense-wide Information Assurance Program
GAO-01-307: Published: Mar 30, 2001. Publicly Released: Mar 30, 2001.
The components, military services, and agencies of the Department of Defense (DOD) share many risks in their use of globally networked computer systems to perform operational missions. Many reports of vulnerabilities, organized intrusions, and theft related to department systems and networks have underscored weaknesses in DOD systems. In January 1998, DOD responded to these risks by announcing its...
Information Security: Advances and Remaining Challenges to Adoption of Public Key Infrastructure Technology
GAO-01-277: Published: Feb 26, 2001. Publicly Released: Feb 26, 2001.
The federal government must overcome several major challenges before public key infrastructure (PKI) technology can be widely and effectively used. These challenges include providing interoperability among agency PKIs, ensuring that PKI implementations can support a potential large scale of users, reducing the cost of building PKI systems, setting policies to maintain trust levels among agencies,...
GAO-01-147R: Published: Oct 20, 2000. Publicly Released: Oct 23, 2000.
Internet Privacy: Comparison of Federal Agency Practices With FTC's Fair Information Principles
GAO-01-113T: Published: Oct 11, 2000. Publicly Released: Oct 11, 2000.
This testimony compares federal agency Internet privacy policies with the Federal Trade Commission's (FTC) fair information principles. The World Wide Web requires the collection of certain data, such as Internet addresses, from individuals who visit web sites. However, the collection of even this most basic data can be controversial because of the public's apprehension about what information is c...
GGD-00-191: Published: Sep 5, 2000. Publicly Released: Sep 5, 2000.
Pursuant to a congressional request, GAO provided information on whether agencies were adhering to the Office of Management and Budget's (OMB) memorandum requiring federal agencies to post privacy policies on their Internet Websites, focusing on: (1) whether agencies have clearly labelled and easily accessed privacy policies posted on their principal Web sites; (2) whether agencies' privacy polici...
Information Security: Fundamental Weaknesses Place EPA Data and Operations at Risk
AIMD-00-215: Published: Jul 6, 2000. Publicly Released: Aug 11, 2000.
Pursuant to a congressional request, GAO provided information on the Environmental Protection Agency's (EPA) information security program, focusing on: (1) EPA's computer-based controls; (2) the extent and impact of computer security incidents at EPA; and (3) the agency's information security program management.GAO noted that: (1) GAO's review found serious and pervasive problems that essentially...
Information Security: 'ILOVEYOU' Computer Virus Emphasizes Critical Need for Agency and Governmentwide Improvements
T-AIMD-00-171: Published: May 10, 2000. Publicly Released: May 10, 2000.
Pursuant to a congressional request, GAO discussed the "ILOVEYOU" computer virus, focusing on the need for agency and governmentwide improvements in information security.GAO noted that: (1) ILOVEYOU is both a virus and a worm; (2) the damage resulting from this particular hybrid is limited to users of the Microsoft Windows operating system; (3) ILOVEYOU typically comes in the form of an electronic...
Computer Security: Reported Appropriations and Obligations for Four Major Initiatives
AIMD-00-92R: Published: Feb 28, 2000. Publicly Released: Feb 28, 2000.
Pursuant to a congressional request, GAO provided information on fiscal years 1998 through 2000 appropriations and obligations for four major computer security initiatives, including: (1) the Federal Bureau of Investigation's National Infrastructure Protection Center (NIPC); (2) the Department of Defense's (DOD) Joint Task Force on Computer Network Defense (JTF-CND); (3) the General Services Admin...