Back To Course
Information & Computer Security Training10 chapters | 131 lessons
Marcia has taught Information technology and Mathematics with a master's degree in IT
This act was enacted in 2002 as part of the Electronic Government Act. The government had found that the Internet was a disruptive technology; a technology that uses a new way of doing business. The average person was no longer tied to doing paperwork and sending in forms. Instead, electronic submission was a wave of the future. In order to enhance communications and adapt to this new technology, the government enacted the Federal Information Security Management Act to provide regulations on who would be in control of sensitive data and how it would be regulated.
A designated Federal Chief Information Officer or CIO was first designated in the Office of Management and Budget. Tony Scott is currently the third CIO appointed by President Obama. His main responsibility is to oversee and promote Internet usage. He also provides a checklist or framework for all Internet-based activities used by each federal agency. Additionally, he focuses on regulations between federal agencies to share data when appropriate.
A council in the executive branch was established to inform the president and CIO of any issues and problems that arise.
It consists of:
1. The Deputy Director for Management of the Office of Management and Budget, who shall act as chairperson of the Council.
2. The Administrator of the Office of Electronic Government.
3. The Administrator of the Office of Information and Regulatory Affairs.
1. Promote and Sponsor- The government would market or promote the use of federal agency websites rather than brick and mortar offices.
2. Categorize Information- Certain information needs to be protected more. Information about troop deployment is one such category. It would be a national breach of security to allow this information to leak out. Whereas, how to apply for social security would be more informative for everyone.
3. Development of Framework- A framework of regulations for each agency had to be developed to ensure that security was implemented.
4. Oversee all Internet activities- These regulations have to be overseen and monitored continuously. Security must remain in force 24 hours/7 days a week.
5. Assess Risk- Certain government agencies such as the CIA have greater risk associated with breaches than does the Housing Administration.
6. Assist federal agencies- This allows federal agencies to comply with the regulations but also maintains data flow among the agencies.
The government changed how they would operate and coordinate business activities with the average citizen. It was no longer to be paper based but rather electronically based using the Internet. The Federal Information Security Management Act first established the leader, Federal Chief Information Officer, then went on to perform such activities as the promotion of the Internet, categorize information into risk categories, develop a framework of control, oversee all Internet operations, assess security and risk, and assist other federal agencies with usage.
To unlock this lesson you must be a Study.com Member.
Create your account
Already a member? Log In
BackAlready registered? Login here for access
Did you know… We have over 160 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Back To Course
Information & Computer Security Training10 chapters | 131 lessons