{"id":48932,"date":"2022-04-02T13:19:00","date_gmt":"2022-04-02T13:19:00","guid":{"rendered":"https:\/\/www.essaybishops.co.uk\/?p=48932"},"modified":"2022-11-02T13:21:45","modified_gmt":"2022-11-02T13:21:45","slug":"federal-information-security-management-act","status":"publish","type":"post","link":"https:\/\/www.essaybishops.com\/essays\/federal-information-security-management-act\/","title":{"rendered":"Federal Information Security Management Act"},"content":{"rendered":"<p>Federal Information Security Management Act<br \/>\nResearch objectives<br \/>\n\u2022\tDescribe the Federal Information security Management Act (FISMA) and the year it was enacted, and define its purpose.<br \/>\n\u2022\tExplain the responsibilities that it gives to the National Institute of Standards and Technology (NIST), the Office of Management and Budget (OBM), and federal agencies in its quest to strengthen the information security systems.<br \/>\n\u2022\tDescribe the implementation of FISMA, and how NIST works with federal agencies to improve their understanding and implementation of FISMA.<br \/>\n\u2022\tDescribe compliance framework as defined by FISMA and the supporting standards.<br \/>\n\u2022\tDescribe and discuss the critique of FISMA by Bruce Brody and Allan Paller.<br \/>\nQuestions<br \/>\n1.\tFISMA has brought attention about cyber security to the federal government, why is it important in terms of national security?<br \/>\n2.\tFISMA gives responsibilities to different agencies, what are the policies and procedures that it requires the head of these agencies to have in place?<br \/>\n3.\tExplain the responsibilities of NIST in developing programs that promote and validate the security of information systems and services.<br \/>\n4.\tWhy does Bruce Brody and Allan Paller describe as a well-intentioned but a fundamentally flawed tool?<\/p>\n<p>References<br \/>\n1.\tNIST, (2016). Federal Information Security Modernization Act (FISMA)Implementation Project Overview. Risk Management. Retrieved from: https:\/\/csrc.nist.gov\/Projects\/Risk-Management<br \/>\n2.\t Public Law, (2002). . Public Law 107\u2013347 107th Congress. Retrieved from: https:\/\/www.govinfo.gov\/content\/pkg\/PLAW-107publ347\/pdf\/PLAW-107publ347.pdf<br \/>\n3.\tRegan. K, (2005). Federal Agency Security Still Poor but Improving. TechTarget. Retrieved from: https:\/\/searchsecurity.techtarget.com\/news\/1059656\/Federal-agency-security-still-poor-but-improving<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Federal Information Security Management Act Research objectives \u2022 Describe the Federal Information security Management Act (FISMA) and the year it was enacted, and define its purpose. \u2022 Explain the responsibilities\u2026<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6037],"tags":[7156],"class_list":["post-48932","post","type-post","status-publish","format-standard","hentry","category-essay-writer-uk","tag-federal-information-security-management-act"],"_links":{"self":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts\/48932","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/comments?post=48932"}],"version-history":[{"count":1,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts\/48932\/revisions"}],"predecessor-version":[{"id":48933,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts\/48932\/revisions\/48933"}],"wp:attachment":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/media?parent=48932"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/categories?post=48932"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/tags?post=48932"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}