亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? computer security_2.txt

?? a collection of mega hacking tools
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
                                     United States General Accounting Office          ___________________________________________________________________          GAO                         Report to the Chairman, Committee on                                      Science, Space, and Technology,                                      House of Representatives          ___________________________________________________________________          May 1990                    COMPUTER SECURITY                                      Governmentwide Planning Process                                      Had Limited Impact          ___________________________________________________________________          GAO/IMTEC-90-48         This U.S. General Accounting Office (GAO) report is 1 of 7         available over the Internet as part of a test to determine         whether there is sufficient interest within this community to         warrant making all GAO reports available over the Internet.         The file REPORTS at NIH lists the 7 reports.         So that we can keep a count of report recipients, and your         reaction, please send an E-Mail message to KH3@CU.NIH.GOV and         include, along with your E-Mail address, the following         information:              1)   Your organization.              2)   Your position/title and name (optional).              3)   The title/report number of the above reports you have                   retrieved electronically or ordered by mail or phone.              4)   Whether you have ever obtained a GAO report before.              5)   Whether you have copied a report onto another bulletin                   board--if so, which report and bulletin board.              6)   Other GAO report subjects you would be interested in.                   GAO's reports cover a broad range of subjects such as                   major weapons systems, energy, financial institutions,                   and pollution control.              7)   Any additional comments or suggestions.         Thank you for your time.         Sincerely,         Jack L. Brock, Jr.         Director,         Government Information and Financial         Management Issues         Information Management and Technology Division                 B-238954                 May 10, 1990                 The Honorable Robert A. Roe                 Chairman, Committee on Science,                   Space, and Technology                 House of Representatives                 Dear Mr. Chairman:                 This report responds to your June 5, 1989, request and                 subsequent agreements with your office that we review the                 governmentwide computer security planning and review process                 required by the Computer Security Act of 1987.  The act                 required federal agencies to identify systems that contain                 sensitive information and to develop plans to safeguard                 them.  As agreed, we assessed the (1) planning process in 10                 civilian agencies as well as the extent to which they                 implemented planned controls described in 22 selected plans                 and (2) National Institute of Standards and Technology                 (NIST)/National Security Agency (NSA) review of the plans.                 This is the fifth in a series of reports on implementation                 of the Computer Security Act that GAO has prepared for your                 committee.  Appendix I details the review's objectives,                 scope, and methodology.  Appendix II describes the systems                 covered by the 22 plans we reviewed.                 RESULTS IN BRIEF                 ----------------                 The planning and review process implemented under the                 Computer Security Act did little to strengthen computer                 security governmentwide.  Although agency officials believe                 that the process heightened awareness of computer security,                 they typically described the plans as merely "reporting                 requirements" and of limited use in addressing agency-                 specific problems.                 