Information Security: Security Acts and Effectiveness

1999 Words4 Pages

Information systems have become rampant in current times and by default, the use of said technology has been widespread in the usage to manage countless items of personnel and organizational data. In fact, this data may contains items such as organizational proprietary information, financial information, and/or personal information that in the hands of others, can arguable be harmful to the data owner(s). It is well known that organizations rely and have increasingly become reliant on technology to conduct business operations (Herath, Herath, & Bremser, 2010). Consequently, security measures are necessary to protect organizational information from both inside and outside entities of an organization. The protection and security of organizational information is under constant threat and mitigation measures are necessary to ensure information is protected from unauthorized users. Additionally, governmental agencies have developed regulations that mandate minimal standards necessary for organizations to protect information.
Furthermore, organizations like the Information Systems Audit and Control Association, otherwise known as ISACA, have developed frameworks and communicate best practices that assist an organization in the development and implementation of security control measures tailored to protect organizational information for informational security threats. The author will provide the reader a brief synopsis of the Federal Information Security Management Act (FISMA) of 2002 and of the Gramm-Leach-Bliley Act (GLBA) and other security regulations that pertain the protection of information and the management of risks. Furthermore, the author will provide a comparative analysis between FISMA and GLBA. Lastly, a summation will be offered describing the differences that occurred before and after the governmental regulations were enacted and provide an

More about Information Security: Security Acts and Effectiveness

Open Document