Browse Definitions :
Definition

Trusted Internet Connections (TIC)

Trusted Internet Connections (TIC) is a mandate from the Office of Management and Budget (OMB) to reduce the number of Internet gateways on the federal government network and ensure that all external connections are routed through a government agency that has been designated as an approved TIC Access Provider.

The goal of Trusted Internet Connections is to document existing public Internet connections on government networks and create plans to limit the number of public Internet access points so data coming in and out can be monitored and analyzed more effectively. The initiative is intended to make implementation of EINSTEIN, an intrusion detection system (IDS), easier by reducing the number of gateways from 1,000 to 50. Those 50 gateways will become the perimeter of the federal government network.

Learn more:

OMB's administrator for e-government and IT clarifies the goals of the Trusted Internet Connections initiative.

Vivek Kundra, the Federal Chief Information Officer, issued an update to the Update on the Trusted Internet Connections Initiative in September 2009.

Michael Cobb answers the question: "Is security improved when the number of Internet gateways is reduced?"

This was last updated in April 2010
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close