Federal Information Security Management Act: A Case Study

Improved Essays
The Federal Information Security Management Act also known as FISMA is United States federal law enactment established to ensure government data, operations and resources against regular or man-made dangers are protected. FISMA was created in 2002 Electronic Government Act of 2002 before cybersecurity became such a vast problem. Modifications were made to FISMA law and renamed Federal Information Security Modernization Act of 2014. The cybersecurity market is continuously expanding as the society rely upon the development and utilization of information technology systems. Within recent years, there has been an increase in the number security risks and data breaches. The National Institute of Standards and Technology, known as NIST, has defined

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    This author himself is a highly educated, college professor. Even with that perspective of being a scholar in this field of study for more than 5 years, Herb does not frame this article to be viewed by other highly educated university professors in his similar field of study. As I mentioned before he aims this article at a more general population. The actual audience of this piece would be subscribers to the Washington Post where this article was published. In addition to the subscribers, the ideal audience would include individuals in care about the Equifax hack or cyber space policy and security.…

    • 1616 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    9/11 Research Paper

    • 1403 Words
    • 6 Pages

    FISA is a court order approving electronic surveillance or the search of a target who is suspected of acting on behalf of a foreign power or terrorist organization. The use of FISA after the attacks skyrocketed. In her article “Surveillance and Transparency” Valerie Caproni states, “After 9/11, the FBI moved thousands of agents who had been working traditional white-collar cases, bank robbery cases, and narcotic cases and put them to work in the national security area” (Caproni). Not only are there more people now working on national security through FISA, but they have a wider scope of ability. “Pre-9/11 it was almost impossible for agents working on a national security investigation that was using FISA to share the information they were collecting with criminal agents.…

    • 1403 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    New tools accessible from the Patriot Act Before September 11th, 2001 (9/11) the United States Federal Government had methods of…

    • 836 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    In their recommendations, the commission concluded that clandestine and unchecked power could cause untold abuses. Additionally, they concluded that abuse of power required some degree of Congressional checks, which led to the formation of FISA (Foreign Intelligence Surveillance Act). The basis of FISA was that when the president wanted to target an American citizen to gather intelligence, he must first seek the permission of an independent judge in order to encroach on the privacy of the individual. It can be convincing to argue that when the president has powers to order the searching of homes, interception of communication and emails, the country is safer. However, this goes against the concept of a free of privacy society in which relative degrees of risk are taken in order to secure…

    • 1705 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    FISA can now be used to get a warrant to monitor citizens who are not linked to terrorism at all. Though a warrant is needed to monitor, the government has abused their power and used FISA to monitor citizen's electronics without one. The Effects of 9/11 on American Surveillance Because of the September 11th terrorist attacks, many facets of…

    • 859 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Patriot Act Essay

    • 1113 Words
    • 5 Pages

    The patriot act allows the government the right to check and monitor technology for the purpose of preventing terrorist activities. However, the government could be doing more than just preventing the act of terrorism. This act can also be referred to as, ‘Uniting and Strengthening America by Providing Appropriate…

    • 1113 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The Patriot Act reshaped the methods and collection techniques of government ordered surveillance (Welch, 2015). The Patriot Act enabled the government…

    • 231 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    The Electronic Communications Privacy Act, which updated the Federal Wiretap Act of 1968, expanded it to include provisions for interception of computer and other electronic communications. (DHS/Office for Civil Rights and Civil Liberties and DHS/Privacy Office) 3. The Foreign Intelligence Surveillance Act, enacted in 1978, a very effective method for monitoring the activities of foreign powers and agents of said powers while they operate within the United States. It was augmented even more with the enactment of the PATRIOT Act, which enhanced the federal government’s capacity to share intelligence, strengthened criminal laws against terrorism, removed obstacles to investigating terrorism, and updated the law to reflect new technology. (James G. McAdams)…

    • 1195 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Unjust Laws

    • 177 Words
    • 1 Pages

    In today's society, its many laws considered unjust laws. As human beings we should be able do what we want and not have to tell anyone else what we are doing or explain why. We as people shouldn’t have to worry about everything that we do. We should be able to enjoy the internet without worrying anything coming back to haunt us. Many laws today are unjust and innocently target privacy as an invasion due to the fact that we are being affected by all laws today.…

    • 177 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Superior Essays

    The Computer Fraud and Abuse Act (CFAA) of 1986 was created during the Reagan Administration as the first significant federal legislation designed to combat the growing threat against computer based crimes. In the 1980 's, Congress would only have the vaguest of notions how computer technology would evolve as a medium for communications and social-networking. Lawmakers, at the time, recognized the federal interest of the U.S. government was to protect computers under control of a federal entity, part of a financial institution or somehow involved in interstate or foreign commerce. The CFAA was therefore a crucial piece of legislation that protected U.S. interest in terms of national security and financial information.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays