Computer Security

The subcommittee investigated why the implementation of the Computer Securities Act of 1987 had been stalled. The Computer Securities Act of… read more

The subcommittee investigated why the implementation of the Computer Securities Act of 1987 had been stalled. The Computer Securities Act of 1987 required federal agencies to secure their computer systems and called upon the National Institute of Standards and Technology to develop computer security guidelines. The act had met opposition from the National Security Agency which questioned the need for computer security guidelines for its system known as Public Key Cryptology. This system was already considered one of the most effective computer security systems. The supporters of the guidelines maintained the necessity of compatible standards to lock out unwanted intruders. The Internal Revenue Service, Federal Reserve System, Social Security Administration and the United States Air Traffic Control rely on systems that are considered vulnerable to large scale destruction of data or computer terrorism. close

Report Video Issue

People in this video

  • Duane Andrews Assistant Secretary Department of Defense->Command, Control, and Intelligence
  • D. James Bidzos President RSA Data Security, Inc.
  • Steven Broadbent Deputy Assistant Secretary Department of the Treasury->Information Systems
  • Jack Brock Director General Accounting Office->Information Management and Technology
  • James Burrows Director National Computer Systems Laboratory
  • Thomas Giammo Assistant Commissioner Department of Commerce->U.S. Patent and Trademark Office
  • Walter Hutton Assistant Chief Information Systems Management->Information
  • John Lyons Director National Institute of Standards and Technology
  • James MacRae Administrator (Acting) Office of Management and Budget->Information
  • Beverly Peterson Evaluator General Accounting Office
  • Martin Pozesky Associate Administrator Federal Aviation Administration->System Engineering and Development
  • Franklin Reeder Administrator Office of Management and Budget->Information
  • James Ryan Director IBM (International Business Machines)->Office of Data Systems
  • Clifford Stoll Astronomer Harvard-Smithsonian Center for Astrophysics->Astrophysics
  • Stephen Walker President Trusted Information Systems, Inc.
More People
More information about

Computer Security

467 Views
Program ID:
13639-1
Category:
House Committee
Format:
House Committee
Location:
Washington, District of Columbia, United States
First Aired:
Aug 20, 1990 | 11:42pm EDT | C-SPAN 2
Last Aired:
Aug 26, 1990 | 2:04am EDT | C-SPAN 2

Airing Details

  • Aug 20, 1990 | 11:42pm EDT | C-SPAN 2
  • Aug 21, 1990 | 12:20pm EDT | C-SPAN 2
  • Aug 25, 1990 | 12:42pm EDT | C-SPAN 1
  • Aug 26, 1990 | 2:04am EDT | C-SPAN 2
Purchase a Download

Computer Security

  • MP4 video - Standard
    Price:
    $9.99 or Free with MyC‑SPAN
  • MP3 audio - Standard
    Price:
    $0.99

User Created Clips from This Video