StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Effectiveness Of Federal Information Security - Research Paper Example

Cite this document
Summary
The paper "Effectiveness Of Federal Information Security" discusses whether the risk to information technology systems in Federal Agencies and the IT industry between 2002 and 2005 has been decreased as a result of implementing the Federal Information Security Management Act of 2002…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.6% of users find it useful
Effectiveness Of Federal Information Security
Read Text Preview

Extract of sample "Effectiveness Of Federal Information Security"

Download file to see previous pages

In part II (3.0 -- 3.7) we shall focus attention on plans and efforts to implement the Federal Information Security Management Act (FISMA) by the computer security division of NIST. NIST has created what it describes as the "FISMA Implementation Project" which NIST has broken down into three phases. Phase I discusses security standards and Guidelines, Phase II delves into organizational accreditation program while phase III is called the Security Tool Validation Program. We review to Department of Defense (DoD) security certification and accreditation (DITSCAP) program.

We take a look too at funding sources for implementing FISMA and how the private sectors are reacting to FISMA.Part III of this thesis (4.0 - 5.0) takes a deep look at the impact of FISMA in federal government agencies and departments and compliance efforts. We examine a few case studies and then move on to look at the private sector compliance initiatives, including software produced by the private sector software industry to help government agencies and departments achieve compliance easily We link how the various policies, circulars and presidential executive orders shaped management of information and information systems in the federal government.

Our methodology is to link how the various policies, circulars, and presidential executive orders shaped the management of information and information systems in the federal government. We analyze the US Government Accounting Office (GAO, 2006) report and the House 'FISMA Report Card' (Federal Computer Security Grades: 2001 -2005)In the Thesis conclusion, we show that FISMA has, in fact, reduced the risk, albeit slowly, to information security in Federal Agencies.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Effectiveness Of Federal Information Security Research Paper, n.d.)
Effectiveness Of Federal Information Security Research Paper. Retrieved from https://studentshare.org/information-technology/1518630-information-security-master-essay
(Effectiveness Of Federal Information Security Research Paper)
Effectiveness Of Federal Information Security Research Paper. https://studentshare.org/information-technology/1518630-information-security-master-essay.
“Effectiveness Of Federal Information Security Research Paper”, n.d. https://studentshare.org/information-technology/1518630-information-security-master-essay.
  • Cited: 0 times

CHECK THESE SAMPLES OF Effectiveness Of Federal Information Security

Security Risk Management Process in the Organization

The paper "security Risk Management Process in the Organization" describes the process for analyzing needs identified through a risk assessment and evaluates how many courses of action should be developed to eliminate, reduce, or mitigate risk and contribution of the transfer of knowledge between the security assessment team and firm's staff.... hellip; A security risk assessment plays a very important role in the security management process as it provides information concerning the risks, threats and assets to an organization....
6 Pages (1500 words) Essay

Securing the U.S. Southern Border: an Assessment of the Department of Homeland Security

Otherwise, failure to establish high-tech and appropriate information security systems would expose the United States to high-risks of poor response to emergencies and border security breaches.... In spite of the technological advances in the DHS's systems, the information security system of the department has often been blamed for poor responses in emergency cases and failure to effectively protect the southern borders.... For instance, if the department's information security system is not comprehensive enough to protect the stored information and support the operations of the department, such vital information could be leaked to illegal organizations such as drug rings that infiltrate the U....
10 Pages (2500 words) Case Study

Federal required security within federal buildings

Federal government facilities and buildings' security is of utmost importance as it not only affects the daily activities of the federal government, but it also affects the safety, health, and well-being of federal employees as well as the public at large.... Unfortunately, over the years, federal government This paper delves into this topic of federal security within federal buildings.... Reese and Tong explain that federal building security comprises of activities such as the everyday interaction of federal Protective Service (FPS) and its federal clients, the federal agency interaction with contact security guard companies and the coordination between the FPS and United States Marshals Service (USMS)....
7 Pages (1750 words) Research Paper

Maritime and Port Security Initiatives by Federal Agencies

With this, port security has become a critical area of debate for the US… The focus has shifted into developing and responding to proposals aimed at making maritime and port security better in order to protect the American population from preventable acts of terror.... Presently, the American maritime With the rise in terror threats, containers ships have become the area of security scrutiny as security agents view them as vulnerable to terrorist attacks and activities....
10 Pages (2500 words) Research Paper

Information System Security Plans

A nation can protect itself from threats and reach the top echelons only if its security system is made optimal and effective without any chance of loopholes.... This is where the role of a security plan assumes significance.... A foolproof security plan for the nation's federal… cies and other governmental organizations can enable it to function securely and efficiently thereby giving the nation an ‘edge' over other nations.... That is, once agencies' security structures and critical information are secured, they can operate without any threats, Then, with todays rapidly changing political, economic, and importantly technical environment increasing the threat for the federal agencies, it becomes paramount for those agencies to adopt a strong security plan....
5 Pages (1250 words) Research Paper

Importance of Information Security Policy

This coursework "Importance of information security Policy" focuses on information security policy that ensures the credibility of information by safeguarding it from unauthorized infiltration.... The importance of information security policy is essential to all business models.... nbsp;… information security policy is a compilation of guidelines, procedures and processes, which ensure the safety of information in a business or an organization....
9 Pages (2250 words) Coursework

Effectiveness and Extent of the Convergence between Public and Private Security over the Next Decade

The author of the paper states that the convergence between private security and public security is a contemporary issue that has been embraced throughout the world in order to enhance innovation and technological advancement in security sectors across the world… All these viewpoints have an impact on the security profession by showing the dynamics and effects of those dynamics in the security sector so that security agents will know how to respond appropriately to those changes in the security sector through partnership and collaboration between private security and public security over the next decade es helping private firms and individuals to identify crime and other insecurity problems and report them to the government officials for law enforcement....
11 Pages (2750 words) Research Paper

Issues Related to Security Interoperability and Operations

More importantly, the best IT security controls would be the one giving way to the promotion of objectives as well as measurable progress indicators in aspect like information security, item progress, and operations among others.... This case study "Issues Related to security Interoperability and Operations" focuses on the issues faced by Banking Solutions Inc, a number of them are related to security, interoperability, and operations.... The last update was done back in the year 2009, two year after it was created in 2007, which shows the inconsistence of maintaining often update as required in data and information management....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us