Information security across federal agencies :: analysis of adequacy and effectiveness /
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York :
Novinka,
[2016]
|
Schriftenreihe: | American political, economic, and security issues series.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource |
ISBN: | 9781634849531 1634849531 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1162217403 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 160915s2016 nyua o 001 0 eng | ||
010 | |a 2020679053 | ||
040 | |a DLC |b eng |e rda |e pn |c DLC |d VLY |d OCLCO |d N$T |d OCLCF |d YDX |d OSU |d UPM |d SNK |d DKU |d IGB |d D6H |d VTS |d AGLDB |d AU@ |d G3B |d S8J |d S9I |d STF |d M8D |d SSC |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d TMA |d OCLCQ | ||
019 | |a 952336622 |a 964290514 | ||
020 | |a 9781634849531 |q (ebook) | ||
020 | |a 1634849531 | ||
020 | |z 1634849485 | ||
020 | |z 9781634849487 | ||
035 | |a (OCoLC)1162217403 |z (OCoLC)952336622 |z (OCoLC)964290514 | ||
043 | |a n-us--- | ||
050 | 4 | |a KF27 |b .I546 2016 | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 352.380973 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Information security across federal agencies : |b analysis of adequacy and effectiveness / |c Shane Palmer, editor. |
264 | 1 | |a New York : |b Novinka, |c [2016] | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
490 | 1 | |a American Political, Economic, and Security Issues | |
500 | |a Includes index. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a INFORMATION SECURITY ACROSS FEDERAL AGENCIES ANALYSIS OF ADEQUACY AND EFFECTIVENESS ; INFORMATION SECURITY ACROSS FEDERAL AGENCIES ANALYSIS OF ADEQUACY AND EFFECTIVENESS ; CONTENTS ; PREFACE ; Chapter 1 FEDERAL INFORMATION SECURITY: AGENCIES NEED TO CORRECT WEAKNESSES AND FULLY IMPLEMENT SECURITY PROGRAMS* ; WHY GAO DID THIS STUDY ; WHAT GAO RECOMMENDS ; WHAT GAO FOUND ; ABBREVIATIONS ; BACKGROUND; New FISMA Requirements Clarify Roles and Responsibilities ; CONTINUED WEAKNESSES PLACE FEDERAL AGENCIES' INFORMATION AND INFORMATION SYSTEMS AT RISK | |
505 | 8 | |a Number of Incidents Reported by Federal Agencies Continues to Increase Cybersecurity Deficiencies Continue to Place Systems at Risk ; Agencies Exhibited Weaknesses in All Major Categories of Controls; Most Agencies Had Weaknesses in Access Controls ; Agencies Did Not Fully Implement Controls for Configuration Management ; More Than Half of the Agencies Did Not Segregate Incompatible Duties ; Agencies Had Weaknesses in Continuity of Operations; Agencies Did Not Effectively Manage Security ; We and Inspectors General Recommended Actions to Strengthen Information Security | |
505 | 8 | |a Federal Efforts Are Underway to Improve Security Cybersecurity Cross-Agency Priority Goals ; The National Cybersecurity Protection System (NCPS) ; The Continuous Diagnostics and Mitigation (CDM) Program ; The National Initiative for Cybersecurity Education (NICE) ; The Federal Risk and Authorization Management Program (FedRAMP) ; The Cyber and National Security Team (E-Gov Cyber) ; The 30-Day Cybersecurity Sprint ; AGENCIES' IMPLEMENTATION OF FISMA 2002 REQUIREMENTS WAS MIXED ; More Agencies Implemented Risk Management Activities ; Most Agencies Had Documented Policies and Procedures | |
505 | 8 | |a Number of Agencies with Sufficient Security Planning Decreased Number of Agencies Providing Sufficient Security Awareness Decreased and the Percentage of Personnel Receiving Specialized Training Decreased ; Fewer Agencies Are Periodically Testing and Continuously Monitoring Controls; Increasing Number of Agencies are Generally Implementing Elements of a Remediation Program, but Weaknesses Remain ; Agencies' Efforts to Implement Incident Response and Reporting Varied ; Fewer Agencies Had Adequate Contingency Plans | |
505 | 8 | |a Agencies Reported Operating Fewer Systems and Relying More on Contractor-Operated SystemsMore Agencies Implemented Privacy Requirements ; Amount of Spending on Information Security Varied Among Agencies ; NIST Continues to Provide FISMA-Related Guidance to Agencies ; Inspectors General Report on Agency Implementation of FISMA ; OMB and DHS Continue Actions, but Opportunities Remain for Improving Annual Reporting of Agency Information Security Programs ; Guidance for Reporting Agency Evaluations Was Not always Complete ; CONCLUSION ; RECOMMENDATION FOR EXECUTIVE ACTION | |
