Computer security act

  • What is the Computer Security Act?

    This law prohibited "unauthorized access" into "Federal interest computers" affecting national security data, financial data, and other data stored in these computers..

  • The Federal Information Security Management Act (FISMA) was originally passed in 2002 as part of the Electronic Government Act.
    FISMA defines a framework of guidelines and security standards to protect government information and operations.
  • The Federal Information Security Modernization Act (FISMA) provides a framework to protect government information operations against cybersecurity threats.
    S. 2251 would update FISMA to require federal agencies to report all cybersecurity incidents and conduct standardized cybersecurity procedures on a regular basis.
  • Use strong passwords and multi-factor authentication
    Make sure you use strong passwords on smartphones, laptops, tablets, email accounts and any other devices or accounts where personal information is stored.
    They must be difficult to guess.
    The National Cyber Security Centre (NCSC) recommends using three random words.
The Computer Security Act establishes minimum acceptable security practices for Federal computer systems containing sensitive information. It stipulates that each Federal agency provide mandatory periodic training in computer security awareness and accepted computer security practices.
The Computer Security Act establishes minimum acceptable security practices for Federal computer systems containing sensitive information. It stipulates that 

Categories

Computer security risk
Computer security certifications
Computer security analyst
Computer security and forensics
Computer security and privacy
Computer security act of 1987
Computer security a hands-on approach
Computer security art and science
Computer security analyst salary
Computer security and investigations fleming college
Computer security and forensics salary in kenya
Computer security and ethics
Computer security and cryptography
Computer security and cyber security
Computer security and network security
Computer security book
Computer security breach
Computer security book pdf
Computer security best practices
Computer security by stallings and brown