What Replaced The Computer Security Act 1987?

by | Last updated on January 24, 2024

, , , ,

Summary. 33 years since the passage of the CSA, responsibilities and oversight for cybersecurity have shifted to the Federal Information Security Management Act (FISMA) of 2002. FISMA 2002 was superseded by

the Federal Information Security Modernization Act

of 2014.

What is the purpose of the Computer Security Act of 1987 and what does it protect?

8, 1988), was a United States federal law enacted in 1987. It was intended to

improve the security and privacy of sensitive information in federal computer systems and to establish minimally acceptable security practices for such systems

.

Which organizations are enforcing the Computer Security Act of 1987?

Shown Here: Passed House amended (06/22/1987) Computer Security Act of 1987 – Directs the National Bureau of Standards to establish a computer standards program for Federal computer systems, including guidelines for the security of such systems.

What federal act requires all users of federal computers to be trained in information systems security?


The Computer Security Act

establishes minimum acceptable security practices for Federal computer systems containing sensitive information. It stipulates that each Federal agency provide mandatory periodic training in computer security awareness and accepted computer security practices.

What is the subject of computer security act?

What is the subject of the Computer Security Act?

Individuals with authorization and privileges to manage information within the organization

are most likely to cause harm or damage by accident. You just studied 14 terms!

What is the Cyber Security Enhancement Act?

AN ACT To provide for an ongoing, voluntary public-private partnership to improve cybersecurity, and to strengthen cybersecurity research and development, work- force development and education, and public awareness and preparedness, and for other purposes.

What does the Homeland Security Act do?

The primary mission of the Homeland Security Act is

to prevent terrorist attacks within the United States

, reduce the vulnerability of the United States to terrorism, and minimize damage and assist in recovery for terrorist attacks that occur in the United States.

What is the Privacy Act 1974 cover?

The Privacy Act of 1974, as amended, 5 U.S.C. § 552a, establishes

a code of fair information practices that governs the collection, maintenance, use, and dissemination of information about individuals that is maintained in systems of records by federal agencies

.

What is security in computing?

Computer security basically is

the protection of computer systems and information from harm, theft, and unauthorized use

. It is the process of preventing and detecting unauthorized use of your computer system.

What are the main provisions of Computer Security Act of 1987?

Computer Security Act of 1987 – Directs the National Bureau of Standards to establish a computer standards program for Federal computer systems, including guidelines for the security of such systems. Sets forth authorities of the Bureau in implementing such standards.

What is government information security?

The Federal Information Security Management Act of 2002 (Title III of Public Law 107-347) establishes

security practices for federal computer systems

and, among its other system security provisions, requires agencies to conduct periodic assessments of the risk and magnitude of the harm that could result from the …

What guidance identifies federal information security controls?


FISMA

is one of the most important regulations for federal data security standards and guidelines. It was introduced to reduce the security risk to federal information and data while managing federal spending on information security.

Which federal government agency has responsibility for ensuring the security of government computer systems that are not used to process sensitive and or classified information?


The National Institute of Standards and Technology (NIST)

is charged with the security management of all federal government computer systems that are not used to process sensitive national security information.

Which of the following requires government agencies to identify sensitive systems conduct computer security training and develop computer security plans?

One of the oldest pieces of legislation in the United States that affects computer security is

the Computer Security Act of 1987

. It requires government agencies to identify sensitive systems, conduct computer security training, and develop computer security plans.

Which of the following acts is also widely known as the Gramm Leach Bliley Act?


Understanding the Financial Services Modernization Act of 1999

. This legislation is also known as the Gramm-Leach-Bliley Act, the law was enacted in 1999 and removed some of the last restrictions of the Glass-Steagall Act of 1933.

Which government agency is responsible for cyber security?

The Department’s

Cybersecurity and Infrastructure Security Agency (CISA)

is committed to working collaboratively with those on the front lines of elections—state and local governments, election officials, federal partners, and vendors—to manage risks to the Nation’s election infrastructure.

James Park
Author
James Park
Dr. James Park is a medical doctor and health expert with a focus on disease prevention and wellness. He has written several publications on nutrition and fitness, and has been featured in various health magazines. Dr. Park's evidence-based approach to health will help you make informed decisions about your well-being.