亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? computer security_2.txt

?? a collection of mega hacking tools
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
                 different types of systems--such as microcomputers and                 mainframes--having diverse functions and security needs,                 although the guidance specified that only similar systems                 could be combined.  When dissimilar systems were combined,                 the plan's usefulness as a management tool was limited.                 Further, for plans that combined systems, some agencies                 reported that a security control was in place for the entire                 plan, although it was actually in place for only a few                 systems.  Agency officials stated that they combined systems                 in accordance with their understanding of the OMB guidance                 and NIST/NSA verbal instructions.                 In addition, officials were confused about how much detail                 to include in the plans and whether to address                 telecommunications issues (e.g., network security).  For                 example, they said that although the guidance asked for                 brief descriptions of systems and information sensitivity,                 NIST/NSA reviewers frequently commented that plans lacked                 adequate descriptions.  NIST officials said they expected                 that the plans would be more detailed and discuss the                 vulnerabilities inherent in networks.  They said, in                 retrospect, that it would have been helpful if the guidance                 had provided examples and clarified the level of expected                 detail.                 AGENCIES HAVE NOT IMPLEMENTED                 -----------------------------                 MOST PLANNED SECURITY CONTROLS                 ------------------------------                 Although a year has passed since the initial computer                 security plans were completed, agencies have made little                                          5                 B-238954                 progress in implementing planned controls.3  The 22 plans we                 reviewed contained 145 planned security controls.  According                 to agency officials, as of January 1990, only 38 percent of                 the 145 planned controls had been implemented.                 Table 1 shows the number and percentage of planned security                 controls that had been implemented as of January 1990.          Table 1:  Implementation of Security Controls in 22 Plans                                                                    Percent          Security control           Planned        Implemented     implemented          ----------------           -------        -----------     -----------          Assignment of security          responsibility              7              7               100          Audit and variance          detection                   7              7               100          Confidentiality          controls                    3              3               100          User identification          and authentication          2              2               100          Personnel selection          and screening               7              6                86          Security measures for          support systems             9              5                56          Security awareness and          training measures          20             12                60          Authorization/access          controls                    4              2                50          Contingency plans          11              5                45          Data integrity and          validation controls         8              2                25          Audit trails and          maintaining          journals                   12              2                17                3Only 4 percent of the security controls had implementation                 dates beyond January 1990.                                          6                 B-238954          Production, input/          output controls             8              1                13          Risk/sensitivity          assessment                 11              1                 9          Security specifications    10              0                 0          Design review and          testing                    11              0                 0          Certification/          accreditation              14              0                 0          Software controls           1              0                 0          Total                     145             55                 -                 According to many agency officials, budget constraints and                 lack of adequate top management support--in terms of                 resources and commitment--were key reasons why security                 controls had not yet been implemented.                 Although some officials stated that the planning process has                 raised management awareness of computer security issues,                 this awareness has, for the most part, apparently not yet                 resulted in increased resources for computer security                 programs.  A number of officials said that security has been                 traditionally viewed as overhead and as a target for budget                 cuts.  