Health.Zone Web Search

Search results

  1. Results from the Health.Zone Content Network
  2. Common Access Card - Wikipedia

    en.wikipedia.org/wiki/Common_Access_Card

    The common access card, also commonly referred to as the CAC, is the standard identification for active duty United States defense personnel. The card itself is a smart card about the size of a credit card. [1] Defense personnel that use the CAC include the Selected Reserve and National Guard, United States Department of Defense (DoD) civilian ...

  3. United States Uniformed Services Privilege and Identification ...

    en.wikipedia.org/wiki/United_States_Uniformed...

    A United States Uniformed Services Privilege and Identification Card (also known as U.S. military ID, Geneva Conventions Identification Card, or less commonly abbreviated USPIC) is an identity document issued by the United States Department of Defense to identify a person as a member of the Armed Forces or a member's dependent, such as a child ...

  4. Host Based Security System - Wikipedia

    en.wikipedia.org/wiki/Host_Based_Security_System

    Host Based Security System. Host Based Security System ( HBSS) is the official name given to the United States Department of Defense (DOD) commercial off-the-shelf (COTS) suite of software applications used within the DOD to monitor, detect, and defend the DOD computer networks and systems. The Enterprise-wide Information Assurance and computer ...

  5. FIPS 201 - Wikipedia

    en.wikipedia.org/wiki/FIPS_201

    FIPS 201 ( Federal Information Processing Standard Publication 201) is a United States federal government standard that specifies Personal Identity Verification ( PIV) requirements for Federal employees and contractors. In response to HSPD-12, the NIST Computer Security Division initiated a new program for improving the identification and ...

  6. Public key infrastructure - Wikipedia

    en.wikipedia.org/wiki/Public_key_infrastructure

    Public key infrastructure. A public key infrastructure ( PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network ...

  7. Electronic Key Management System - Wikipedia

    en.wikipedia.org/wiki/Electronic_Key_Management...

    The Electronic Key Management System ( EKMS) is a United States National Security Agency led program responsible for Communications Security ( COMSEC) key management, accounting, and distribution. Specifically, EKMS generates and distributes electronic key material for all NSA encryption systems whose keys are loaded using standard fill devices ...

  8. CCID (protocol) - Wikipedia

    en.wikipedia.org/wiki/CCID_(protocol)

    CCID ( chip card interface device) protocol is a USB protocol that allows a smartcard to be connected to a computer via a card reader using a standard USB interface, without the need for each manufacturer of smartcards to provide its own reader or protocol. [1] This allows the smartcard to be used as a security token for authentication and data ...

  9. Smart card - Wikipedia

    en.wikipedia.org/wiki/Smart_card

    A smart card ( SC ), chip card, or integrated circuit card ( ICC or IC card ), is a card used to control access to a resource. It is typically a plastic credit card-sized card with an embedded integrated circuit (IC) chip. [1] Many smart cards include a pattern of metal contacts to electrically connect to the internal chip.