How much funding would NIST require to fully implement objectives of the Computer Security Act of 1987?
• Mr. Kammer. We are not currently funded to respond to many requests. • Mr. Jacobs. The number of people is seriously limited. • Mr. Rhodes. We had 15 people onsite at NASA at any one time, and at the time we were working with NSA to train additional people. Q.8 Chairwoman Morella. What do we do re diverting money from security to other areas such as Y2K? • Mr. Rhodes. Many agencies are buying equipment under the Y2K banner. They are taking money from everywhere including security for Y2K. • Mr. Jacobs. Much of the data collected for Y2K is relevant to the computer security problem. • Mr. Kammer. Don’t consider it is a bad thing in using funds from other areas for Y2K. Q.9 Chairwoman Morella. I’m beginning to wonder if we don’t need to task agencies to report to us what they are doing from a computer security standpoint? • Mr. Kammer. Believe this would be valuable. • Mr. Jacobs. Can’t disagree with that. • Mr. Rhodes. Think value of reporting would be the standardization in reporting