Health.Zone Web Search

Search results

  1. Results from the Health.Zone Content Network
  2. Host Based Security System - Wikipedia

    en.wikipedia.org/wiki/Host_Based_Security_System

    Host Based Security System. Host Based Security System ( HBSS) is the official name given to the United States Department of Defense (DOD) commercial off-the-shelf (COTS) suite of software applications used within the DOD to monitor, detect, and defend the DOD computer networks and systems. The Enterprise-wide Information Assurance and computer ...

  3. Defense Information Systems Agency - Wikipedia

    en.wikipedia.org/wiki/Defense_Information...

    DISA manages all the partner data, hardware components, software, and labor. Contracting. DISA purchases telecommunications and information technology (IT) products and services for the U.S. military using a variety of contract vehicles. Enterprise Engineering. Enterprise Engineering refers to the Global Information Grid (a.k.a. the GIG).

  4. eMASS - Wikipedia

    en.wikipedia.org/wiki/EMASS

    eMASS is a service-oriented computer application that supports Information Assurance (IA) program management and automates the Risk Management Framework (RMF). [1] The purpose of eMASS is to help the DoD to maintain IA situational awareness, manage risk, and comply with the Federal Information Security Management Act (FISMA 2002) and the ...

  5. Information assurance vulnerability alert - Wikipedia

    en.wikipedia.org/wiki/Information_Assurance...

    Current events of the time demonstrated that widely known vulnerabilities exist throughout DoD networks, with the potential to severely degrade mission performance. The policy memorandum instructs the DISA to develop and maintain an IAVA database system that would ensure a positive control mechanism for system administrators to receive ...

  6. Defense Information System Network - Wikipedia

    en.wikipedia.org/wiki/Defense_Information_System...

    As defined in CJCSI 6211.02C, Defense Information System Network (DISN) Policy and Responsibilities, 9 July 2008, end-to-end is defined as the fusion of requisite components to deliver a defined capability. For the GIG, this implies components from the user access and display devices and sensors to the various levels of networking and ...

  7. List of defense contractors - Wikipedia

    en.wikipedia.org/wiki/List_of_defense_contractors

    List of defense contractors. A defense contractor is a business organization or individual that provides products or services to a military or intelligence department of a government. Products typically include military or civilian aircraft, ships, vehicles, weaponry, and electronic systems, while services can include logistics, technical ...

  8. Department of Defense Information Assurance Certification and ...

    en.wikipedia.org/wiki/Department_of_Defense...

    The DoD Information Assurance Certification and Accreditation Process ( DIACAP) is a deprecated United States Department of Defense (DoD) process meant to ensure companies and organizations applied risk management to information systems (IS). DIACAP defined a DoD-wide formal and standard set of activities, general tasks and a management ...

  9. List of United States defense contractors - Wikipedia

    en.wikipedia.org/wiki/List_of_United_States...

    ('DoD 9700' worksheet). The Department of Defense announces contracts valued at $7 million or more each business day at 5 pm. All defense contractors maintain CAGE (Commercial and Government Entity) Codes and are profiled in the System for Award Management (SAM).