preview

FISMA Research Paper

Better Essays

FISMA: ADDRESSING CONFIDENTIALITY, INTEGRITY AND ACCESSIBILITY
ABSTRACT
The continuous proliferation of information facilitated by the advancement in technology is a constant and continuous threat to information security and privacy. The various schemes and acts by the various government agencies in sectors such as health, finance and so on amongst other acts have constituted to information vulnerability and enhanced the breach of information security. Many people are of the opinion that the government has legalized spying on them, acquiring and using their private data at will. The confidentiality, Integrity and Availability of information has been greatly affected and many private information have been released to the public domain either …show more content…

The act recognized the importance of information security to the economic and national security interests of the United States. The act requires each federal agency to develop, document, and implement an agency-wide program to provide information security for the information and information systems that support the operations and assets of the agency, including those provided or managed by another agency, contractor, or other source …show more content…

The development of standards and techniques for all agency operations and assets (which excludes national security systems) therefore became the responsibility of NIST. NIST develops standards, metrics, tests, and validation programs to promote, measure, and validate the security in information systems and services while working closely with all federal agencies (https://en.wikipedia.org/wiki?curid=1523470).
FISMA through NIST and the various programs it hosts has been able to create a framework for the compliance with the standards created. The standards put in place by NIST to enforce compliance with FISMA are highlighted as follows:
Take Proper Inventory of information systems: It is mandatory for all agencies to have proper information systems inventory in place.
Categorization of information systems according to respective risk level: In a bid to provide appropriate levels of information security, all information and information systems must be categorized according to risk

Get Access