Security goals

The CIO Council, the Chief Financial Officers Council and the Information Technology Association of America outlined five e-government security goals: Availability: Timely, reliable access to data and services for authorized users.

Identification and authentication: The processes a system uses to recognize an entity, establish the validity of a transmission, message or originator, and verify authorization for a user to receive information.

Confidentiality: Assurance that information is not available to unauthorized people, processes or devices.

Integrity: Protection against unauthorized modification or destruction of information.

Nonrepudiation: Provides the sender with proof of delivery and the recipient with proof of the sender's identity, so neither can later deny having processed the data.

Source: "Securing Electronic Government"

Featured

  • FCW Perspectives
    tech process (pkproject/Shutterstock.com)

    Understanding the obstacles to automation

    As RPA moves from buzzword to practical applications, agency leaders say it’s forcing broader discussions about business operations

  • Federal 100 Awards
    Federal 100 logo

    Fed 100 nominations are now open

    Help us identify this year's outstanding individuals in federal IT.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.