Computer security act of 1987

  • What is the Cybersecurity Act of 1987?

    CSA – 1987
    Requires NIST responsible, National Security Agency (NSA) to advise: Assessing the vulnerability of federal computer systems.
    Developing standards.
    Providing technical assistance with NSA support..

  • What is the purpose of the Computer Security Act of 1987?

    The Computer Security Act establishes minimum acceptable security practices for Federal computer systems containing sensitive information.
    It stipulates that each Federal agency provide mandatory periodic training in computer security awareness and accepted computer security practices..

  • What replaced the Computer Security Act of 1987?

    The Federal Information Security Management Act of 2002 (FISMA) replaced the Computer Se.

  • What replaced the Computer Security Act?

    Summary. 33 years since the passage of the CSA, responsibilities and oversight for cybersecurity have shifted to the Federal Information Security Management Act (FISMA) of 2002.
    FISMA 2002 was superseded by the Federal Information Security Modernization Act of 2014.Dec 1, 2020.

Enacting the Computer Security Act of 1987 In response to a growing fear of security threats to the U.S. Federal Government, the Computer Security Act (CSA) of 1987 was signed into law on June 11, 1987. The purpose of the CSA was to improve the security of federal information systems.
In 1987, the U.S. Congress, led by Rep. Jack Brooks, enacted a law reaffirming that the National Institute for Standards and Technology (NIST), a division of the Department of Commerce, was responsible for the security of unclassified, non-military government computer systems.
The Computer Security Act of 1987 amended several earlier laws and statutory provisions to address standards for federal computer systems, extend the scope of the authority given to the National Bureau of Standards to include computer security and privacy standards and guidelines, and require agencies to develop

Categories

Computer security a hands-on approach
Computer security art and science
Computer security analyst salary
Computer security and investigations fleming college
Computer security and forensics salary in kenya
Computer security and ethics
Computer security and cryptography
Computer security and cyber security
Computer security and network security
Computer security book
Computer security breach
Computer security book pdf
Computer security best practices
Computer security by stallings and brown
Computer security berkeley
Computer security box
Computer security bootcamp
Computer security background
Computer security bishop
Computer security bachelor