650 | 0 | |a Cyber intelligence (Computer security) |z United States. | |
650 | 6 | |a Surveillance des menaces informatiques |z États-Unis. | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Cyber intelligence (Computer security) |2 fast | |
651 | 7 | |a United States |2 fast |1 https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq | |
700 | 1 | |a Palmer, Shane, |e editor. | |
758 | |i has work: |a Information Security Across Federal Agencies: Analysis of Adequacy and Effectiveness (Text) |1 https://id.oclc.org/worldcat/entity/E39PD3TmRxVVBKqB9CV3HByBdP |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Information security across federal agencies. |d New York : Novinka, [2016] |z 1634849485 |w (DLC) 2016448638 |
830 | 0 | |a American political, economic, and security issues series. |0 http://id.loc.gov/authorities/names/no2010087029 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1258698 |3 Volltext |
938 | |a EBSCOhost |b EBSC |n 1258698 | ||
938 | |a YBP Library Services |b YANK |n 12882189 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1162217403 |
---|---|
_version_ | 1816882522235076609 |
adam_text | |
any_adam_object | |
author2 | Palmer, Shane |
author2_role | edt |
author2_variant | s p sp |
author_facet | Palmer, Shane |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | K - Law |
callnumber-label | KF27 |
callnumber-raw | KF27 .I546 2016 |
callnumber-search | KF27 .I546 2016 |
callnumber-sort | KF 227 I546 42016 |
callnumber-subject | KF - United States |
collection | ZDB-4-EBA |
contents | INFORMATION SECURITY ACROSS FEDERAL AGENCIES ANALYSIS OF ADEQUACY AND EFFECTIVENESS ; INFORMATION SECURITY ACROSS FEDERAL AGENCIES ANALYSIS OF ADEQUACY AND EFFECTIVENESS ; CONTENTS ; PREFACE ; Chapter 1 FEDERAL INFORMATION SECURITY: AGENCIES NEED TO CORRECT WEAKNESSES AND FULLY IMPLEMENT SECURITY PROGRAMS* ; WHY GAO DID THIS STUDY ; WHAT GAO RECOMMENDS ; WHAT GAO FOUND ; ABBREVIATIONS ; BACKGROUND; New FISMA Requirements Clarify Roles and Responsibilities ; CONTINUED WEAKNESSES PLACE FEDERAL AGENCIES' INFORMATION AND INFORMATION SYSTEMS AT RISK Number of Incidents Reported by Federal Agencies Continues to Increase Cybersecurity Deficiencies Continue to Place Systems at Risk ; Agencies Exhibited Weaknesses in All Major Categories of Controls; Most Agencies Had Weaknesses in Access Controls ; Agencies Did Not Fully Implement Controls for Configuration Management ; More Than Half of the Agencies Did Not Segregate Incompatible Duties ; Agencies Had Weaknesses in Continuity of Operations; Agencies Did Not Effectively Manage Security ; We and Inspectors General Recommended Actions to Strengthen Information Security Federal Efforts Are Underway to Improve Security Cybersecurity Cross-Agency Priority Goals ; The National Cybersecurity Protection System (NCPS) ; The Continuous Diagnostics and Mitigation (CDM) Program ; The National Initiative for Cybersecurity Education (NICE) ; The Federal Risk and Authorization Management Program (FedRAMP) ; The Cyber and National Security Team (E-Gov Cyber) ; The 30-Day Cybersecurity Sprint ; AGENCIES' IMPLEMENTATION OF FISMA 2002 REQUIREMENTS WAS MIXED ; More Agencies Implemented Risk Management Activities ; Most Agencies Had Documented Policies and Procedures Number of Agencies with Sufficient Security Planning Decreased Number of Agencies Providing Sufficient Security Awareness Decreased and the Percentage of Personnel Receiving Specialized Training Decreased ; Fewer Agencies Are Periodically Testing and Continuously Monitoring Controls; Increasing Number of Agencies are Generally Implementing Elements of a Remediation Program, but Weaknesses Remain ; Agencies' Efforts to Implement Incident Response and Reporting Varied ; Fewer Agencies Had Adequate Contingency Plans Agencies Reported Operating Fewer Systems and Relying More on Contractor-Operated SystemsMore Agencies Implemented Privacy Requirements ; Amount of Spending on Information Security Varied Among Agencies ; NIST Continues to Provide FISMA-Related Guidance to Agencies ; Inspectors General Report on Agency Implementation of FISMA ; OMB and DHS Continue Actions, but Opportunities Remain for Improving Annual Reporting of Agency Information Security Programs ; Guidance for Reporting Agency Evaluations Was Not always Complete ; CONCLUSION ; RECOMMENDATION FOR EXECUTIVE ACTION |
