Automating Compliance With Federal Information Case Study

Total Length: 2485 words ( 8 double-spaced pages)

Total Sources: 1

Page 1 of 8

The Act also demanded that agency heads to ensure that the process of implementation of information security plan in the various life cycles of each and every federal system.

The significant differences between FISMA and GISRA are the fact that its provisions are stronger and more permanent. It also includes the minimum mandatory standards for information security (OIG, 2003).

The suitability of the eight FISMA requirements model for business information security programs

The suitability of FISMA requirements model and compliance is the fact that it helps in the identification of people, processes and systems that the agencies need in order to achieve the various business objectives as well as coming up with appropriate protective mechanisms. The next incentive is tied to the fact that compliance to the requirements leads to the bolstering of an agency's reputation both within the House Government Reform as well as the improvement of citizen's perception of the agency (Cisco,2007).

The reason why federal agencies receive low grades on the Federal Computer Security Report Card. This is as a result of the weaknesses in their information systems and information security programs are many. The 24 main federal agencies have been noted to have various forms of control weaknesses in their Information Technology systems. These weaknesses threaten the integrity, confidentiality and availability of the various services provided through the federal information systems (GAO, 2005a).These weaknesses have been noted to result to considerable security risks to various forms of information in the hands of unauthorized persons. This can also result in the disclosure of highly sensitive information which can result in the disruptions of various critical operations. The main areas of weaknesses are outlined in the audit methodology that is used in the evaluation of information security systems (GAO, 2005b). Most affected areas are; access control, software change controls, duties segregation, plans of continuity of operations.

The differences, in terms of legal regulations and guidance for compliance, between the Federal government and industry in managing the security of information and information

Systems.

The process of ensuring that the various security of Information amd information system are properly managed is a role that must be an accomplished via a collaboration between the federal government and the various industry stakeholders.

Stuck Writing Your "Automating Compliance With Federal Information" Case Study?

There is however certain differences in terms of the regulations and guidance that must be sort to bring about the desired level of information assurance. The confidentiality, integrity and availability of all the critical data must be assured at all times.

The differences are as follows;

The federal government Information and Information system requirements are mandatory for all agencies and is implemented as prescribed by the constitution of the United States. This means that failure to comply with these requirements is considered a crime and is punishable by law. The federal government requires that these regulations be implemented according to the guidelines contained in the E-Government Act of 2002 (Public law 107-347).The industry standards on the other hand are regulated by the policies set aside that are unique to the individual industries.

A comparison of the classes and families of the minimum security control requirements, shown in Table5-5, to the classes and control objectives of ASSERT's assessment questions, shown in Table 5-6 and an explanation of the discrepancies.

The and families of the minimum security control requirements, shown in Table5-5 are not as detailed as the ones in the Table5-6, to the classes and control objectives of ASSERT's assessment questions. This is since the Table5-5 are general guidelines while the ones in Table5-6 are specific and to the point. This is since the ASSERT standards target matters of national security and hence critical attention must be focused on its requirements.

How ASSERT's questions could be used by a business to better control its IT systems and to mitigate its security risks.

The ASSERT questions can be used by a business to carry out a step-by-step analysis and evaluation of all the potential security loopholes in order to initiate the appropriate mitigation procedures as prescribed by the same ASSERT guidelines......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Automating Compliance With Federal Information" (2010, August 18) Retrieved May 3, 2024, from
https://www.aceyourpaper.com/essays/automating-compliance-federal-information-8807

Latest MLA Format (8th edition)

Copy Reference
"Automating Compliance With Federal Information" 18 August 2010. Web.3 May. 2024. <
https://www.aceyourpaper.com/essays/automating-compliance-federal-information-8807>

Latest Chicago Format (16th edition)

Copy Reference
"Automating Compliance With Federal Information", 18 August 2010, Accessed.3 May. 2024,
https://www.aceyourpaper.com/essays/automating-compliance-federal-information-8807