This Script allows reload images
Skip to content
Use of the Council logo must be approved by the Council Director at the Office of Management and Budget and the Council Vice Chair      Today: 09.15.2008
Use of the Council logo must be approved by the Council Director at the Office of Management and Budget and the Council Vice Chair view site map
home about the council calendar of events documents links faqs contact us allmembers
Documents Header Back
 

Information Technology >IT Security / Privacy

HIGHLIGHTS: Information Security: Technologies to Secure Federal Systems
Issued By: GAO - Effective Date: , 64.764K, PDF
Abstract: An overview of the report "Information Security: Technologies to Secure Federal Systems" where GAO categorized specific technologies according to the control functionality they provide and described what the technologies do, how they work, and their reported effectiveness. GAO identified 18 technologies that are available within these categories, including smart tokens which establish users' identities through an integrated circuit chip in a portable device such as a smart card or a time synchronized token-and security event correlation tools-which monitor and document actions on network devices and analyze the actions to determine if an attack is ongoing or has occurred.

Printer Friendly
 
Committee Menu
  Architecture & Infrastructure

Best Practices

IT Workforce

Privacy

Security & Identity Management
Committee Menu
 
CIO University

Core.gov

Federal Enterprise Architecture

Interagency Committee on Government Information (ICGI)

SmartBuy

The Small Agency CIO Council

Moving IT Forward
(Recruitment Video)



CIO Council Member Login
  CIO Council Member Login