Introduction:
FISMA is abbreviated as the Federal Information Security Management Act. It was executed on December 17, 2002, and enacted by the 107th United States Congress. It was introduced in the House by Thomas M. Davis on March 5, 2002. It was passed by the House and Senate without any objection and signed by President George W. Bush. Hence, it is regulated by the government. It is enacted when the importance of information security is recognized, which is in the interests of the economic and national security of the United States. Title III of the Federal Information Security Management Act (FISMA) imposes a compulsion on every federal agency to develop, document and apply the security program for the information systems to protect the information and other assets from cybercrime. FISMA is responsible for assigning duties to federal agencies, the Office of Management and Business and the National Institute of Standards and Technology(NIST). The NIST is a government agency that is non-regulatory. It is responsible for developing technology metrics and guidelines. Federal agencies or government organizations that comply with NIST may also further ensure compliance with FISMA as NIST guidelines direct organizations to comply with FISMA. NIST has provided some rules to move towards FISMA compliance.
We will analyze the current and the previous administrations’ approaches to cyber security and analyze how each administration succeeded in different areas and what enhancements are required for the economic and information security of the United States. We will also see how they enunciated them alongside the activities of people around them that mirror their needs, giving extraordinary understanding into the inward reasoning of the Administrations. Through an intelligent and top-to-bottom investigation of these issues, we can see the zones in which the Administrations have enhanced digital security and give proposals on the best way to keep on improving.
Key Current Administration’s Cyber Security Tenets:
The Current Administration has plainly outlined the needs of the Administration through an assortment of talks, Executive Orders, Presidential Policy Directives, Security Frameworks, and strategy surveys. These activities are essential as cybersecurity touches every texture of our general public, and one zone not concentrating on their associations, cybersecurity has a considerably more extensive effect than simply that association. As the cyber risk has kept on developing all through the Current Administration it was key that they verbalize what their needs are to tending to cybersecurity.
Cite This Work
To export a reference to this article please select a referencing stye below: