Congress Addresses Cyber Security Once Again

    Date09 Apr 2001
    CategoryGovernment
    3301
    Posted ByAnthony Pell
    The security of the U.S. government's information technology (IT) systems is receiving renewed focus in the U.S. Congress. The House Oversight and Investigations Subcommittee April 5 heard testimony on efforts that various government agencies are taking to protect these systems. Subcommittee . . . The security of the U.S. government's information technology (IT) systems is receiving renewed focus in the U.S. Congress. The House Oversight and Investigations Subcommittee April 5 heard testimony on efforts that various government agencies are taking to protect these systems. Subcommittee Chairman Billy Tauzin, a Republican Congressman from Louisiana, opened the session expressing concern about reports of vulnerabilities across the government. Tauzin specifically referred to a newly completed independent auditor's report of the Department of Health and Human Services which showed that electronic data processing systems were weakly controlled, leaving them exposed to a variety of potential problems.

    According to the auditor's report, "Such weaknesses do not effectively prevent (1) unauthorized access to and disclosure of sensitive information, (2) malicious changes that could interrupt data processing or destroy data files, (3) improper Medicare payments, or (4) disruption of critical operations." Another witness at the hearing quoted a government study showing that the U.S. Army, Navy, and Air Force experienced more than 1,300 cyber attacks in 1999-2000.

    You are not authorised to post comments.

    LinuxSecurity Poll

    What is your favorite LinuxSecurity.com page/section?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    20
    radio
    [{"id":"73","title":"News","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"74","title":"Advisories ","votes":"5","type":"x","order":"2","pct":83.33,"resources":[]},{"id":"75","title":"HOWTOs","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"76","title":"Latest Features ","votes":"1","type":"x","order":"4","pct":16.67,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.