Federal Information Security Management (FISMA)

Improved Essays
The Federal Information Security Management (FISMA) was set up by the United States government for cyber security purposes such as to increase the level of security of software applications, systems and databases. As stated by (Kim, n.d.), “When FISMA was enacted, its purpose was to ensure that federal agencies secure the information contained in the non-defense information systems of the Unites States government”. To protect the systems and data it is important to have a security plan developed for not just federal agencies but also for the government contractors and organizations affiliated with the information. According to (Kim, n.d.), “These grades have trended slightly upward in recent years, with the grades from 2005 through 2007 being

Related Documents

  • Decent Essays

    GreatThinker GFC, one of the numerous federal agencies in Washington DC that has to adopt those minimum set of security controls developed by National Institute of Standards and Technology (NIST) to protect their information and information systems. The NIST developed the Federal Information Processing Standard (FIPS) 200, containing minimum security requirements for Federal Information and Information Systems, specifies the minimum security requirements for federal information and information systems in seventeen security-related areas. Federal agencies must meet the minimum security requirements defined in FIPS 200 through the use of the security controls in NIST Special Publication 800-53, Recommended Security Controls for Federal Information…

    • 120 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    9/11 Research Paper

    • 1403 Words
    • 6 Pages

    FISA is a court order approving electronic surveillance or the search of a target who is suspected of acting on behalf of a foreign power or terrorist organization. The use of FISA after the attacks skyrocketed. In her article “Surveillance and Transparency” Valerie Caproni states, “After 9/11, the FBI moved thousands of agents who had been working traditional white-collar cases, bank robbery cases, and narcotic cases and put them to work in the national security area” (Caproni). Not only are there more people now working on national security through FISA, but they have a wider scope of ability. “Pre-9/11 it was almost impossible for agents working on a national security investigation that was using FISA to share the information they were collecting with criminal agents.…

    • 1403 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    The Department of Homeland Security and the US Patriot Act where created and passed as a direct result of the terrorist attacks orchestrated on September 11, 2001. As a package, both work to preserve life and liberty to citizens of the United States, whether in the homeland or abroad. Therefore, the Department of Homeland Security, while utilizing the US Patriot Act, has partnered with local law enforcement in order to be on the front lines of detecting and preventing homeland terrorism. The Department of Homeland Security, through the use of the US Patriot Act, has affected the local criminal justice process through the militarization of law enforcement and the deployment of cutting edge surveillance techniques and equipment.…

    • 1384 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    To ensure our safety under the national security, we had to have partnership trust within our state, federal and local agencies. This made sharing information effective, that’s why we focus on the post 9-11 threat environment. To support preparedness efforts, there’re many of governmental, commercial, and non-governmental organizations that provide officials with homeland security alerts and updates along with state level government have fusion centers that integrate and analyze homeland security information. “The 9/11 terrorist attacks focused public attention on the need for better information sharing among intelligence, law enforcement, and emergency management agencies” (example 2016). The 9/11 Commission was a direct result in the agencies providing incentives for sharing, to restore a better balance between shared task, knowledge and security.…

    • 1534 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    This study discusses Section 702 of Foreign Intelligence Surveillance Act (FISA), formally known as “Procedures for Targeting Certain Persons Outside the United States Other than United States Persons” (codified as 50 U.S.C. § 1881a). Section 702 authorizes the National Security Agency (NSA) to target non-U.S. persons who are reasonably believed to be located outside the United States. President Jimmy Carter signed FISA into law in 1978, which established a judicially-approved process for conducting four types of electronic surveillance against foreign entities or their agents operating in the United States (Hearing, 2017, 2). The US government continues to use FISA for this purpose.…

    • 576 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Arguments Against FISA

    • 1115 Words
    • 5 Pages

    The argument exists in legal circles that the U.S. government could accomplish the same degree of protection and threat mitigation with other avenues and approaches to the terrorism and international crime problem set (source). Further, opponents of FISA have drawn attention to the idiosyncratic approval rate of FISA warrants. Between 1979 and 2012, agencies…

