Information Research Specialist
Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which also makes a response problematic.
Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics.
This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on
· “Hearings in the 112th Congress”
· “Executive Orders and Presidential Directives”
· “Data and Statistics”
· “Cybersecurity Glossaries”
· “Reports by Topic”
o Government Accountability Office (GAO) reports
o White House/Office of Management and Budget reports
o Cloud Computing
o Critical Infrastructure
o National Strategy for Trusted Identities in Cyberspace (NSTIC)
o Research and Development (R&D)
o “Related Resources: Other Websites”The report will be updated as needed. .
Date of Report: May 8, 2012
Number of Pages: 57
Order Number: R42507
Follow us on TWITTER at http://www.twitter.com/alertsPHP or #CRSreports
Document available via e-mail as a pdf file or in paper form.
To order, e-mail Penny Hill Press or call us at 301-253-0881. Provide a Visa, MasterCard, American Express, or Discover card number, expiration date, and name on the card. Indicate whether you want e-mail or postal delivery. Phone orders are preferred and receive priority processing.