Officials cited three problems relating to the design and                 implementation of the planning process:  (1) the plans                 lacked adequate information to serve as management tools and                 some agencies already had planning processes in place, (2)                 managers had little time to prepare the plans, and (3) the                 Office of Management and Budget (OMB) planning guidance was                 sometimes unclear and misinterpreted by agency officials.                                          1                 B-238954                 Although a year has passed since the initial computer                 security plans were completed, agencies have made little                 progress in implementing planned controls.  Agency officials                 said that budget constraints and inadequate top management                 support--in terms of resources and commitment--were key                 reasons why controls had not been implemented.                 Based on the results of the planning and review process,                 OMB--in conjunction with NIST and NSA--issued draft security                 planning guidance in January 1990.  The draft guidance                 focuses on agency security programs and calls for NIST, NSA,                 and OMB to visit agencies to discuss their security programs                 and problems, and provide advice and technical assistance.                 We believe that efforts directed toward assisting agencies                 in solving specific problems and drawing top management                 attention to computer security issues have greater potential                 for improving computer security governmentwide.                 BACKGROUND                 ----------                 The Computer Security Act of 1987 (P.L. 100-235) was passed                 in response to concerns that the security of sensitive                 information was not being adequately addressed in the                 federal government.1  The act's intent was to improve the                 security and privacy of sensitive information in federal                 computer systems by establishing minimum security practices.                 The act required agencies to (1) identify all developmental                 and operational systems with sensitive information, (2)                 develop and submit to NIST and NSA for advice and comment a                 security and privacy plan for each system identified, and                 (3) establish computer security training programs.                 OMB Bulletin 88-16, developed with NIST and NSA assistance,                 provides guidance on the computer security plans required by                 the act.  To be in compliance, approximately 60 civilian                 agencies submitted almost 1,600 computer security plans to a                 NIST/NSA review team in early 1989.  Nearly all of these                 plans followed, to some degree, the format and content                 requested by the bulletin.  The bulletin requested that the                 following information be included in each plan:                1The act defines sensitive information as any unclassified                 information that in the event of loss, misuse, or                 unauthorized access or modification, could adversely affect                 the national interest, conduct of a federal program, or the                 privacy individuals are entitled to under the Privacy Act of                 1974 (5 U.S.C. 552a).                                          2                 B-238954                 -- Basic system identification:  agency, system name and                    type, whether the plan combines systems, operational                    status, system purpose, system environment, and point of                    contact.                 -- Information sensitivity:  laws and regulations affecting                    the system, protection requirements, and description of                    sensitivity.                 -- Security control status:  reported as "in place,"                    "planned," "in place and planned" (i.e., some aspects of                    the control are operational and others are planned), or                    "not applicable," and a brief description of and expected                    operational dates for controls that are reported as                    planned.2  (Appendix V lists the controls.)                 