|
|
Information Technology >IT Security / Privacy
|
|
HIGHLIGHTS: Information Security: Technologies to Secure Federal Systems Issued By: GAO - Effective Date: , 64.764K, PDF |
|
|
|
Abstract:
An overview of the report "Information Security: Technologies to Secure Federal Systems" where GAO categorized specific technologies according to the control functionality they provide and described what the technologies do, how they work, and their reported effectiveness. GAO identified 18 technologies that are available within these categories, including smart tokens which establish users' identities through an integrated circuit chip in a portable device such as a smart card or a time synchronized token-and security event correlation tools-which monitor and document actions on network devices and analyze the actions to determine if an attack is ongoing or has occurred.
Printer Friendly
|
|
|
|
|
|
|