+1-415-670-9189
info@expertsmind.com
Comparative study between any two countries
Course:- Case Study
Length: word count:1000
Reference No.:- EM131386875





Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Case Study

Question: Need a comparative study between any two countries on information security approaches mentioning all the processes that they have done to secure their information infrastructure and how did they benefit from it from all aspects. Do a clearance report.

Answered:-

Verified Expert

The solution is about the information security system of the United States and Canada and their policies and approaches. The solution defines the definition of the information security and discuss the FISMA and PIPEDA which are the major approaches of the government. Word document consist of cover page, times Roman 12 point and Harvard style of references

Preview Container content

Table of Contents

What is Information Security? 3
Information Security Process in United States: 3
Purpose of FISMA: 4
Execution of FISMA: 4
Continuous monitoring 5
Information Security in Canada: 5
The PIPEDA is applicable to: 6
The PIPEDA is not applicable to: 6
As specific in PIPEDA: 6
The PIPEDA provides person the right to: 7
The PIPEDA needs Company to: 8
References: 8

What is Information Security?

“Information security” is referred as InfoSec also and it is a practice of stopping not authorized destruction, recording, inspection, modification, disruption, disclosure, use and access of data/ information. This is a common word which can be utilized anyway of the structure the information may obtain (for example: physical, electronic).

Information Security Process in United States:

The FISMA “Federal Information Security Management Act of 2002” is a U.S. federal law performed as “Title III of the E-Government Act of 2002 (Pub.L. 107–347, 116 Stat. 2899)”. The law acknowledged this significance of data safety to national & financial safety facilities of U.S. The law need every “federal agency to implement, document and develop an agency-wide agenda to offer information security for the data systems and information which maintain the assets and operations of the agency, involving those managed or provided by another contractor, agency or any other sources.” FISMA have conveyed consideration inside the centralized administration to cyber safety & expressly accentuated a "hazard based strategy for practical security." FISMA needs IGs, CIOs, and officials to direct yearly evaluations of the office's data safety agenda & discuss conclusions to OMB "Office of Management and Budget".

Purpose of FISMA:




Put your comment
 
Minimize


Ask Question & Get Answers from Experts
Browse some more (Case Study) Materials
Why is Matthew hesitant about giving Peter negative feedback? List at least three reasons and explain why and  Why was Peter so offended? How should Peter respond to this situ
How to manage the cultural differences in this new organization  Dharam Singh, general manager at 'Prithviraj Chemicals' was worried about his future, even though he had been
What law is being violated by the employees at this health services organization? Why was this law enacted? What are the penalties for violating this law? If an employee share
How would you rate the leadership and communication skills of Ohlins management? Explain your rating. What suggestions do you have for improving the leadership and communicati
What adjustments are needed in inventory levels, lead times, and batch sizes to fill an additional customer order for five custom cars in five days - Create a time-phased as
Evaluate the information received in the survey (Please assume a questionnaire survey was conducted from university students about the issue), identify alternative courses o
After viewing the discussion case video, provide two take-a-ways or impressions the video left you with. In what ways would the widespread adoption of clean cookstoves a
What conflicts must Conoco resolve in deciding whether or not to develop block 16 in Ecuador's tropical rain forest and what objectives and whose interests appear to be carryi