The IT Law Wiki
Edit Page
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 11: Line 11:
 
== Security categories ==
 
== Security categories ==
   
βˆ’
FIPS 199 establishes [[security categories]] for both information<ref>Information is categorized according to its information type. An information type is a specific category of [[information]] (e.g., [[privacy]], medical, [[proprietary]], financial, investigative, contractor sensitive, [[security management]]) defined by an organization or, in some instances, by a specific law, Executive Order, directive, [[policy]], or [[regulation]].</ref> and [[information system]]s. The security categories are based on the potential impact on an organization should certain events occur. The potential impacts could jeopardize the [[information]] and [[information system]]s needed by the organization to accomplish its assigned mission, protect its assets, fulfill its legal responsibilities, maintain its day-to-day functions, and protect individuals. [[Security categories]] are to be used in conjunction with [[vulnerability]] and [[threat]] information in assessing the [[risk]] to an organization.
+
FIPS 199 establishes [[security categories]] for both information<ref>Information is categorized according to its information type. An information type is a specific category of [[information]] (e.g., [[privacy]], medical, [[proprietary]], financial, investigative, contractor sensitive, [[security management]]) defined by an organization or, in some instances, by a specific law, Executive Order, directive, policy, or regulation.</ref> and [[information system]]s. The security categories are based on the potential impact on an organization should certain events occur. The potential impacts could jeopardize the [[information]] and [[information system]]s needed by the organization to accomplish its assigned mission, protect its assets, fulfill its legal responsibilities, maintain its day-to-day functions, and protect individuals. [[Security categories]] are to be used in conjunction with [[vulnerability]] and [[threat]] information in assessing the [[risk]] to an organization.
   
 
FIPS 199 establishes three potential levels of impact (low, moderate, and high) relevant to securing federal [[information]] and [[information system]]s for each of three stated security objectives ([[confidentiality]], [[integrity]], and [[availability]]).
 
FIPS 199 establishes three potential levels of impact (low, moderate, and high) relevant to securing federal [[information]] and [[information system]]s for each of three stated security objectives ([[confidentiality]], [[integrity]], and [[availability]]).
Please note that all contributions to the The IT Law Wiki are considered to be released under the CC-BY-SA
Cancel Editing help (opens in new window)