ctrlnum | (OCoLC)1162217403 |
dewey-full | 352.380973 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 352 - General considerations of public administration |
dewey-raw | 352.380973 |
dewey-search | 352.380973 |
dewey-sort | 3352.380973 |
dewey-tens | 350 - Public administration and military science |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05294cam a2200589 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1162217403</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">160915s2016 nyua o 001 0 eng </controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a"> 2020679053</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DLC</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">DLC</subfield><subfield code="d">VLY</subfield><subfield code="d">OCLCO</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCF</subfield><subfield code="d">YDX</subfield><subfield code="d">OSU</subfield><subfield code="d">UPM</subfield><subfield code="d">SNK</subfield><subfield code="d">DKU</subfield><subfield code="d">IGB</subfield><subfield code="d">D6H</subfield><subfield code="d">VTS</subfield><subfield code="d">AGLDB</subfield><subfield code="d">AU@</subfield><subfield code="d">G3B</subfield><subfield code="d">S8J</subfield><subfield code="d">S9I</subfield><subfield code="d">STF</subfield><subfield code="d">M8D</subfield><subfield code="d">SSC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">TMA</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">952336622</subfield><subfield code="a">964290514</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781634849531</subfield><subfield code="q">(ebook)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1634849531</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1634849485</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781634849487</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1162217403</subfield><subfield code="z">(OCoLC)952336622</subfield><subfield code="z">(OCoLC)964290514</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">n-us---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">KF27</subfield><subfield code="b">.I546 2016</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">352.380973</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Information security across federal agencies :</subfield><subfield code="b">analysis of adequacy and effectiveness /</subfield><subfield code="c">Shane Palmer, editor.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York :</subfield><subfield code="b">Novinka,</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">American Political, Economic, and Security Issues</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">INFORMATION SECURITY ACROSS FEDERAL AGENCIES ANALYSIS OF ADEQUACY AND EFFECTIVENESS ; INFORMATION SECURITY ACROSS FEDERAL AGENCIES ANALYSIS OF ADEQUACY AND EFFECTIVENESS ; CONTENTS ; PREFACE ; Chapter 1 FEDERAL INFORMATION SECURITY: AGENCIES NEED TO CORRECT WEAKNESSES AND FULLY IMPLEMENT SECURITY PROGRAMS* ; WHY GAO DID THIS STUDY ; WHAT GAO RECOMMENDS ; WHAT GAO FOUND ; ABBREVIATIONS ; BACKGROUND; New FISMA Requirements Clarify Roles and Responsibilities ; CONTINUED WEAKNESSES PLACE FEDERAL AGENCIES' INFORMATION AND INFORMATION SYSTEMS AT RISK</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Number of Incidents Reported by Federal Agencies Continues to Increase Cybersecurity Deficiencies Continue to Place Systems at Risk ; Agencies Exhibited Weaknesses in All Major Categories of Controls; Most Agencies Had Weaknesses in Access Controls ; Agencies Did Not Fully Implement Controls for Configuration Management ; More Than Half of the Agencies Did Not Segregate Incompatible