Introduction -- Background -- Issues for Congress -- Legislative activity -- Appendix A. Planning for a cyberattack -- Appendix B. Characteristics of malicious code -- Appendix C. Similarities in tactics used for cyberattacks and conventional terrorist attacks.