Health.Zone Web Search

Search results

  1. Results from the Health.Zone Content Network
  2. Information assurance vulnerability alert - Wikipedia

    en.wikipedia.org/wiki/Information_Assurance...

    US-CERT analyzes each vulnerability and determines if it is necessary or beneficial to the Department of Defense to release it as an IAVA. Implementation of IAVA policy will help ensure that DoD Components take appropriate mitigating actions against vulnerabilities to avoid serious compromises to DoD computer system assets that would ...

  3. Department of Defense Information Assurance Certification and ...

    en.wikipedia.org/wiki/Department_of_Defense...

    The DoD Information Assurance Certification and Accreditation Process (DIACAP) is a deprecated United States Department of Defense (DoD) process meant to ensure companies and organizations applied risk management to information systems (IS). DIACAP defined a DoD-wide formal and standard set of activities, general tasks and a management ...

  4. Common Access Card - Wikipedia

    en.wikipedia.org/wiki/Common_Access_Card

    Common Access Card. A Common Access Card (CAC). The common access card, also commonly referred to as the CAC, is the standard identification for active duty United States defense personnel. The card itself is a smart card about the size of a credit card. [1] Defense personnel that use the CAC include the Selected Reserve and National Guard ...

  5. Assured Compliance Assessment Solution - Wikipedia

    en.wikipedia.org/wiki/Assured_Compliance...

    Assured Compliance Assessment Solution. Assured Compliance Assessment Solution (ACAS) is a software set of information security tools used for vulnerability scanning and risk assessment by agencies of the United States Department of Defense (DoD). [1] It performs automated vulnerability scanning and device configuration assessment.

  6. Einstein (US-CERT program) - Wikipedia

    en.wikipedia.org/wiki/Einstein_(US-CERT_program)

    Einstein (US-CERT program) The EINSTEIN System (part of the National Cybersecurity Protection System) is a network intrusion detection and prevention system that monitors the networks of US federal government departments and agencies. The system is developed and managed by the Cybersecurity and Infrastructure Security Agency (formerly NPPD ...

  7. United States Computer Emergency Readiness Team - Wikipedia

    en.wikipedia.org/wiki/United_States_Computer...

    The concept of a national Computer Emergency Response Team (CERT) for the United States was proposed by Marcus Sachs (Auburn University) when he was a staff member for the U.S. National Security Council in 2002 to be a peer organization with other national CERTs such as AusCERT and CERT-UK, and to be located in the forthcoming Department of Homeland Security (DHS).

  8. Host Based Security System - Wikipedia

    en.wikipedia.org/wiki/Host_Based_Security_System

    Host Based Security System (HBSS) is the official name given to the United States Department of Defense (DOD) commercial off-the-shelf (COTS) suite of software applications used within the DOD to monitor, detect, and defend the DOD computer networks and systems. The Enterprise-wide Information Assurance and computer Network Defense Solutions ...

  9. Computer emergency response team - Wikipedia

    en.wikipedia.org/wiki/Computer_emergency...

    Computer emergency response team. A computer emergency response team (CERT) is an incident response team dedicated to computer security incidents. Other names used to describe CERT include cyber emergency response team, computer emergency readiness team, computer security incident response team (CSIRT), or cyber security incident response team.