Borrow it
- African Studies Library
- Alumni Medical Library
- Astronomy Library
- Fineman and Pappas Law Libraries
- Frederick S. Pardee Management Library
- Howard Gotlieb Archival Research Center
- Mugar Memorial Library
- Music Library
- Pikering Educational Resources Library
- School of Theology Library
- Science & Engineering Library
- Stone Science Library
The Resource CYBERSECURITY: Continued Efforts Are Needed to Protect Information Systems From Evolving Threats
CYBERSECURITY: Continued Efforts Are Needed to Protect Information Systems From Evolving Threats
Resource Information
The item CYBERSECURITY: Continued Efforts Are Needed to Protect Information Systems From Evolving Threats represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.This item is available to borrow from all library branches.
Resource Information
The item CYBERSECURITY: Continued Efforts Are Needed to Protect Information Systems From Evolving Threats represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.
This item is available to borrow from all library branches.
- Summary
- As computer technology has advanced, federal agencies have become dependent on computerized information systems to carry out their operations and to process, maintain, and report essential information. Virtually all federal operations are supported by automated systems and electronic data, and agencies would find it difficult, if not impossible, to carry out their missions, deliver services to the public, and account for their resources without these information assets. Information security is thus especially important for federal agencies to ensure the confidentiality, integrity, and availability of their information and information systems. Conversely, ineffective information security controls can result in significant risk to a broad array of government operations and assets. Examples of such risks include the following: Resources, such as federal payments and collections, could be lost or stolen. Computer resources could be used for unauthorized purposes or to launch attacks on other computer systems. Sensitive information, such as taxpayer data, Social Security records, medical records, intellectual property, and proprietary business information, could be inappropriately disclosed, browsed, or copied for purposes of identity theft, espionage, or other types of crime. Critical operations, such as those supporting critical infrastructure, national defense, and emergency services, could be disrupted. Data could be added, modified, or deleted for purposes of fraud, subterfuge, or disruption
- Language
- eng
- Extent
- 25 pages
- Note
- Congressional rept
- Label
- CYBERSECURITY: Continued Efforts Are Needed to Protect Information Systems From Evolving Threats
- Title
- CYBERSECURITY: Continued Efforts Are Needed to Protect Information Systems From Evolving Threats
- Language
- eng
- Summary
- As computer technology has advanced, federal agencies have become dependent on computerized information systems to carry out their operations and to process, maintain, and report essential information. Virtually all federal operations are supported by automated systems and electronic data, and agencies would find it difficult, if not impossible, to carry out their missions, deliver services to the public, and account for their resources without these information assets. Information security is thus especially important for federal agencies to ensure the confidentiality, integrity, and availability of their information and information systems. Conversely, ineffective information security controls can result in significant risk to a broad array of government operations and assets. Examples of such risks include the following: Resources, such as federal payments and collections, could be lost or stolen. Computer resources could be used for unauthorized purposes or to launch attacks on other computer systems. Sensitive information, such as taxpayer data, Social Security records, medical records, intellectual property, and proprietary business information, could be inappropriately disclosed, browsed, or copied for purposes of identity theft, espionage, or other types of crime. Critical operations, such as those supporting critical infrastructure, national defense, and emergency services, could be disrupted. Data could be added, modified, or deleted for purposes of fraud, subterfuge, or disruption
- Cataloging source
- DTICE
- Index
- no index present
- Literary form
- non fiction
- http://library.link/vocab/relatedWorkOrContributorName
-
- Wilshusen, Gregory C
- Powner, David A
- GOVERNMENT ACCOUNTABILITY OFFICE WASHINGTON DC
- http://library.link/vocab/subjectName
-
- Computer applications
- Information security
- Information systems
- Information science
- Computer programming and software
- Attack
- Medicine
- Launching
- Records
- National defense
- Federal budgets
- Social security
- Infrastructure
- Payment
- Emergencies
- United states government
- Electronics
- Espionage
- Target audience
- adult
- Label
- CYBERSECURITY: Continued Efforts Are Needed to Protect Information Systems From Evolving Threats
- Note
- Congressional rept
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Dimensions
- 23 x 29 cm
- Extent
- 25 pages
- Form of item
- online
- Governing access note
- APPROVED FOR PUBLIC RELEASE
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Note
- Hein Online
- System control number
-
- (OCoLC)713232471
- (OCoLC)ocn713232471
- Label
- CYBERSECURITY: Continued Efforts Are Needed to Protect Information Systems From Evolving Threats
- Note
- Congressional rept
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Dimensions
- 23 x 29 cm
- Extent
- 25 pages
- Form of item
- online
- Governing access note
- APPROVED FOR PUBLIC RELEASE
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Note
- Hein Online
- System control number
-
- (OCoLC)713232471
- (OCoLC)ocn713232471
Library Locations
-
African Studies LibraryBorrow it771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US42.350723 -71.108227
-
-
Astronomy LibraryBorrow it725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US42.350259 -71.105717
-
Fineman and Pappas Law LibrariesBorrow it765 Commonwealth Avenue, Boston, MA, 02215, US42.350979 -71.107023
-
Frederick S. Pardee Management LibraryBorrow it595 Commonwealth Avenue, Boston, MA, 02215, US42.349626 -71.099547
-
Howard Gotlieb Archival Research CenterBorrow it771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US42.350723 -71.108227
-
-
Music LibraryBorrow it771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350723 -71.108227
-
Pikering Educational Resources LibraryBorrow it2 Silber Way, Boston, MA, 02215, US42.349804 -71.101425
-
School of Theology LibraryBorrow it745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350494 -71.107235
-
Science & Engineering LibraryBorrow it38 Cummington Mall, Boston, MA, 02215, US42.348472 -71.102257
-
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/portal/CYBERSECURITY-Continued-Efforts-Are-Needed-to/SCiMBqJW_zM/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/CYBERSECURITY-Continued-Efforts-Are-Needed-to/SCiMBqJW_zM/">CYBERSECURITY: Continued Efforts Are Needed to Protect Information Systems From Evolving Threats</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item CYBERSECURITY: Continued Efforts Are Needed to Protect Information Systems From Evolving Threats
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/portal/CYBERSECURITY-Continued-Efforts-Are-Needed-to/SCiMBqJW_zM/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/CYBERSECURITY-Continued-Efforts-Are-Needed-to/SCiMBqJW_zM/">CYBERSECURITY: Continued Efforts Are Needed to Protect Information Systems From Evolving Threats</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>