Duties ; Agencies Had Weaknesses in Continuity of Operations; Agencies Did Not Effectively Manage Security ; We and Inspectors General Recommended Actions to Strengthen Information Security</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Federal Efforts Are Underway to Improve Security Cybersecurity Cross-Agency Priority Goals ; The National Cybersecurity Protection System (NCPS) ; The Continuous Diagnostics and Mitigation (CDM) Program ; The National Initiative for Cybersecurity Education (NICE) ; The Federal Risk and Authorization Management Program (FedRAMP) ; The Cyber and National Security Team (E-Gov Cyber) ; The 30-Day Cybersecurity Sprint ; AGENCIES' IMPLEMENTATION OF FISMA 2002 REQUIREMENTS WAS MIXED ; More Agencies Implemented Risk Management Activities ; Most Agencies Had Documented Policies and Procedures</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Number of Agencies with Sufficient Security Planning Decreased Number of Agencies Providing Sufficient Security Awareness Decreased and the Percentage of Personnel Receiving Specialized Training Decreased ; Fewer Agencies Are Periodically Testing and Continuously Monitoring Controls; Increasing Number of Agencies are Generally Implementing Elements of a Remediation Program, but Weaknesses Remain ; Agencies' Efforts to Implement Incident Response and Reporting Varied ; Fewer Agencies Had Adequate Contingency Plans</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Agencies Reported Operating Fewer Systems and Relying More on Contractor-Operated SystemsMore Agencies Implemented Privacy Requirements ; Amount of Spending on Information Security Varied Among Agencies ; NIST Continues to Provide FISMA-Related Guidance to Agencies ; Inspectors General Report on Agency Implementation of FISMA ; OMB and DHS Continue Actions, but Opportunities Remain for Improving Annual Reporting of Agency Information Security Programs ; Guidance for Reporting Agency Evaluations Was Not always Complete ; CONCLUSION ; RECOMMENDATION FOR EXECUTIVE ACTION</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyber intelligence (Computer security)</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Surveillance des menaces informatiques</subfield><subfield code="z">États-Unis.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyber intelligence (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">United States</subfield><subfield code="2">fast</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Palmer, Shane,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Information Security Across Federal Agencies: Analysis of Adequacy and Effectiveness (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PD3TmRxVVBKqB9CV3HByBdP</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Information security across federal agencies.</subfield><subfield code="d">New York : Novinka, [2016]</subfield><subfield code="z">1634849485</subfield><subfield code="w">(DLC) 2016448638</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">American political, economic, and security issues series.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2010087029</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1258698</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1258698</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12882189</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
geographic | United States fast https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq |
geographic_facet | United States |
id | ZDB-4-EBA-on1162217403 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:29:57Z |
institution | BVB |
isbn | 9781634849531 1634849531 |
language | English |
lccn | 2020679053 |
oclc_num | 1162217403 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Novinka, |
record_format | marc |
series | American political, economic, and security issues series. |
series2 | American Political, Economic, and Security Issues |
