Health.Zone Web Search

  1. Ad

    related to: dod approved software

Search results

  1. Results from the Health.Zone Content Network
  2. Host Based Security System - Wikipedia

    en.wikipedia.org/wiki/Host_Based_Security_System

    Host Based Security System (HBSS) is the official name given to the United States Department of Defense (DOD) commercial off-the-shelf (COTS) suite of software applications used within the DOD to monitor, detect, and defend the DOD computer networks and systems. The Enterprise-wide Information Assurance and computer Network Defense Solutions ...

  3. Assured Compliance Assessment Solution - Wikipedia

    en.wikipedia.org/wiki/Assured_Compliance...

    Assured Compliance Assessment Solution (ACAS) is a software set of information security tools used for vulnerability scanning and risk assessment by agencies of the United States Department of Defense (DoD). [1] It performs automated vulnerability scanning and device configuration assessment. ACAS was implemented by the DoD in 2012, with ...

  4. Use of Free and Open-Source Software (FOSS) in the U.S ...

    en.wikipedia.org/wiki/Use_of_Free_and_Open...

    The FOSS report began in early 2002 as a request relayed to Terry Bollinger of The MITRE Corporation to collect data on how FOSS was being used in U.S. DoD systems. The driver for the request was an ongoing debate within the U.S. DoD about whether to ban the use of FOSS in its systems, and in particular whether to ban GNU General Public License (GPL) software.

  5. Cryptographic Modernization Program - