Government: Using an Open Source Framework to Catch the Bad Guy
Every security policy provides guidance and requirements for ensuring adequate protection of information and data, as well as high-level technical and administrative security requirements for a system in a given environment. Traditionally, providing security for a system focuses on the confidentiality of the information on it. However, protecting the data integrity and system and data availability is just as important. For example, when processing United States intelligence information, there are three attributes that require protection: confidentiality, integrity, and availability.
If you're with a government agency, learn more about catching the bad guy in this free white paper.
Presented By: Red Hat Federal Solutions Architect team
Authored By: Norman Mark St. Laurent, Senior solutions architect
Editing and technical guidance: Shawn Wells, Technical director
- Readers' Choice Awards 2013
- Mars Needs Women
- Linux Kernel News - November 2013
- RSS Feeds
- Sublime Text: One Editor to Rule Them All?
- Raspberry Pi: the Perfect Home Server
- December 2013 Issue of Linux Journal: Readers' Choice
- Tech Tip: Really Simple HTTP Server with Python
- IBM Will Minimize Impact of Future Disasters
- Linux Systems Administrator
- The kernel doesn't really
27 min 17 sec ago
58 min 17 sec ago
58 min 23 sec ago
3 hours 3 min ago
- This should be very helpful
4 hours 17 min ago
- As much as I share your point
6 hours 36 min ago
- So girls had it better ?
10 hours 8 min ago
- Reply to comment | Linux Journal
10 hours 28 min ago
- why is GNOME 3 in the fifth position at 14.1 %?
16 hours 1 min ago
- Sublime Is Brilliant!
21 hours 3 min ago