spelling | Information security across federal agencies : analysis of adequacy and effectiveness / Shane Palmer, editor. New York : Novinka, [2016] 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier data file American Political, Economic, and Security Issues Includes index. Print version record. INFORMATION SECURITY ACROSS FEDERAL AGENCIES ANALYSIS OF ADEQUACY AND EFFECTIVENESS ; INFORMATION SECURITY ACROSS FEDERAL AGENCIES ANALYSIS OF ADEQUACY AND EFFECTIVENESS ; CONTENTS ; PREFACE ; Chapter 1 FEDERAL INFORMATION SECURITY: AGENCIES NEED TO CORRECT WEAKNESSES AND FULLY IMPLEMENT SECURITY PROGRAMS* ; WHY GAO DID THIS STUDY ; WHAT GAO RECOMMENDS ; WHAT GAO FOUND ; ABBREVIATIONS ; BACKGROUND; New FISMA Requirements Clarify Roles and Responsibilities ; CONTINUED WEAKNESSES PLACE FEDERAL AGENCIES' INFORMATION AND INFORMATION SYSTEMS AT RISK Number of Incidents Reported by Federal Agencies Continues to Increase Cybersecurity Deficiencies Continue to Place Systems at Risk ; Agencies Exhibited Weaknesses in All Major Categories of Controls; Most Agencies Had Weaknesses in Access Controls ; Agencies Did Not Fully Implement Controls for Configuration Management ; More Than Half of the Agencies Did Not Segregate Incompatible Duties ; Agencies Had Weaknesses in Continuity of Operations; Agencies Did Not Effectively Manage Security ; We and Inspectors General Recommended Actions to Strengthen Information Security Federal Efforts Are Underway to Improve Security Cybersecurity Cross-Agency Priority Goals ; The National Cybersecurity Protection System (NCPS) ; The Continuous Diagnostics and Mitigation (CDM) Program ; The National Initiative for Cybersecurity Education (NICE) ; The Federal Risk and Authorization Management Program (FedRAMP) ; The Cyber and National Security Team (E-Gov Cyber) ; The 30-Day Cybersecurity Sprint ; AGENCIES' IMPLEMENTATION OF FISMA 2002 REQUIREMENTS WAS MIXED ; More Agencies Implemented Risk Management Activities ; Most Agencies Had Documented Policies and Procedures Number of Agencies with Sufficient Security Planning Decreased Number of Agencies Providing Sufficient Security Awareness Decreased and the Percentage of Personnel Receiving Specialized Training Decreased ; Fewer Agencies Are Periodically Testing and Continuously Monitoring Controls; Increasing Number of Agencies are Generally Implementing Elements of a Remediation Program, but Weaknesses Remain ; Agencies' Efforts to Implement Incident Response and Reporting Varied ; Fewer Agencies Had Adequate Contingency Plans Agencies Reported Operating Fewer Systems and Relying More on Contractor-Operated SystemsMore Agencies Implemented Privacy Requirements ; Amount of Spending on Information Security Varied Among Agencies ; NIST Continues to Provide FISMA-Related Guidance to Agencies ; Inspectors General Report on Agency Implementation of FISMA ; OMB and DHS Continue Actions, but Opportunities Remain for Improving Annual Reporting of Agency Information Security Programs ; Guidance for Reporting Agency Evaluations Was Not always Complete ; CONCLUSION ; RECOMMENDATION FOR EXECUTIVE ACTION Cyber intelligence (Computer security) United States. Surveillance des menaces informatiques États-Unis. COMPUTERS Security General. bisacsh Cyber intelligence (Computer security) fast United States fast https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq Palmer, Shane, editor. has work: Information Security Across Federal Agencies: Analysis of Adequacy and Effectiveness (Text) https://id.oclc.org/worldcat/entity/E39PD3TmRxVVBKqB9CV3HByBdP https://id.oclc.org/worldcat/ontology/hasWork Print version: Information security across federal agencies. New York : Novinka, [2016] 1634849485 (DLC) 2016448638 American political, economic, and security issues series. http://id.loc.gov/authorities/names/no2010087029 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1258698 Volltext |