Some officials noted that requests for funding of                 contingency planning, full-time security officers, and                 training for security personnel and managers have a low                 approval rate.                 NIST/NSA REVIEW FEEDBACK WAS GENERAL                 ------------------------------------                 AND OF LIMITED USE TO AGENCIES                 ------------------------------                 Agency officials said that the NIST/NSA review comments and                 recommendations on their plans were general and of limited                 use in addressing specific problems.  However, because the                 plans were designed to be brief and minimize the risks of                 unauthorized disclosure, they had little detailed                 information for NIST and NSA to review.  Thus, the NIST/NSA                 review team focused their comments on (1) the plans'                 conformity with the OMB planning guidance and (2)                 governmentwide guidance (e.g., NIST Federal Information                 Processing Standards publications) relating to planned                 security controls.  (Appendix IV provides an example of                 typical NIST/NSA review comments and recommendations.)                                          7                 B-238954                 Despite the limited agency use of the feedback, NIST                 officials said that the information in the plans will be                 useful to NIST in identifying broad security weaknesses and                 needs.  During the review process, the NIST/NSA review team                 developed a data base that included the status of security                 controls for almost 1,600 civilian plans.  NIST intends to                 use statistics from the data base to support an upcoming                 report on observations and lessons learned from the planning                 and review process.  Noting that the data have limitations--                 for example, varying agency interpretations of "in place"--                 NIST officials said that areas showing the greatest                 percentage of planned controls indicated areas where more                 governmentwide guidance might be needed.  Appendix V shows                 the status of security controls in the civilian plans,                 according to our analysis of the NIST/NSA data base.4                 REVISED GUIDANCE PROVIDES                 -------------------------                 FOR AGENCY ASSISTANCE                 ---------------------                 The 1990 draft OMB security planning guidance calls for                 NIST, NSA, and OMB to provide advice and technical                 assistance on computer security issues to federal agencies                 as needed.  Under the guidance, NIST, NSA, and OMB would                 visit agencies and discuss (1) their computer security                 programs, (2) the extent to which the agencies have                 identified their sensitive computer systems, (3) the quality                 of their security plans, and (4) their unresolved internal                 control weaknesses.  NIST officials said that the number of                 agencies visited in fiscal year 1991 will depend on that                 year's funding for NIST's Computer Security Division, which                 will lead NIST's effort, and the number of staff provided by                 NSA.                 In addition, under the 1990 draft guidance, agencies would                 develop plans for sensitive systems that are new or                 significantly changed, did not have a plan for 1989, or had                 1989 plans for which NIST and NSA could not provide comments                 because of insufficient information.  Agencies would be                 required to review their component agency plans and provide                 independent advice and comment.                 CONCLUSIONS                 -----------                 The government faces new levels of risk in information                 security because of increased use of networks and computer                4NIST and NSA deleted agency and system names from the data                 base provided to us.                                          8                 B-238954                 literacy and greater dependence on information technology                 overall.  As a result, effective computer security programs                 are more critical than ever in safeguarding the systems that                 provide essential government services.                 The planning and feedback process was an effort to                 strengthen computer security by helping agencies identify                 and assess their sensitive system security needs, plans, and                 controls.  However, the plans created under the process were                 viewed primarily as reporting requirements, and although the                 process may have elevated management awareness of computer                 security, as yet it has done little to strengthen agency                 computer security programs.                 OMB's draft planning security guidance creates the potential                 for more meaningful improvements by going beyond planning                 and attempting to address broader agency-specific security                 problems.  