Information Security Across Federal Agencies: Analysis of Adequacy and Effectiveness

Shane Palmer (Editor)

Series: American Political, Economic, and Security Issues
BISAC: POL012000



Volume 10

Issue 1

Volume 2

Volume 3

Special issue: Resilience in breaking the cycle of children’s environmental health disparities
Edited by I Leslie Rubin, Robert J Geller, Abby Mutic, Benjamin A Gitterman, Nathan Mutic, Wayne Garfinkel, Claire D Coles, Kurt Martinuzzi, and Joav Merrick


Digitally watermarked, DRM-free.
Immediate eBook download after purchase.

Product price
Additional options total:
Order total:



Persistent weaknesses at 24 federal agencies illustrate the challenges they face in effectively applying information security policies and practices. Most agencies continue to have weaknesses in (1) limiting, preventing, and detecting inappropriate access to computer resources; (2) managing the configuration of software and hardware; (3) segregating duties to ensure that a single individual does not have control over all key aspects of a computer-related operation; (4) planning for continuity of operations in the event of a disaster or disruption; and (5) implementing agency-wide security management programs that are critical to identifying control deficiencies, resolving problems, and managing risks on an ongoing basis. These deficiencies place critical information and information systems used to support the operations, assets, and personnel of federal agencies at risk, and can impair agencies’ efforts to fully implement effective information security programs. This book provides an analysis on the adequacy and effectiveness of agencies’ information security policies and practices; and agencies’ implementation of the Federal Information Security Management Act of 2002 (FISMA) requirements. (Imprint: Novinka)


Chapter 1. Federal Information Security: Agencies Need to Correct Weaknesses and Fully Implement Security Programs
United States Government Accountability Office

Chapter 2. Testimony of Dr. Charles Romine, Director, Information Technology Laboratory, National Institute of Standards and Technology. Hearing on ''Is the OPM Data Breach the Tip of the Iceberg?''


You have not viewed any product yet.