logo

Computer Information System

   

Added on  2023-04-06

6 Pages1088 Words212 Views
Running head: COMPUTER INFORMATION SYSTEM
COMPUTER INFORMATION SYSTEM
Name of student
Name of University
Author’s Note

1COMPUTER INFORMATION SYSTEM
Executive order state within the context of cyber security:
The executive order state within the context of cyber security is the order passed by the
US president for cyber practices to protect the infrastructure from cyber security threats (Min,
Chai & Han,2015). The executive order passed takes off more than reviews than setting up any
particular policies in motion. It is the policy of US government to set up secure federal network
to have secure critical infrastructure in hospital, powerplants any in other important sectors.
NIST FISMA Cybersecurity Framework and its Performance:
The National Economic Security of United Stattes depends on the reliable functioning of
the critical infrastructure and as cyber security threats that have become more prevalent in the
recent years, the nation’s economy is on the verge of risk. To address this threats the president
issed the executive order based on the NIST FISMA cyber security framework. The NIST
FISMA Cybersecurity Frame work evolved as a collection of standards with best practices and
endorsements that help in improving the cybersecurity of any organisation.
HIPPA:
The Health Insurance Portability and Accountability Act of 1996 or HIPPA is the
legislation under the United States that provides a set of security and privacy standards in order
to protect an individual’s medical record which is provided to the health care providers (Vittor,
Sukumara & Sudarsan, 2017). The action for HIPPA violation can reach up to many extremes.
The rules regarding its security and privacy are enforced by the department of Health and Human
Services.
SOX:
SOX or Sabanes-Oxley Act of 2002 passed under the legislation by the Congress
of United States, controls the assurance and accuracy of the reports related to finance and

2COMPUTER INFORMATION SYSTEM
discloses and mandates the audits depending on the control. On failing the SOX compliance
penalties and fines may be applied which can rise to about $5million and may also cause to 20
years of jail.
PCI-DSS: PCI-DSS also known as Payment Card Industry Data Security Standard is the
standard meant to follow by almost all organizations including retailers who retail via online
method (Sukumara, Sudarsan, Starck, 2017). The standard is categorized to follow while
processing, storing and transferring credentials of customers using their credit cards. The
application of the PCI-DSS standard improves the way of payment with advanced security
throughout the process of transaction (Best practices for Cybersecurity, 2018). The Payment
Card Industry Security Standard Council maintains the PCI-DSS standard. In this case the
compliance is enforced by the credit card owner and the brands related to the payment card.
GGP 13
GGP 13 can be describes as asset of 12 controls that is usually recommended by the
United Kingdom government. It consists of various technologies and processes. This aims in
improving the company risk management and it responses in information security attacks (Vittor,
Sukumara & Sudarsan, 2017). There are certain standards for GGP 13 and this provides various
guidelines for the risk management.
U.S. State Laws
The state cyber security laws along with proposed legislation aim in resolving
notifications regarding security breaches. Cyber security is maintained for the purpose
maintaining the critical infrastructure, practices of data disposal, identity theft and some similar
practices. Several state laws attempt in coding various aspects of FISMA.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Relationship between NIST and FISMA
|4
|635
|21

CYBER SECURITY.
|3
|415
|7

The Relation Between FISMA and NIST
|4
|675
|66

Security Risk Analysis
|7
|1068
|24

How Department of Homeland Security Should Handle Cyber Threats to Protect the National Infrastructure
|4
|413
|481

Computer Security: Protecting Systems and Information
|15
|5076
|58