Best answer: What are the main purposes of the Computer Security Act of 1987?

8, 1988), was a United States federal law enacted in 1987. It was intended to improve the security and privacy of sensitive information in federal computer systems and to establish minimally acceptable security practices for such systems.

What is the purpose of computer security?

Computer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you stop unauthorized users (hackers) from accessing any part of your computer system.

What is the subject of the Computer Security Act of 1987 quizlet?

What is the subject of the Computer Security Act? Individuals with authorization and privileges to manage information within the organization are most likely to cause harm or damage by accident.

IMPORTANT:  Does turning off Windows Defender improve performance?

What replaced the Computer Security Act 1987?

The object of numerous hearings and revisions, the Computer Security Act of 1987 was finally superseded by the Federal Information Security Management Act of 2002.

What are the four main concerns of computer security?

The security precautions related to computer information and access address four major threats: (1) theft of data, such as that of military secrets from government computers; (2) vandalism, including the destruction of data by a computer virus; (3) fraud, such as employees at a bank channeling funds into their own …

What are the main types of computer security?

There are essentially two major types of computer security — software and hardware security — with a number of other categories within them.

What are the basics of computer security?

Three basic security concepts important to information on the internet are confidentiality, integrity, and availability. Concepts relating to the people who use that information are authentication, authorization, and nonrepudiation.

What is the subject of the Computer Security Act group of answer choices?

What is the subject of the Computer Security Act? Laws, policies, and their associated penalties only provide deterrence if offenders fear the penalty, expect to be caught, and expect the penalty to be applied if they are caught.

Which of the following functions does information security perform for an organization quizlet?

Which of the following functions does information security perform for an organization? Protecting the organization’s ability to function, Enabling the safe operation of applications implemented on the organization’s IT systems, and Protecting the data the organization collects and uses.

IMPORTANT:  What is a security impact analysis?

Which of the following acts is also widely known as the Gramm Leach Bliley Act?

The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways financial institutions deal with the private information of individuals.

Who created Computer Security Act 1987?

145. On January 6, 1987, Representative Dan Glickman introduced H.R. 145, the Computer Security act of 1987.

What organizations enforce the Computer Security Act of 1987?

Computer Security Governance

The CSA directed the National Bureau of Standards (NBS) to develop validation procedures to determine compliance and effectiveness of the implemented security standards and guidelines.

What is the Privacy Act 1974 cover?

The Privacy Act of 1974, as amended to present (5 U.S.C. 552a), Protects records about individuals retrieved by personal identifiers such as a name, social security number, or other identifying number or symbol.

What are the three key objectives of computer security?

Security of computer networks and systems is almost always discussed within information security that has three fundamental objectives, namely confidentiality, integrity, and availability.

What are the 3 threats to information security?

Cyber security professionals should have an in-depth understanding of the following types of cyber security threats.

  • Malware. Malware is malicious software such as spyware, ransomware, viruses and worms. …
  • Emotet. …
  • Denial of Service. …
  • Man in the Middle. …
  • Phishing. …
  • SQL Injection. …
  • Password Attacks.

What is a computer security problem?

A computer security risk is anything that may cause damage to the confidentiality, integrity, or availability of your data. … Misconfigured software, unpatched operating systems, and unsafe computer habits all contribute to creating computer security risks.

IMPORTANT:  Is Security 601 Harder than 501?