Appendix III presents a composite security plan that we                 developed for this report as an example of the civilian                 plans we reviewed.  It is representative of the content,                 format, and common omissions of the plans.                 PLANS HAD LIMITED IMPACT ON                 ---------------------------                 AGENCY COMPUTER SECURITY PROGRAMS                 ---------------------------------                 The goals of the planning process were commendable--to                 strengthen computer security by helping agencies identify                 and evaluate their security needs and controls for sensitive                 systems.  According to agency officials, the process yielded                 some benefits, the one most frequently cited being increased                 management awareness of computer security.  Further, some                 officials noted that the planning process provided a                 framework for reviewing their systems' security controls.                 However, problems relating to the design and implementation                 of the planning process limited its impact on agency                 security programs.  Specifically, (1) the plans lacked                 adequate information to serve as effective management tools,                 (2) managers had little time to prepare the plans, and (3)                 the OMB guidance was sometimes unclear and misinterpreted by                 the agencies.  Consequently, most agency officials viewed                 the plans as reporting requirements, rather than as                 management tools.                2In this report, we are using the term "planned controls" to                 include controls that agencies listed as "planned" or "in                 place and planned" in their January 1989 plans.  Both                 categories indicated that the controls were not fully in                 place.                                          3                 B-238954                 Plans Lacked Adequate Information to                 ------------------------------------                 Serve as Effective Management Tools                 -----------------------------------                 Although agency officials said that security planning is                 essential to the effective management of sensitive systems,                 the plans lacked important information that managers need in                 order to plan, and to monitor and implement plans.  The                 plans did not include this information, in part, because                 they were designed not only to help agencies plan, but also                 to facilitate NIST/NSA's review of the plans and to minimize                 the risks of unauthorized disclosure of vulnerabilities.                 For example:                 -- Many plans provided minimal descriptions (a sentence or                    nothing at all) of system sensitivity and planned                    security controls.  Detailed descriptions would have                    made the plans more useful in setting priorities for                    implementing planned controls.                 -- The plans did not assign responsibility for each planned                    control.  It was not clear, therefore, who was                    accountable for implementing the control (e.g., who would                    be performing a risk assessment).                 -- The plans did not include resource estimates needed to                    budget for planned actions.                 -- The plans generally did not refer to computer security-                    related internal control weaknesses, although such                    information can be important in developing plans.                 Finally, officials from about one-third of the agencies said                 that they already had more comprehensive planning processes                 to help them identify and evaluate their security needs.  As                 a result, the governmentwide process was largely superfluous                 for these agencies.  Officials at such agencies said that                 their plans, which included information such as detailed                 descriptions of security controls, already met the                 objectives of the governmentwide planning process.  