The U.S. Intelligence Community has deployed KVM to house national security systems – those processing information classified as Top Secret and above – systems of which unauthorized access could represent significant risks to national security.
This session will detail both the processes and technology behind KVM deployments into the U.S. Intelligence Community, focusing on three key areas:
CONFIDENTIALITY: “Preserving authorized restrictions on information access
and disclosure, including means for protecting personal privacy and proprietary
information…” [44 U.S.C., Section 3542] A loss of confidentiality is the unauthorized
disclosure of information.
INTEGRITY: “Guarding against improper information modification or destruction,
and includes ensuring information nonrepudiation and authenticity…” [44 U.S.C., Sec.
3542] A loss of integrity is the unauthorized modification or destruction of information.
AVAILABILITY: “Ensuring timely and reliable access to and use of
information…” [44 U.S.C., Section 3542] A loss of availability is the disruption of
access to or use of information or an information system.
While outlining deployment methodology for the U.S. Intelligence Community this talk is highly applicable to other industries who follow regulatory compliance around confidentiality, integrity, and availability of information systems.
Session Time Slot(s):
Saturday, April 27, 2013 - 15:00 to 16:00