Health.Zone Web Search

Search results

  1. Results from the Health.Zone Content Network
  2. Trusted Computer System Evaluation Criteria - Wikipedia

    en.wikipedia.org/wiki/Trusted_Computer_System...

    The Orange Book. Trusted Computer System Evaluation Criteria ( TCSEC) is a United States Government Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system. The TCSEC was used to evaluate, classify, and select computer systems being considered ...

  3. Host Based Security System - Wikipedia

    en.wikipedia.org/wiki/Host_Based_Security_System

    Host Based Security System. Host Based Security System ( HBSS) is the official name given to the United States Department of Defense (DOD) commercial off-the-shelf (COTS) suite of software applications used within the DOD to monitor, detect, and defend the DOD computer networks and systems. The Enterprise-wide Information Assurance and computer ...

  4. DoD IPv6 product certification - Wikipedia

    en.wikipedia.org/wiki/DoD_IPv6_Product_Certification

    This list is used by procurement offices in the DoD and the U.S. Federal agencies for ongoing purchases and acquisitions of IT equipment. As of February 2009, the DoD ceased the requirement for IPv6-only testing for certification and entry into the Unified Capabilities Approved Products List (UC APL).

  5. Motorola Solutions' AirDefense Services Platform Approved to ...

    www.aol.com/2013/06/26/motorola-solutions-air...

    Motorola Solutions' AirDefense Services Platform Approved to Protect U.S. Department of Defense Wireless Networks Placement on the Unified Capabilities-Approved Product List (UC-APL) certifies ...

  6. FIPS 140-2 - Wikipedia

    en.wikipedia.org/wiki/FIPS_140-2

    FIPS 140-2 establishes the Cryptographic Module Validation Program (CMVP) as a joint effort by the NIST and the Communications Security Establishment (CSE) for the Government of Canada. Security programs overseen by NIST and CSE focus on working with government and industry to establish more secure systems and networks by developing, managing ...

  7. Defense Information Systems Agency - Wikipedia

    en.wikipedia.org/wiki/Defense_Information...

    United StatesArmed Forces. The Defense Information Systems Agency ( DISA ), known as the Defense Communications Agency ( DCA) until 1991, is a United States Department of Defense (DoD) combat support agency composed of military, federal civilians, and contractors.

  8. Assured Compliance Assessment Solution - Wikipedia

    en.wikipedia.org/wiki/Assured_Compliance...

    Assured Compliance Assessment Solution (ACAS) is a software set of information security tools used for vulnerability scanning and risk assessment by agencies of the United States Department of Defense (DoD). [1] It performs automated vulnerability scanning and device configuration assessment. ACAS was implemented by the DoD in 2012, with ...

  9. List of U.S. security clearance terms - Wikipedia

    en.wikipedia.org/wiki/List_of_U.S._security...

    Investigations. The following investigations are used in clearance determinations: [12] ANACI (Access National Agency Check with Inquiries) – Initial Confidential, Secret, L, LX; only used for civilian employees. NACLC (National Agency Check with Law and Credit) – Initial Confidential, Secret, L, LX; reinvestigations.