Discusses the cyber threats to critical infrastructure and the Amer. economy. Pervasive and sustained cyber attacks against the U.S. continue to pose a potentially devastating impact on fed. and non-fed. systems and operations. In Feb. 2011, the Dir. of National Intelligence testified that, in the past year, there had been a dramatic increase in malicious cyber activity targeting U.S. computers and networks, incl. a more than tripling of the vol. of malicious software since 2009. This testimony describes: (1) cyber threats to cyber-reliant critical infrastructures and federal information systems; and (2) the continuing challenges federal agencies face in protecting the nation's cyber-reliant critical infrastructures and federal systems. A print on demand report.
Cloud computing, an emerging form of computing where users have access to scalable, on-demand capabilities that are provided through Internet-based technologies, has the potential to provide info. technology (IT) services more quickly and at a lower cost, but also to introduce IT risks. This report: (1) identified the models of cloud computing; (2) identified the info. security implications of using cloud computing services in the fed. gov¿t.; and (3) assessed fed. guidance and efforts to address info. security when using cloud computing. The auditor reviewed relevant pub., white papers, and other documentation from fed. agencies and industry groups; conducted interviews with rep. from these org.; and surveyed 24 major fed. agencies. Illus.
NARA is responsible for preserving access to gov't. documents and other records of historical significance and overseeing records management throughout the fed. gov't. NARA relies on the use of info. systems to receive, process, store, and track gov't. records. As such, NARA is tasked with preserving and maintaining access to increasing volumes of electronic records. This report determined whether NARA has implemented info. security controls (ISC) to protect the confidentiality, integrity, and availability of the info. and systems that support its mission. The report concludes that NARA has not effectively implemented ISC to protect the confidentiality, integrity, and availability of the info. and systems. A print on demand publication.