Security goals

The CIO Council, the Chief Financial Officers Council and the Information Technology Association of America outlined five e-government security goals: Availability: Timely, reliable access to data and services for authorized users.

Identification and authentication: The processes a system uses to recognize an entity, establish the validity of a transmission, message or originator, and verify authorization for a user to receive information.

Confidentiality: Assurance that information is not available to unauthorized people, processes or devices.

Integrity: Protection against unauthorized modification or destruction of information.

Nonrepudiation: Provides the sender with proof of delivery and the recipient with proof of the sender's identity, so neither can later deny having processed the data.

Source: "Securing Electronic Government"

Featured

  • Comment
    customer experience (garagestock/Shutterstock.com)

    Leveraging the TMF to improve customer experience

    Focusing on customer experience as part of the Technology Modernization Fund investment strategy will enable agencies to improve service and build trust in government.

  • FCW Perspectives
    zero trust network

    Why zero trust is having a moment

    Improved technologies and growing threats have agencies actively pursuing dynamic and context-driven security.

Stay Connected