However, although NIST, NSA, and OMB assistance                 can provide an impetus for change, their efforts must be                 matched by agency management commitment and actions to make                 needed improvements.  Ultimately, it is the agencies'                 responsibility to ensure that the information they use and                 maintain is adequately safeguarded and that appropriate                 security measures are in place and tested.  Agency                 management of security is an issue we plan to address in our                 ongoing review of this important area.                                        ---  --- ---                 As requested, we did not obtain written agency comments on                 this report.  We did, however, discuss its contents with                 NIST, OMB, and NSA officials and have included their                 comments where appropriate.  We conducted our review between                 July 1989 and March 1990, in accordance with generally                 accepted government auditing standards.                 As arranged with your office, unless you publicly release                 the contents of this report earlier, we plan no further                 distribution until 30 days after the date of this letter.                 At that time we will send copies to the appropriate House                 and Senate committees, major federal agencies, OMB, NIST,                 NSA, and other interested parties.  We will also make copies                 available to others on request.                 This report was prepared under the direction of Jack L.                 Brock, Jr., Director, Government Information and Financial                 Management, who can be reached at (202) 275-3195.  Other                 major contributors are listed in appendix VI.                                          9                 B-238954                 Sincerely yours,                 Ralph V. Carlone                 Assistant Comptroller General                                         10                 B-238954                                          CONTENTS                     Page                                          ---------                    ----                 LETTER                                                  1                 APPENDIX                    I     Objectives, Scope, and Methodology             12                    II    Plans GAO Reviewed                             14                    III   Computer Security and Privacy Plan             16                    IV    NIST/NSA Feedback on Computer Security Plans   21                    V     Status of Security Controls in 1,542 Plans     22                    VI    Major Contributors to This Report              24                 Related GAO Products                                    25                 TABLE                    1     Implementation of Security Controls in 22       6                          Plans                                        ABBREVIATIONS                                        -------------

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
午夜精品久久久久久久久| 蜜臀va亚洲va欧美va天堂| 在线成人免费视频| 国产成人免费视频网站 | av在线免费不卡| 日韩av网站免费在线| 亚洲特黄一级片| 国产亚洲精品精华液| 91超碰这里只有精品国产| 99久久国产综合精品女不卡| 久久99久久久久| 性欧美大战久久久久久久久| 亚洲视频你懂的| 久久久三级国产网站| 91精品国产综合久久香蕉麻豆| 97久久久精品综合88久久| 国产在线视频一区二区| 青青国产91久久久久久| 一区二区视频在线| 国产精品网站导航| 久久久久国产精品麻豆ai换脸| 欧美人狂配大交3d怪物一区| 99国产精品国产精品毛片| 国产一区二区三区美女| 奇米精品一区二区三区在线观看| 亚洲狠狠丁香婷婷综合久久久| 中文字幕精品综合| 国产亚洲女人久久久久毛片| 精品久久久久久久久久久久久久久| 欧美久久一二三四区| 欧美日韩一二三区| 欧美视频一区二区三区| 在线视频欧美精品| 欧美午夜一区二区三区| 91麻豆精东视频| 91成人免费在线| 在线视频你懂得一区| 色呦呦一区二区三区| 91福利视频网站| 欧美在线|欧美| 欧美日韩国产精品自在自线| 欧美日韩综合色| 欧美色成人综合| 欧美精品色综合| 日韩一级片网址| 日韩一区二区在线看| 日韩亚洲欧美成人一区| 欧美不卡视频一区| 久久无码av三级| 久久久噜噜噜久噜久久综合| 国产欧美日韩另类一区| 国产精品久久网站| 亚洲欧美日韩在线| 亚洲一区二区在线免费观看视频| 亚洲图片一区二区| 日韩精品久久理论片| 久久er99精品| aaa欧美大片| 91黄视频在线| 欧美一区二区三区色| 精品免费99久久| 中文字幕在线不卡一区| 亚洲综合一区在线| 日韩精品国产欧美| 国产成人午夜精品5599| 成人app软件下载大全免费| 欧美在线视频你懂得| 欧美一区二区免费视频| 久久久精品天堂| 亚洲欧美日韩国产另类专区| 亚洲va天堂va国产va久| 久久精品国产久精国产| 成人性生交大片免费看中文| 色域天天综合网| 精品少妇一区二区三区视频免付费 | 成人综合激情网| 在线免费av一区| 欧美精品一区男女天堂| 亚洲免费观看高清完整版在线观看熊 | 国产乱码精品一区二区三区五月婷| 国产福利精品一区二区| 91福利社在线观看| 欧美tk丨vk视频| 亚洲精品中文在线| 国产一区二区三区| 在线观看免费一区| 久久夜色精品国产噜噜av| 亚洲丝袜制服诱惑| 麻豆精品国产91久久久久久| 9l国产精品久久久久麻豆| 这里只有精品视频在线观看| 国产精品狼人久久影院观看方式| 日本伊人色综合网| 91视频www| 久久久精品综合| 三级亚洲高清视频| av在线不卡网| 精品国产免费人成在线观看| 一区二区三区在线视频播放| 国产精品亚洲人在线观看| 欧美男男青年gay1069videost| 国产精品二区一区二区aⅴ污介绍| 免费欧美在线视频| 色嗨嗨av一区二区三区| 久久精品一级爱片| 久久精品国产免费看久久精品| 色婷婷久久综合| 国产精品日韩成人| 加勒比av一区二区| 91麻豆精品国产91久久久使用方法| 国产精品国产三级国产普通话蜜臀 | 制服丝袜亚洲色图| 亚洲精品视频在线观看网站| 成人黄色一级视频| 久久影院电视剧免费观看| 日韩国产欧美视频| 欧美三级三级三级爽爽爽| 亚洲视频免费在线| 99v久久综合狠狠综合久久| 国产亚洲婷婷免费| 国产一区二区三区综合| 日韩亚洲欧美在线| 免费观看在线综合色| 欧美精品v国产精品v日韩精品| 亚洲激情图片qvod| 日本丶国产丶欧美色综合| 亚洲丝袜美腿综合| 99精品欧美一区二区蜜桃免费| 中文字幕精品一区| 福利91精品一区二区三区| 久久综合狠狠综合| 狠狠色丁香婷综合久久| 欧美成人a在线| 国产呦精品一区二区三区网站| 日韩小视频在线观看专区| 裸体健美xxxx欧美裸体表演| 欧美一二三区在线| 黄一区二区三区| 精品国产a毛片| 国产另类ts人妖一区二区| 国产亚洲欧洲997久久综合| 国产精品一卡二卡| 国产精品激情偷乱一区二区∴| av网站免费线看精品| 日韩毛片精品高清免费| 色老汉av一区二区三区| 亚洲自拍欧美精品| 欧美日韩精品系列| 麻豆国产一区二区| 国产亲近乱来精品视频| 成人白浆超碰人人人人| 一区二区三区在线观看国产| 欧美亚洲高清一区二区三区不卡| 亚洲大片精品永久免费| 欧美一区二区成人6969| 激情文学综合网| 国产女人18毛片水真多成人如厕 | 美女网站一区二区| 久久久久久久久97黄色工厂| 成+人+亚洲+综合天堂| 一区二区三区四区视频精品免费| 欧美伊人久久久久久久久影院 | 国产露脸91国语对白| 亚洲国产精品v| 欧美影院一区二区三区| 免费av成人在线| 国产日产欧美一区| 色综合久久88色综合天天免费| 亚洲1区2区3区4区| 久久久久国产精品人| 在线精品视频小说1| 久久国产精品一区二区| 国产精品传媒入口麻豆| 欧美丰满少妇xxxbbb| 国产精品亚洲а∨天堂免在线| 亚洲欧美日韩国产一区二区三区 | 高清成人免费视频| 一个色妞综合视频在线观看| 91精品一区二区三区久久久久久 | 91视视频在线观看入口直接观看www | 蜜臀av一级做a爰片久久| 欧美国产成人在线| 欧美少妇bbb| 国产suv精品一区二区883| 亚洲成人在线观看视频| 国产欧美一区二区三区在线看蜜臀| 色诱亚洲精品久久久久久| 极品少妇一区二区三区精品视频 | 五月天激情小说综合| 国产精品久久久久精k8| 日韩亚洲欧美中文三级| 色综合久久99| 国产精品一区二区在线观看不卡 | 色婷婷综合激情| 国产中文字幕一区| 五月综合激情网| 国产精品色婷婷久久58| 日韩免费观看高清完整版 | 色综合久久88色综合天天6 | 高清av一区二区|