Implementing a Trusted Information Sharing Environment: Using Immutable Audit Logs to Increase Security, Trust, and Accountability Implementing a Trusted Information Sharing Environment: Using Immutable Audit Logs to Increase Security, Trust, and Accountability

Implementing a Trusted Information Sharing Environment: Using Immutable Audit Logs to Increase Security, Trust, and Accountability

Using Immutable Audit Logs to Increase Security, Trust, and Accountability

    • ٥٫٠ - ١ تقييم

وصف الناشر

In this report, the Markle Task Force on National Security in the Information Age explores the use of immutable audit logs (IALs) to improve confidence and trust in the shared information environment (ISE) and thereby promote ISE's widespread adoption. The Markle Task Force explains, "The ability to maintain tamper-resistant logs of user activity on the network can increase security, build trust among users, ensure compliance with relevant policies and guidelines, and improve transparency and the ability to perform oversight by appropriate stakeholders outside of the system." In addition to defining IALs and identifying the benefits of this process, this report also offers considerations for the implementation process and recommendations for related policy.

النوع
المرجع
تاريخ النشر
٢٠١٢
٥ مارس
اللغة
EN
الإنجليزية
عدد الصفحات
٢٣
الناشر
Markle Foundation
البائع
Lulu Enterprises, Inc.
الحجم
١٣١٫٥
ك.ب.
Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force
٢٠١٢
Protecting America's Freedom in the Information Age: A Report of the Markle Foundation Task Force Protecting America's Freedom in the Information Age: A Report of the Markle Foundation Task Force
٢٠١٢
A Tradecraft Primer: Structured Analytic Techniques for Improving Intelligence Analysis  &  Psychology of Intelligence Analysis A Tradecraft Primer: Structured Analytic Techniques for Improving Intelligence Analysis  &  Psychology of Intelligence Analysis
٢٠١٧
2011국가정보화백서 2011국가정보화백서
٢٠١١
A Step By Step Guide: How to Perform Risk Based Internal Auditing for Internal Audit Beginners A Step By Step Guide: How to Perform Risk Based Internal Auditing for Internal Audit Beginners
٢٠١٤
Cognizant Innovation Journal 2012 Cognizant Innovation Journal 2012
٢٠١٢
Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force
٢٠١٢
Protecting America's Freedom in the Information Age: A Report of the Markle Foundation Task Force Protecting America's Freedom in the Information Age: A Report of the Markle Foundation Task Force
٢٠١٢
Network Centric Warfare Network Centric Warfare
١٩٩٩
Conflicts of Interest Conflicts of Interest
٢٠١٢
Anatomy of a Phish Anatomy of a Phish
٢٠١٤
The Path of Least Resistance: Computer Security Is Common Sense The Path of Least Resistance: Computer Security Is Common Sense
٢٠١٢
Security Vs. Convenience Security Vs. Convenience
٢٠١٢
Administration: Configuration and Security Administration: Configuration and Security
٢٠١٣