    • 1115 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    A good information security policy will take the mission of the company into consideration, the risks that the company faces, the protection of critical assets, and the effect that an attack would have on the organization if one occurred. Developing a security policy does not have to be marred with challenges, it is important that the roles and responsibilities throughout the organization are known, as well as a detailed accounting of what the policy will cover. Hence, an enterprise information security policy should establish and develop critical controls to reduce security risks to the organization, and must be compatible with state and federal regulations. In addition, an enterprise information security policy also integrates and formulates…

    • 631 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Y2K Crisis

    • 1120 Words
    • 5 Pages

    Having an effective security system for your organization is one of the most critical issues that the government and businesses face in this new era of technology. Technology has become the pivotal point of everything; it is a part of daily lives. There was a time where your cellphone was just a phone, now it’s a portable computer that is able to monitor your movement and health status (Jones & Aiken, 2014). In a world where millions of computers are connected to the Internet and one time, there are bound to be security issues at times. When attacks happen on the government and big businesses the outcome can disrupt the world around us.…

    • 1120 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Back in 2008 when President Obama was elected as president, he made it a priority to bring awareness cyber security being one the nation’s most important challenges. Even though he signed the Cybersecurity Act of 2015, he still believes that there is a lot more than needs to be done to secure our nation and the American people. Today, the President is directing his Administration to implement “a Cybersecurity National Action Plan (CNAP) that takes near-term actions and puts in place a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, maintain public safety as well as economic and national security, and empower Americans to take better control of their digital security” (The White House, 2016). The Cybersecurity National Action Plan will also cover several other laws and regulations to help private industries fight off cyber-attacks with the help from the…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Superior Essays

    The Computer Fraud and Abuse Act (CFAA) of 1986 was created during the Reagan Administration as the first significant federal legislation designed to combat the growing threat against computer based crimes. In the 1980 's, Congress would only have the vaguest of notions how computer technology would evolve as a medium for communications and social-networking. Lawmakers, at the time, recognized the federal interest of the U.S. government was to protect computers under control of a federal entity, part of a financial institution or somehow involved in interstate or foreign commerce. The CFAA was therefore a crucial piece of legislation that protected U.S. interest in terms of national security and financial information.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Forensic Analyst

    • 1169 Words
    • 5 Pages

    The Face Behind The Screen In 2012, Federal Bureau of Investigations Director Robert Mueller once said, “There are only two types of companies: those that have been hacked, and those that will be” (Crowley 12). Cyber security is a constant problem in this world; people use the internet daily, which hackers can easily circumvent. Law enforcement agencies have now started Cyber Divisions for local, state, and federal investigative cases.…

    • 1169 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Red Clay Power structure The company top pinnacle of authority is the chief executive officer, who is also the chairperson of the Board of Directors, and owns a 25% share. Second in authority is the chief finance office, who is a member of the board of directors, and also owns a 25% share. There are five other members of the board of directors who include the chief operating officer, the director of architecture and construction services, the director of information technology services, the director of human resource and the director of marketing and media. There is an IT committee that has five governors, who are responsible for the company’s information technology resources, and its operations and management. The individuals are abbreviated as: M&M, A&C, ITS, CR, and the HR (Red Clay Renovation Case Study, n.d.).…

    • 705 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Before a security manager can “sell” a strategy, the manager must first have a keen awareness of what the organization does and how security fits into it. The security manager must fully understand the organizational mission and what processes within the organization are needed to accomplish the mission. The security manager must be able to identify organizational assets, liabilities and threats. The vulnerability of system processes are identified and rated on a scale as to likelihood. Conducting a proper risk assessment which focuses efforts on the greatest hazards will help mitigate the confrontation of risks which threatens an organization’s survival.…

    • 811 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Characteristics of Good Risk Scenarios It is very important for risk scenarios to be realistic and unbiased so that the management feel assured while taking decisions. According to COBIT (2014), a risk scenario should have the following characteristics to add real value to risk analysis. • Relevance – Scenarios should be result in derivation of meaningful information that would help support decision making.…

    • 917 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Background A growing problem not only in the United States, but the rest of the world as well is Cyber-security (German, 2016). German (2016) states that the office of personal management or OMP reported an initial breach of 4.2 million personal records with another 15 million records that may have been compromised. Consequently, to identify the scope of the problems as well as the need for businesses of all types requires more research. Also, there is a need to focus on cyber-security as an essential part a business plan as well.…

    • 1198 Words
    • 5 Pages
    Improved Essays