Health.Zone Web Search

Search results

  1. Results from the Health.Zone Content Network
  2. Navy Marine Corps Intranet - Wikipedia

    en.wikipedia.org/wiki/Navy_Marine_Corps_Intranet

    On 6 October 2000, the NMCI contract was awarded to Electronic Data Systems (EDS), now HP Enterprise Services (HP). [11] Secretary of the Navy Gordon England summed up the Navy's IT Environment prior to the commencement of NMCI: “We basically had 28 separate commands budgeting, developing, licensing, and operating IT autonomously.

  3. KY-58 - Wikipedia

    en.wikipedia.org/wiki/KY-58

    The VINSON KY-58 is a secure voice module primarily used to encrypt radio communication to and from military aircraft and other tactical vehicles. It is employed by U.S. Military Joint Services, NATO and some law enforcement agencies. It is designed to operate over bandwidth-restricted circuits such as UHF and VHF satellite access and wideband ...

  4. ANDVT - Wikipedia

    en.wikipedia.org/wiki/ANDVT

    The Advanced Narrowband Digital Voice Terminal (ANDVT) is a secure voice terminal for low bandwidth secure voice communications throughout the U.S. Department of Defense. [1] Devices in the ANDVT family include the AN/USC-43 Tactical Terminal (TACTERM), the KY-99A Miniaturized Terminal (MINTERM), and the KY-100 Airborne Terminal (AIRTERM).

  5. VINSON - Wikipedia

    en.wikipedia.org/wiki/VINSON

    VINSON is a family of voice encryption devices used by U.S. and allied military and law enforcement, based on the NSA's classified Suite A SAVILLE encryption algorithm and 16 kbit/s CVSD audio compression. It replaces the Vietnam War -era NESTOR (KY-8/KY-28|28/KY-38|38) family. These devices provide tactical secure voice on UHF and VHF line of ...

  6. Fill device - Wikipedia

    en.wikipedia.org/wiki/Fill_device

    A fill device or key loader is a module used to load cryptographic keys into electronic encryption machines. Fill devices are usually hand held and electronic ones are battery operated. Older mechanical encryption systems, such as rotor machines, were keyed by setting the positions of wheels and plugs from a printed keying list.

  7. NESTOR (encryption) - Wikipedia

    en.wikipedia.org/wiki/NESTOR_(encryption)

    NESTOR was a family of compatible, tactical, wideband secure voice systems developed by the U.S. National Security Agency and widely deployed during the Vietnam War through the late Cold War period of the 1980s. NESTOR consists of three systems. The KY-8 was used in vehicular and afloat applications; the KY-28 was the airborne version; and the ...

  8. Operation Cyber Condition Zebra - Wikipedia

    en.wikipedia.org/wiki/Operation_Cyber_Condition...

    Operation Cyber Condition Zebra is a network operations campaign conducted by the United States Navy to deny network intrusion and establish an adequate computer network defense posture to provide defense-in-depth and warfighting capability. The operation specifies that perimeter security for legacy networks will deny intrusions and data ...

  9. NSA product types - Wikipedia

    en.wikipedia.org/wiki/NSA_product_types

    The U.S. National Security Agency (NSA) used to rank cryptographic products or algorithms by a certification called product types. Product types were defined in the National Information Assurance Glossary (CNSSI No. 4009, 2010) which used to define Type 1, 2, 3, and 4 products. [1] The definitions of numeric type products have been removed from ...