Question

In: Computer Science

Please explain with examples means details: 1. What is Data Security Compliance? 2. What is FISMA?...

Please explain with examples means details:

1. What is Data Security Compliance?

2. What is FISMA?

3. Why is data security important in our society?

Solutions

Expert Solution

1. Data security compliance is an umbrella term for conformity with numerous legislative and regulatory standards. The hefty task of compliance within the UK currently includes, but is not limited to: the Data Protection Act (DPA) 2018, the General Data Protection Regulation (GDPR), the Copyright Designs and Patent Act 1998 and the Payment Card Industry Data Security Standard (PCI DSS). Compliance is both the individual responsibility of data users and the corporate responsibility of your organisation. Non-compliance can result in damage to your organisation's reputation, interruptions to service, legal action being taken against you, wasting resources and putting people at risk.

2.The Federal Information Security Modernization Act (FISMA) of 2002 is a United States federal law enacted in 2002 as Title III of the E-Government Act of 2002. The act recognized the importance of information security to the economic and national security interests of the United States. The act requires each federal agency to develop, document, and implement an agency-wide program to provide information security for the information and information systems that support the operations and assets of the agency, including those provided or managed by another agency, contractor, or other source.

3.Digital technology is now just a part of life. From online shopping to net banking and business to government infrastructure, digital technology plays a crucial role. Apart from the multiple advantages of digitization, cyber attacks are a black dot. In recent years, we’ve witnessed many high-profile cyber-attacks. In fact, we can say that the number of cyber attacks has grown rapidly in past few years.

Many people have this common misconception that only the big organizations, governments, and businesses get targeted by cyber-perpetrators. Well, this is just not true. Data security is not just important for businesses or governments. Your computer, tablet, and mobile devices could be the next target. Usually, common users get targeted by attackers for their sensitive information, such as their credit card details, banking details, passwords, etc.

Cybersecurity should be thorough and seamless for everyone — whether you are an individual or a business. According to estimates by the Center for Strategic and International Studies, cybercrimes cost the global economy over 400 billion USD per year.

Needless to say, data breaches and cyber-attacks will increase in due time as computer networks expand — cyber-attacks are getting bigger and better every day.


Related Solutions

1: What is the Uppsala model? 2: What are two (2) examples of the means of...
1: What is the Uppsala model? 2: What are two (2) examples of the means of internationalisation? 3: Why is parochialism a disadvantage when conducting international business?
4-2 Please explain and provide examples with details list and describe the three classes of net...
4-2 Please explain and provide examples with details list and describe the three classes of net assets used in private not-for-profit accounting. Give an example of each type.
what is the difference with ion-induced dipole vsion-dipole? Please explain in details examples are greatly...
what is the difference with ion-induced dipole vs ion-dipole? Please explain in details examples are greatly appreciated .  
1. Please explain revenue recognition abuse with examples. 2. What is MD&A in accounting?
1. Please explain revenue recognition abuse with examples. 2. What is MD&A in accounting?
Please if you can explain in paragrahs with details and examples that would be great! i...
Please if you can explain in paragrahs with details and examples that would be great! i want to understand why and how, all of it. 5) How does the bin width affect the precision of the Guassian Curve? 6) How does the bin width affect the accuracy of the Guassian Curve? Thank you !
Explain in details what is means "there is a lack of seamless connections often experienced in  wireless...
Explain in details what is means "there is a lack of seamless connections often experienced in  wireless networks?"
under Catalytic capital, what does invest strategically means ? please discuss in details
under Catalytic capital, what does invest strategically means ? please discuss in details
explain the different levels of the PCI compliance (Payment Card Industry Security Standards Council) and what...
explain the different levels of the PCI compliance (Payment Card Industry Security Standards Council) and what needs to be done for a corporation to satisfy the PCI requirements for the Level 4 (small-to-medium sized business)
Please explain what section 1.164-1 in the Internal Revenue Code means?
Please explain what section 1.164-1 in the Internal Revenue Code means?
What are the responsibilities of a Maintenance Engineer. Please explain into details
What are the responsibilities of a Maintenance Engineer. Please explain into details
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT