The subcommittee investigated why the implementation of the Computer Securities Act of 1987 had been stalled. The Computer Securities… read more
The subcommittee investigated why the implementation of the Computer Securities Act of 1987 had been stalled. The Computer Securities Act of 1987 required federal agencies to secure their computer systems and called upon the National Institute of Standards and Technology to develop computer security guidelines. The act had met opposition from the National Security Agency which questioned the need for computer security guidelines for its system known as Public Key Cryptology. This system was already considered one of the most effective computer security systems. The supporters of the guidelines maintained the necessity of compatible standards to lock out unwanted intruders. The Internal Revenue Service, Federal Reserve System, Social Security Administration and the United States Air Traffic Control rely on systems that are considered vulnerable to large scale destruction of data or computer terrorism. close
People in this video
- Duane Andrews Assistant Secretary Department of Defense->Command, Control, and Intelligence
- D. James Bidzos President RSA Data Security, Inc.
- Steven Broadbent Deputy Assistant Secretary Department of the Treasury->Information Systems
- Jack Brock Director General Accounting Office->Information Management and Technology
- James Burrows Director National Computer Systems Laboratory
- Thomas Giammo Assistant Commissioner Department of Commerce->Patent and Trademark Office
- Walter Hutton Assistant Chief Information Systems Management->Information
- John Lyons Director National Institute for Standards and Tech.
- James MacRae Administrator (Acting) Office of Management and Budget->Information
- Beverly Peterson Evaluator General Accounting Office
- Martin Pozesky Associate Administrator Federal Aviation Administration->System Engineering and Development
- Franklin Reeder Administrator Office of Management and Budget->Information
- James Ryan Director IBM->Office of Data Systems
- Clifford Stoll Astronomer Harvard-Smithsonian Center for Astrophysics->Astrophysics
- Stephen Walker President Trusted Information Systems, Inc.
Book Discussion on The Cuckoo's Egg
Dr. Stoll discussed his book, The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage.
Future of Communications Technology
Mr. Gates delivered the keynote address for this portion of the conference, discussing the development of new…
Future of Computing
Mr. Gates talked about computers and the future of the U.S. and about his new book, The Road Ahead. He talked…