{ "id": "R42619", "type": "CRS Report", "typeId": "REPORT", "number": "R42619", "active": false, "source": "Federation of American Scientists, EveryCRSReport.com, University of North Texas Libraries Government Documents Department", "versions": [ { "source": "Federation of American Scientists", "sourceLink": "https://sgp.fas.org/crs/", "id": "R42619_FAS", "date": "2016-10-20", "retrieved": "2016-10-20T23:30:12", "title": "Overview of U.S. Domestic Response to the 2019 Novel Coronavirus (2019-nCoV)", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20161020_R42619_f9720a4c8f9998f18a72c5a8acdee515b5c48c83.pdf" }, { "format": "HTML", "filename": "files/20161020_R42619_f9720a4c8f9998f18a72c5a8acdee515b5c48c83.html" } ], "topics": [] }, { "source": "EveryCRSReport.com", "id": 449586, "date": "2016-02-10", "retrieved": "2016-04-06T17:12:35.211375", "title": "Cybersecurity: CRS Experts", "summary": "Concerns about information-system security and other aspects of cybersecurity are long-standing. The frequency, impact, and sophistication of cyberattacks and the growth of cybercrime and cyberespionage have added urgency to the concerns. Consensus has been growing that the policy framework for cybersecurity take into account the diversity and continuing evolution of the technology and threats\u2014from spam to botnets to hacktivism, cyberterrorism, and cyberwar\u2014and the increasing role of the Internet in the U.S. economy and the lives of citizens. Among the issues the 114th Congress is expected to continue confronting are cybersecurity for critical infrastructure, most of which is owned by the private sector; sharing of unclassified and classified information, with protection of privacy and civil liberties; prevention of and response to domestic and international cybercrime; cyberspace and national security; and federal funding to protect information systems.\nCybersecurity, cyber security, information security, computer, information technology, information assurance, e-security, web security, cybercrime, cyber crime, computer crimes, cyber attacks, computer fraud, identity theft, hackers, hack, cyberterrorism, cyberwar, data breach notification, cyber espionage, cyberespionage, Chief Information Officers (CIOs), Department of Homeland Security (DHS), Intelligence Community (IC), National Security Agency (NSA), Science agencies (NIST, NSF, OSTP), banks, financial agencies, Federal Information Security Management Act (FISMA), Internet, Einstein, hacktivism, information sharing, classified information, Freedom of Information Act (FOIA), privacy and civil liberties, critical infrastructure, information infrastructure, chemical industry, defense industrial base, electricity grid, banks, financial institutions, industrial control systems, SCADA, Stuxnet, Flame, advanced persistent threat, public/private partnerships, supply chain, botnet, cloud computing, mobile devices, Internet of things, big data, dark web, smartphone, tablet computer, data center, research and development (R&D), server, network, threat, vulnerability, data security, data assurance, risk management H.R. 3490, H.R. 757, H.R. 1560, H.R. 1731, H.R. 3510, H.R. 3598, H.R. 3869, H.R. 3878, H.R. 4127, S. 178, S. 456, S. 754, CISPA, CISA, NCPAA, PCNA, CSA\nCybersecurity, cyber security, information security, computer, information technology, information assurance, e-security, web security, cybercrime, cyber crime, computer crimes, cyber attacks, computer fraud, identity theft, hackers, hack, cyberterrorism, cyberwar, data breach notification, cyber espionage, cyberespionage, Chief Information Officers (CIOs), Department of Homeland Security (DHS), Intelligence Community (IC), National Security Agency (NSA), Science agencies (NIST, NSF, OSTP), banks, financial agencies, Federal Information Security Management Act (FISMA), Internet, Einstein, hacktivism, information sharing, classified information, Freedom of Information Act (FOIA), privacy and civil liberties, critical infrastructure, information infrastructure, chemical industry, defense industrial base, electricity grid, banks, financial institutions, industrial control systems, SCADA, Stuxnet, Flame, advanced persistent threat, public/private partnerships, supply chain, botnet, cloud computing, mobile devices, Internet of things, big data, dark web, smartphone, tablet computer, data center, research and development (R&D), server, network, threat, vulnerability, data security, data assurance, risk management, H.R. 3490, H.R. 757, H.R. 1560, H.R. 1731, H.R. 3510, H.R. 3598, H.R. 3869, H.R. 3878, H.R. 4127, S. 178, S. 456, S. 754, CISPA, CISA, NCPAA, PCNA, CSA\nCybersecurity, cyber security, information security, computer, information technology, information assurance, e-security, web security, cybercrime, cyber crime, computer crimes, cyber attacks, computer fraud, identity theft, hackers, hack, cyberterrorism, cyberwar, data breach notification, cyber espionage, cyberespionage, Chief Information Officers (CIOs), Department of Homeland Security (DHS), Intelligence Community (IC), National Security Agency (NSA), Science agencies (NIST, NSF, OSTP), banks, financial agencies, Federal Information Security Management Act (FISMA), Internet, Einstein, hacktivism, information sharing, classified information, Freedom of Information Act (FOIA), privacy and civil liberties, critical infrastructure, information infrastructure, chemical industry, defense industrial base, electricity grid, banks, financial institutions, industrial control systems, SCADA, Stuxnet, Flame, advanced persistent threat, public/private partnerships, supply chain, botnet, cloud computing, mobile devices, Internet of things, big data, dark web, smartphone, tablet computer, data center, research and development (R&D), server, network, threat, vulnerability, data security, data assurance, risk management, H.R. 3490, H.R. 757, H.R. 1560, H.R. 1731, H.R. 3510, H.R. 3598, H.R. 3869, H.R. 3878, H.R. 4127, S. 178, S. 456, S. 754, CISPA, CISA, NCPAA, PCNA, CSA", "type": "CRS Report", "typeId": "REPORTS", "active": true, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/R42619", "sha1": "5d3e4d4fcb709b14f4498379ed9ebe70dd9746ec", "filename": "files/20160210_R42619_5d3e4d4fcb709b14f4498379ed9ebe70dd9746ec.html", "images": null } ], "topics": [ { "source": "IBCList", "id": 4300, "name": "Cybersecurity" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc805197/", "id": "R42619_2012Jul23", "date": "2012-07-23", "retrieved": "2016-03-19T13:57:26", "title": "Cybersecurity: CRS Experts", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20120723_R42619_da035422fe9d0f95a03c72d57640a1125b8e70cb.pdf" }, { "format": "HTML", "filename": "files/20120723_R42619_da035422fe9d0f95a03c72d57640a1125b8e70cb.html" } ], "topics": [] } ], "topics": [ "American Law", "Economic Policy", "Energy Policy", "Intelligence and National Security", "Science and Technology Policy" ] }