Security goals

The CIO Council, the Chief Financial Officers Council and the Information Technology Association of America outlined five e-government security goals: Availability: Timely, reliable access to data and services for authorized users.

Identification and authentication: The processes a system uses to recognize an entity, establish the validity of a transmission, message or originator, and verify authorization for a user to receive information.

Confidentiality: Assurance that information is not available to unauthorized people, processes or devices.

Integrity: Protection against unauthorized modification or destruction of information.

Nonrepudiation: Provides the sender with proof of delivery and the recipient with proof of the sender's identity, so neither can later deny having processed the data.

Source: "Securing Electronic Government"

Featured

  • Defense
    Essye Miller, Director at Defense Information Management, speaks during the Breaking the Gender Barrier panel at the Air Space, Cyber Conference in National Harbor, Md., Sept. 19, 2017. (U.S. Air Force photo/Staff Sgt. Chad Trujillo)

    Essye Miller: The exit interview

    Essye Miller, DOD's outgoing principal deputy CIO, talks about COVID, the state of the tech workforce and the hard conversations DOD has to have to prepare personnel for the future.

  • innovation (Sergey Nivens/Shutterstock.com)

    VA embraces procurement challenges at scale

    Steve Kelman applauds the Department of Veterans Affairs' ambitious attempt to move beyond one-off prize-based contests to combat veteran suicides more effectively.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.