Computer Security Breach Paper

484 Words1 Page

The Policy problem I want to focus on is Computer Security specifically data breaches. For the last 15 years, cybercrime has grown dramatically with the continued advancements in technology and the digital age and is now a major issue for everyone. Since I am a Computer Information Systems major, this topic is of great interest to me and one which I will be following closely throughout my career.

While there wasn’t a Backgrounder specifically for data breaches or computer security, I looked at the other Backgrounders to check what type of sources those used, and I found some reputable sources related to my topic. From these links, I learned the first Computer Security law was passed in 1987 as the Computer Security Act of 1987. This law established a Computer System Security and Privacy Advisory Board to improve and set forth standards or guidelines on security of sensitive and important information on federal computer systems, create computer security plans and provide mandatory training for users of these systems. As issues of cybersecurity escalated, this law was repealed and replaced by the more stringent law, Federal Information Security Management Act of 2002 (FISMA). I found five pending pieces of legislation on cybersecurity at the State level in California alone. …show more content…

The main goal was to help different state agencies become more self-sufficient in safeguarding their data from being stolen by hackers. Tong also set up The California Cybersecurity Integration Center which monitors networks and protect from

Open Document