Module 1 - Intro to Legal and Ethics Flashcards

1
Q

Three aspects of securing computer

A

balance between confidentiality, integrity, and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Regulations

A

Combination of policies and laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Demonstrate Compliance with Regulations Through…

A

Verification, validation, and reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3 Examples of legislation to protect financial investments in IS systems

A

Clinger-Cohen Act E-Government Act FISMA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FISMA (acronym)

A

Federal Information System Management Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

E-Government Act (purpose)

A

promote and use: - E-Government services - and use of Internet and technology by U.S. citizens and its government agencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

FISMA (implications)

A
  • Title III of E-Government Act - intro. series of controls and oversight to help secure government IS. - Tactical decisions left up to individual agencies (result is each Federal agency and Department at various levels of compliance through risk mitigation)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OMB Circular A-130 (background & result)

A

Office of Management and Budget - built on Computer Security Act of 1987 - ties budget review to compliance with Info security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

E-Government Act (Findings)

A
  • Use of computers and Internet rapidly transforming societal interactions and the relationships among citizen, businesses, and Government - Federal Gov. has had uneven success in applying technology to enhance functions and services - most Gov services have been developed and presented separately.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Privacy Impact Assessments

A
  • Required by E-Gov Section 208 So as to : - document and justify why PII is collected - identify what type of PII collected - identify security plans to protect PII
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

FISMA (Purpose)

A

provide comprehensive framework for ensuring effectiveness of information security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Information Security (definition)

A

protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction in order to provide: integrity confidentiality availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

national security system (definition)

A

any information system (including any telecommunications system) used or operated by an agency or by a contractor of an agency, or other organization on behalf of an agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Agency Director Responsibilities Under FISMA

A

1 - implementation of policies and guidelines on information security 2 -to identify and provide information security protections commensurate with the risk 3 -coordinating the development of standards and guidelines under section 20 of the National Institute of Standards and Technology Act 4 - overseeing agency compliance 5 - reviewing at least annually and approving IS programs 6 - coordinating IS policies and procedures with management policies and procedures 7 -overseeing the operation of the Federal information security incident center 8 - reporting to Congress on compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Evaluation Requirement (FISMA)

A

Each year - independent evaluation of the information security program and practices to determine effectiveness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

OMB Circular A-130 (Appendix III) (Result)

A

established a minimum set of required controls for Federal Information Systems

17
Q

Major Application (under OMB A-130)

A

An application that requires special attention to security due to the risk and magnitude of the harm resulting from the loss, misuse, or unauthorized access to or modification of the information in the application.

18
Q

General Support System (Under OMB A-130)

A

An interconnected set of information resources under the same direct management control which shares common functionality.

19
Q

OMB A-130 Responsibilities for DoC

A

Department of Commerce:

  • develop standards and guidance
  • review guidelines for traiing
  • guidance in security planning
  • cost-effect control for interconnecting
  • coordinate incident response activities
  • evaluate new technologies for security vulnerabilities
20
Q

OMB A-130 Responsibilities for DoD

A
21
Q

OMB A-130 Responsibilities for DOJ

A
  • guidance on legal remedies regarding security incidents
  • pursue legal actions
22
Q

OMB A-130 Responsibilities for GSA

A
  • guidance on security considerations for acquitsition
  • facilitate contract vehicles
  • provide security services