{ "id": "R40836", "type": "CRS Report", "typeId": "REPORTS", "number": "R40836", "active": false, "source": "EveryCRSReport.com, University of North Texas Libraries Government Documents Department", "versions": [ { "source": "EveryCRSReport.com", "id": 356595, "date": "2010-01-12", "retrieved": "2016-04-07T02:04:01.165874", "title": "Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress", "summary": "Increasing focus on current cyber threats to federal information technology systems, nonfederal critical information infrastructure, and other nonfederal systems has led to numerous legislative cybersecurity proposals and executive branch initiatives. The proposed National Defense Authorization Act for Fiscal Year 2010 (NDAA FY2010) and the Intelligence Authorization Act for Fiscal Year 2010 (IIA FY2010) both contain provisions that would affect programs and funding for current and future cybersecurity-related programs. In May 2009, the Obama Administration issued its 60-day review of cybersecurity policy, declaring that U.S. information networks would be treated as a strategic national asset. \nThere is no single congressional committee or executive agency with primary responsibility over all aspects of cybersecurity; each entity involved pursues cybersecurity from a limited vantage point dictated by committee jurisdiction. Many different initiatives exist, but because of fragmentation of missions and responsibilities, \u201cstove-piping,\u201d and a lack of mutual awareness between stakeholders, it is difficult to ascertain where there may be programmatic overlap or gaps in cybersecurity policy.\nDrawing from common themes found in the Comprehensive National Cybersecurity Initiative (CNCI), a study by the Center for Strategic and International Studies (CSIS) Commission for the 44th Presidency, and the proposed near-term action plan from the President\u2019s recent Cyberspace Policy Review, this report identifies cybersecurity policy issues that have been proposed for priority consideration. The report lists and synopsizes current legislation at the time of this writing that has been developed to address various aspects of the cybersecurity problem. It then lists the status of the legislation and compares legislation with existing executive branch initiatives at the time of writing. Finally, analysis of information contained in executive branch initiatives and congressional legislation is used to further highlight cybersecurity-related considerations for Congress.\nThis report will not be updated.", "type": "CRS Report", "typeId": "REPORTS", "active": false, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/R40836", "sha1": "df9ae1b2edf38b08c577d628937c880f981bccf2", "filename": "files/20100112_R40836_df9ae1b2edf38b08c577d628937c880f981bccf2.html", "images": null }, { "format": "PDF", "encoding": null, "url": "http://www.crs.gov/Reports/pdf/R40836", "sha1": "ea31c80f66d03fb696e2be5a8a1f74d7b7ff580a", "filename": "files/20100112_R40836_ea31c80f66d03fb696e2be5a8a1f74d7b7ff580a.pdf", "images": null } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc505547/", "id": "R40836_2009Sep30", "date": "2009-09-30", "retrieved": "2015-05-29T05:37:21", "title": "Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress", "summary": "This report identifies cybersecurity policy issues that have been proposed for priority consideration. The report lists and synopsizes current legislation that has been developed to address various aspects of the cybersecurity problem. It then lists the current status of the legislation and compares legislation with existing executive branch initiatives. Finally, analysis of information contained in executive branch initiatives and congressional legislation is used to further highlight related considerations for Congress.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20090930_R40836_1632eedae28a3867c93b8cc6bf8670f725f388f1.pdf" }, { "format": "HTML", "filename": "files/20090930_R40836_1632eedae28a3867c93b8cc6bf8670f725f388f1.html" } ], "topics": [ { "source": "LIV", "id": "Cyberspace", "name": "Cyberspace" }, { "source": "LIV", "id": "Internet", "name": "Internet" }, { "source": "LIV", "id": "Security measures", "name": "Security measures" }, { "source": "LIV", "id": "Information technology", "name": "Information technology" } ] } ], "topics": [ "Intelligence and National Security", "National Defense" ] }