spellingShingle | Information security across federal agencies : analysis of adequacy and effectiveness / American political, economic, and security issues series. INFORMATION SECURITY ACROSS FEDERAL AGENCIES ANALYSIS OF ADEQUACY AND EFFECTIVENESS ; INFORMATION SECURITY ACROSS FEDERAL AGENCIES ANALYSIS OF ADEQUACY AND EFFECTIVENESS ; CONTENTS ; PREFACE ; Chapter 1 FEDERAL INFORMATION SECURITY: AGENCIES NEED TO CORRECT WEAKNESSES AND FULLY IMPLEMENT SECURITY PROGRAMS* ; WHY GAO DID THIS STUDY ; WHAT GAO RECOMMENDS ; WHAT GAO FOUND ; ABBREVIATIONS ; BACKGROUND; New FISMA Requirements Clarify Roles and Responsibilities ; CONTINUED WEAKNESSES PLACE FEDERAL AGENCIES' INFORMATION AND INFORMATION SYSTEMS AT RISK Number of Incidents Reported by Federal Agencies Continues to Increase Cybersecurity Deficiencies Continue to Place Systems at Risk ; Agencies Exhibited Weaknesses in All Major Categories of Controls; Most Agencies Had Weaknesses in Access Controls ; Agencies Did Not Fully Implement Controls for Configuration Management ; More Than Half of the Agencies Did Not Segregate Incompatible Duties ; Agencies Had Weaknesses in Continuity of Operations; Agencies Did Not Effectively Manage Security ; We and Inspectors General Recommended Actions to Strengthen Information Security Federal Efforts Are Underway to Improve Security Cybersecurity Cross-Agency Priority Goals ; The National Cybersecurity Protection System (NCPS) ; The Continuous Diagnostics and Mitigation (CDM) Program ; The National Initiative for Cybersecurity Education (NICE) ; The Federal Risk and Authorization Management Program (FedRAMP) ; The Cyber and National Security Team (E-Gov Cyber) ; The 30-Day Cybersecurity Sprint ; AGENCIES' IMPLEMENTATION OF FISMA 2002 REQUIREMENTS WAS MIXED ; More Agencies Implemented Risk Management Activities ; Most Agencies Had Documented Policies and Procedures Number of Agencies with Sufficient Security Planning Decreased Number of Agencies Providing Sufficient Security Awareness Decreased and the Percentage of Personnel Receiving Specialized Training Decreased ; Fewer Agencies Are Periodically Testing and Continuously Monitoring Controls; Increasing Number of Agencies are Generally Implementing Elements of a Remediation Program, but Weaknesses Remain ; Agencies' Efforts to Implement Incident Response and Reporting Varied ; Fewer Agencies Had Adequate Contingency Plans Agencies Reported Operating Fewer Systems and Relying More on Contractor-Operated SystemsMore Agencies Implemented Privacy Requirements ; Amount of Spending on Information Security Varied Among Agencies ; NIST Continues to Provide FISMA-Related Guidance to Agencies ; Inspectors General Report on Agency Implementation of FISMA ; OMB and DHS Continue Actions, but Opportunities Remain for Improving Annual Reporting of Agency Information Security Programs ; Guidance for Reporting Agency Evaluations Was Not always Complete ; CONCLUSION ; RECOMMENDATION FOR EXECUTIVE ACTION Cyber intelligence (Computer security) United States. Surveillance des menaces informatiques États-Unis. COMPUTERS Security General. bisacsh Cyber intelligence (Computer security) fast |
title | Information security across federal agencies : analysis of adequacy and effectiveness / |
title_auth | Information security across federal agencies : analysis of adequacy and effectiveness / |
title_exact_search | Information security across federal agencies : analysis of adequacy and effectiveness / |
title_full | Information security across federal agencies : analysis of adequacy and effectiveness / Shane Palmer, editor. |
title_fullStr | Information security across federal agencies : analysis of adequacy and effectiveness / Shane Palmer, editor. |
title_full_unstemmed | Information security across federal agencies : analysis of adequacy and effectiveness / Shane Palmer, editor. |
title_short | Information security across federal agencies : |
title_sort | information security across federal agencies analysis of adequacy and effectiveness |
title_sub | analysis of adequacy and effectiveness / |
topic | Cyber intelligence (Computer security) United States. Surveillance des menaces informatiques États-Unis. COMPUTERS Security General. bisacsh Cyber intelligence (Computer security) fast |
topic_facet | Cyber intelligence (Computer security) United States. Surveillance des menaces informatiques États-Unis. COMPUTERS Security General. Cyber intelligence (Computer security) United States |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1258698 |
work_keys_str_mv | AT palmershane informationsecurityacrossfederalagenciesanalysisofadequacyandeffectiveness |