Critical Technologies Newsletter, Special Issue on Computer Security; TR-6-783

Rockville, MD: B-K Dynamics, Inc., 1986. Draft. Spiral bound. Various paginations (approximately 1/2 inch of material). Some ink corrections to draft noted. Contents include: a Department of Energy interview, the National Computer Security Center, Computer Security issues and opportunities, National policy structure, Classified Automated Data Processing Systems, Risk Assessment, Computer Security Plan, Glossary of Terms, Key Computer Security References/Information Sources, some industry participants at a Computer Security Industry symposium, selected computer security training courses, and upcoming computer security and related conferences. This final or near final draft presents a broad snapshot in time, the mid-1980s, of the state-of-the-art, the state-of-practice, and the state-of-knowledge in the accelerating field of computer security. The precedence for identifying select goods as "critical" arose in the 1920s when dependence on foreign imports of certain materials was judged to be a vulnerability for the U.S. military. Accordingly, Congress required that the U.S. maintain a strategic reserve of such "critical materials" in order to ensure readiness in case of military conflict. An extension of the same idea, i.e., that some technologies are critical for military readiness but also as fuel for economic growth, informed the Congress's use of the term in PL 101- 189. In this legislation mandating a critical technologies report, Congress defined "critical technologies" as "essential for the United States to develop to further the long-term national security or economic prosperity...." The phrase "critical technologies" as used in the legislation implies that some technologies are so fundamental to national security or so highly enabling of economic growth that the capability to produce these technologies must be retained or developed in the United States. Condition: Good.

Keywords: Michael Seaton, Computer Security, Critical Technologies, Classified Automated Data Processing, Risk Assessment, Security Plan, Computer Security Industry, Security Training, Technical Information, Security Conferences, Department of Energy, National

[Book #76502]

Price: $65.00

See all items in Computer Security