Many                 officials said that what they needed was assistance in areas                 such as network security.                 Managers Had Little                 -------------------                 Time to Prepare the Plans                 -------------------------                 Officials had little time to adequately consider their                 security needs and prepare plans, further limiting the                 usefulness of the plans.  OMB Bulletin 88-16 was issued July                 6, 1988, 27 weeks before the plans were due to the NIST/NSA                                          4                 B-238954                 review team, as required by the Computer Security Act.                 However, less than 14 weeks was left after most agencies                 issued guidance on responding to the OMB request.  Within                 the remaining time, instructions were sent to the component                 agencies and from there to the managers responsible for                 preparing the plans, meetings were held to discuss the                 plans, managers prepared the plans, and the plans were                 reviewed by component agencies and returned to the agencies                 for review.  As a result, some managers had only a few days                 to prepare plans.                 Guidance Was Sometimes Unclear                 ------------------------------                 and Misinterpreted by Agencies                 ------------------------------                 Many agency officials misinterpreted or found the guidance                 unclear as to how systems were to be combined in the plans,                 the definition of some key terms (e.g., "in place"), the                 level of expected detail, and the need to address                 telecommunications.  For example, some plans combined many

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美日韩在线免费视频| 国产精品久久久久影院老司| 精品粉嫩超白一线天av| 国产精品久久久久久久久免费桃花| 亚洲一区二区三区三| 成人免费看视频| 日韩亚洲欧美成人一区| 亚洲一区中文日韩| 99在线视频精品| 久久亚洲二区三区| 免费欧美高清视频| 欧美日韩国产成人在线免费| 亚洲色欲色欲www在线观看| 国产一区二区免费在线| 日韩午夜在线影院| 日韩在线播放一区二区| 欧美中文一区二区三区| 亚洲欧洲制服丝袜| 高清不卡在线观看| 国产日韩精品一区二区三区在线| 日韩精品每日更新| 欧美群妇大交群的观看方式| 午夜一区二区三区在线观看| 日本韩国一区二区三区视频| 一区二区三区中文字幕在线观看| 95精品视频在线| 欧美国产视频在线| 国产成人在线视频免费播放| 久久久久久久国产精品影院| 精品制服美女丁香| 久久网这里都是精品| 国产一区二区三区观看| 国产日韩欧美高清| 成人激情免费电影网址| 国产精品每日更新在线播放网址| 99久久精品国产网站| 国产精品久久久久久久久晋中| 成人小视频免费在线观看| 中文在线一区二区| 91免费国产在线| 亚洲午夜影视影院在线观看| 欧美欧美午夜aⅴ在线观看| 首页国产欧美久久| 精品久久久久久综合日本欧美| 国产伦精品一区二区三区免费| 久久亚洲一区二区三区四区| av在线播放成人| 亚洲一区二区三区中文字幕在线| 91精品国模一区二区三区| 久久精品国产一区二区| 久久精品欧美一区二区三区麻豆| av综合在线播放| 天天综合天天综合色| 精品对白一区国产伦| 国产精品一区二区在线播放| 亚洲天堂中文字幕| 69堂成人精品免费视频| 国产传媒日韩欧美成人| 亚洲日本在线看| 欧美区在线观看| 大胆亚洲人体视频| 天天综合色天天| 国产三级一区二区| 欧美揉bbbbb揉bbbbb| 国产精品一卡二卡| 一区二区三区在线高清| 久久婷婷一区二区三区| 欧美吻胸吃奶大尺度电影 | 成人污视频在线观看| 亚洲美女一区二区三区| 日韩欧美高清在线| 91麻豆国产香蕉久久精品| 蜜臀av性久久久久av蜜臀妖精 | 国产又黄又大久久| 亚洲女同女同女同女同女同69| 日韩一区二区三区电影| 91在线国产观看| 另类专区欧美蜜桃臀第一页| 亚洲精品国产精华液| 久久人人97超碰com| 欧美精品免费视频| 99麻豆久久久国产精品免费 | 欧美成人一区二区三区片免费 | 亚洲一二三级电影| 一区二区三区自拍| 久久综合中文字幕| 欧美色欧美亚洲另类二区| 丁香激情综合五月| 精品一区二区三区免费观看| 午夜欧美一区二区三区在线播放| 亚洲国产精品v| 日韩精品中文字幕一区二区三区 | 青青草伊人久久| 玉足女爽爽91| 国产精品久久久久9999吃药| 久久精品视频一区二区三区| 欧美一区二区免费| 欧美男男青年gay1069videost| 色综合夜色一区| 粉嫩aⅴ一区二区三区四区| 精品一区二区在线看| 蜜臀精品一区二区三区在线观看| 亚洲二区在线视频| 一区二区视频在线| 亚洲蜜臀av乱码久久精品蜜桃| 国产精品美女久久久久久久久久久| 26uuu亚洲综合色| 日韩欧美在线网站| 日韩欧美中文一区| 日韩亚洲电影在线| 日韩美一区二区三区| 精品黑人一区二区三区久久| 欧美精品一区二区在线播放| 久久综合久久鬼色中文字| 欧美精品一区二区久久婷婷| 精品国产乱码久久久久久影片| 日韩一区二区三区视频在线观看| 欧美一区二区私人影院日本| 91精品国产品国语在线不卡 | 欧美日韩中文字幕精品| 欧美影院午夜播放| 欧美精品三级日韩久久| 欧美夫妻性生活| 日韩欧美国产1| 欧美激情一区三区| 亚洲欧美一区二区三区孕妇| 亚洲资源中文字幕| 三级影片在线观看欧美日韩一区二区| 亚洲mv在线观看| 美女被吸乳得到大胸91| 国产一区二区福利| 成人av免费网站| 精品视频全国免费看| 欧美一区二区高清| 久久久久久久免费视频了| 中文字幕日韩精品一区| 亚洲一区二区精品久久av| 男男视频亚洲欧美| 国产成人av资源| 在线影院国内精品| 精品少妇一区二区三区免费观看| 国产精品无遮挡| 午夜精品一区二区三区电影天堂 | 激情综合色播五月| 成人精品免费网站| 欧美日韩免费不卡视频一区二区三区| 日韩欧美一级二级| 中文字幕日本乱码精品影院| 青椒成人免费视频| 播五月开心婷婷综合| 欧美乱妇20p| 亚洲一区二区三区中文字幕在线| 日本午夜精品一区二区三区电影| 国产成人免费视频网站| 欧美丰满少妇xxxbbb| 久久久99久久| 天天综合日日夜夜精品| 99久久久精品免费观看国产蜜| 538在线一区二区精品国产| 国产精品免费看片| 麻豆极品一区二区三区| 91福利区一区二区三区| 国产女同互慰高潮91漫画| 亚洲午夜久久久久中文字幕久| 国产精品1区二区.| 91精品婷婷国产综合久久性色| 国产精品福利一区二区三区| 蜜臀a∨国产成人精品| 日本道在线观看一区二区| 久久久久久久av麻豆果冻| 日韩精品一二三四| 在线视频观看一区| 国产精品高潮呻吟久久| 国产精品一区二区视频| 制服丝袜中文字幕亚洲| 亚洲午夜久久久久| 91在线视频免费91| 国产清纯美女被跳蛋高潮一区二区久久w| 婷婷一区二区三区| 精品视频色一区| 一区二区三区日韩| 99r国产精品| 中文字幕一区二区三区不卡在线| 国产激情一区二区三区四区| 精品卡一卡二卡三卡四在线| 欧美96一区二区免费视频| 欧美日韩精品一区二区在线播放| 亚洲精品欧美综合四区| 色综合视频一区二区三区高清| 国产精品丝袜一区| 粗大黑人巨茎大战欧美成人| 欧美国产综合色视频| 国产精品 欧美精品| 国产欧美视频一区二区三区| 国产精品一区专区| 国产剧情一区在线| 欧美中文一区二区三区| 亚洲乱码国产乱码精品精的特点| 波多野结衣一区二区三区| 国产精品人成在线观看免费|