Health.Zone Web Search

Search results

  1. Results from the Health.Zone Content Network
  2. Use of Free and Open-Source Software (FOSS) in the U.S ...

    en.wikipedia.org/wiki/Use_of_Free_and_Open...

    The main conclusion of the analysis was that FOSS software plays a more critical role in the DoD than has generally been recognized. FOSS applications are most important in four broad areas: Infrastructure Support, Software Development, Security, and Research. One unexpected result was the degree to which Security depends on FOSS.

  3. Host Based Security System - Wikipedia

    en.wikipedia.org/wiki/Host_Based_Security_System

    Host Based Security System. Host Based Security System ( HBSS) is the official name given to the United States Department of Defense (DOD) commercial off-the-shelf (COTS) suite of software applications used within the DOD to monitor, detect, and defend the DOD computer networks and systems. The Enterprise-wide Information Assurance and computer ...

  4. United States Military Standard - Wikipedia

    en.wikipedia.org/wiki/United_States_Military...

    Related documents, such as defense handbooks and defense specifications, are also addressed. Definition of document types [ edit ] Although the official definitions differentiate between several types of documents, all of these documents go by the general rubric of "military standard", including defense specifications, handbooks, and standards.

  5. Assured Compliance Assessment Solution - Wikipedia

    en.wikipedia.org/wiki/Assured_Compliance...

    Assured Compliance Assessment Solution (ACAS) is a software set of information security tools used for vulnerability scanning and risk assessment by agencies of the United States Department of Defense (DoD). [1] It performs automated vulnerability scanning and device configuration assessment. ACAS was implemented by the DoD in 2012, with ...

  6. Design Criteria Standard for Electronic Records Management ...

    en.wikipedia.org/wiki/Design_Criteria_Standard...

    United States Department of Defense standard 5015.2-STD, the Design Criteria Standard for Electronic Records Management Software Applications, was implemented in June 2002. This standard defines requirements for the management of records within the Department of Defense, which has become the accepted standard for many state, county, and local ...

  7. FIPS 140-2 - Wikipedia

    en.wikipedia.org/wiki/FIPS_140-2

    The Federal Information Processing Standard Publication 140-2, ( FIPS PUB 140-2 ), [1] [2] is a U.S. government computer security standard used to approve cryptographic modules. The title is Security Requirements for Cryptographic Modules. Initial publication was on May 25, 2001, and was last updated December 3, 2002.

  8. DoD IPv6 product certification - Wikipedia

    en.wikipedia.org/wiki/DoD_IPv6_Product_Certification

    This list is used by procurement offices in the DoD and the U.S. Federal agencies for ongoing purchases and acquisitions of IT equipment. As of February 2009, the DoD ceased the requirement for IPv6-only testing for certification and entry into the Unified Capabilities Approved Products List (UC APL).

  9. Future Airborne Capability Environment - Wikipedia

    en.wikipedia.org/wiki/Future_Airborne_Capability...

    The Open Group Future Airborne Capability Environment (FACE Consortium) was formed in 2010 to define an open avionics environment for all military airborne platform types. Today, it is a real-time software-focused professional group made up of industry suppliers, customers, academia, and users. The FACE approach is a government-industry ...