Skip Navigation

Scout Archives

Home Projects Publications Archives About Sign Up or Log In

Browse Resources

(2 classifications) (5 resources)

Computer networks -- Security measures -- United States

Classification
Evaluation. (1)
Periodicals (2)

Resources

View Resource Information Security: Computer Attacks at Department of Defense Pose Increasing Risk (GAO/AIMD-96-84)

Full text of a recently released GAO (General Accounting Office) report, "Information Security: Computer Attacks at Department of Defense Pose Increasing Risks," (GAO/AIMD-96-84) is available from the Government Printing Office Web site. Among GAO's findings are: "only about 1 in 500 attacks is detected and reported, but the Defense Information Systems Agency (DISA) estimates that DOD is attacked...

https://www.govinfo.gov/content/pkg/GAOREPORTS-AIMD-96-84/pd...
View Resource Markle Foundation: The Task Force on National Security in the Information Age

The main feature of this Web site is the report titled "Protecting America's Freedom in the Information Age," released in October 2002. It examines how to effectively use information technology to collect and analyze information pertinent to national security. The report states that current government practices are insufficient in this area, and it is laden with recommendations for improving the...

https://www.markle.org/national-security/
View Resource RAND Classics

The RAND Corporation has recently added selections from the writings of Albert Wohlstetter to its well known RAND Classics site. Wohlstetter "was a mathematical logician and senior staff member at RAND in the 1950s and 1960s.... His studies led to the 'second-strike' and 'Fail-Safe' concepts for deterring nuclear war. These and other methods reduced the probability of accidental war." At present,...

https://www.rand.org/pubs/classics.html
View Resource Safeguarding Your Technology: Practical Guidelines for Electronic Education Information Security

This new publication from the National Center for Education Statistics (NCES) explains the necessity for developing a comprehensive and customized electronic security policy and offers guidance to educational administrators in devising and implementing one. The report is organized in ten chapters, addressing topics such as risk assessment; development and implementation of security policy;...

https://nces.ed.gov/pubs98/98297.pdf
View Resource TCPA: Trusted Computing Platform Alliance

The Trusted Computing Platform Alliance (TCPA) is one of the most high-profile operations for the development and adoption of an industry standard for personal computer security. The main participants in the TCPA are Compaq, HP, IBM, Intel, and Microsoft. This Web site has many documents written for or about the alliance. The most significant resource is the latest version of the main...

https://mako.cc/talks/20030416-politics_and_tech_of_control/...