Midterm Requirements
In chapter 8 you should have read about the Federal Information Security Management Act (FISMA). Assume that this Act hasn’t been enacted yet and you are the one that is in charge of either getting this Act passed or in charge of making sure this act doesn’t get passed (You are pro FISMA or against FISMA). In a 4 to 5 page paper describe FISMA, list the pros and cons, and make a decision on your support or non-support for the act. Make sure you follow APA format and cite all of your sources.
Build a PowerPoint presentation on what you just discussed in your paper about FISMA. Your presentation should contain 10 to 20 slides including the title and reference slides. When you present your project remember that you are trying to convince people to either approve or disapprove FISMA.
Writing Requirements:
on time urgent
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Legal Issues in
Information Security
Lesson 8
Federal Government Information
Security and Privacy Regulations
Page 2Legal Issues in Information Security
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Learning Objective
Identify the key components of the Federal
Information Security Management Act
(FISMA).
Page 3Legal Issues in Information Security
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Key Concepts
Federal government information security
and
privacy regulation
Federal Information Security Management
Act
(FISMA)
Import and export laws for information
technology
Security challenges facing the federal
government
Office of Management and Budget (OMB)
Page 4Legal Issues in Information Security
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Information Security Challenges
Facing the Federal Government
Federal government is largest producer and user
of information in U.S.
Government computer systems hold:
• Data critical for government operations
• Employment, tax, and citizenship data
• Data on businesses operating in the U.S.
• Data that’s used to protect the U.S. from threats
Federal IT systems and data in them are
attractive targets for criminals
Page 5Legal Issues in Information Security
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Federal Information Security
Management Act (FISMA)
Categorizing information and information
systems by mission impact
Complying with minimum security
requirements for
information systems
Selecting appropriate security
controls
for
information systems
Page 6Legal Issues in Information Security
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Federal Information Security
Management Act (FISMA) (Continued)
Assessing security controls in information
systems
Determining security control effectiveness
Establishing security authorization of
information systems
Monitoring security controls
Assuring security authorization of
information systems
Page 7Legal Issues in Information Security
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
FISMA Implementation Project
Develop and update security
Standards so comply with FISMA
Provide security reference materials
to support the Risk Management
Framework (RMF)
Apply risk management-based
approach to security controls
Page 8Legal Issues in Information Security
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
NIST Risk Management
Framework Process
Categorize IT
systems
Select security
controls
Implement
security
controls
Assess security
controls
Authorize IT
systems
Continuously
monitor security
controls
Page 9Legal Issues in Information Security
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Access Control Models
• Discretion of the
owner
Discretionary
Access Control
(DAC)
• Security labels and
classifications
Mandatory
Access Control
(MAC)
• Job function or role
Role-Based
Access Control
(RBAC)
Page 10Legal Issues in Information Security
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Federal Privacy Laws
• Creation of information security programs
required
• Must review information security risks
• Must implement controls to mitigate risks
• Limits how federal agencies use
personally
identifiable information
• Must review IT systems for privacy
impacts
• Must notify public about their data
collection practices
Page 11Legal Issues in Information Security
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
OMB Requirements
Review and reduce the volume of personally
identifiable information store
Eliminate unnecessary use of SSNs
Explore alternatives to using SSN as a personal
identifier
Develop policies and procedures for individuals
who are authorized to access personally
identifiable information
Page 12Legal Issues in Information Security
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
OMB Breach Notification
Breach Notification Plan
Determine
if breach
notification
required
Time for
notification
Source of
the
notification
Contents
of the
notice
Means of
providing
the notice
Who gets
the notice
Page 13Legal Issues in Information Security
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Regulatory Requirements for the Import
and Export of Information Technology
Department of Commerce
Export Administration Regulations (EAR)
Export Administration Act of 1979
Bureau of Industry and Security
Commerce Control List (CCL)
Department of State
International Traffic in Arms Regulations (ITAR)
Treasury Department
Office of Foreign Asset Control (OFAC)
Page 14Legal Issues in Information Security
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Regulatory Requirements for the Import
and Export of Information Technology
Export of Technology or Software
Release of technology or software subject to the
EAR in a foreign country
Release of technology or source code subject to
the EAR to a foreign national within the United
States or outside.
Transfer of source code
Inspection or oral communication of code
Violations subject to civil penalties or denial of
export privileges
Willful violations subject to criminal penalties
Page 15Legal Issues in Information Security
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Summary
Federal government information security and
privacy regulation
Federal Information Security Management Act
(FISMA)
Import and export laws for information
technology
Security challenges facing the federal
government
Office of Management and Budget (OMB)
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.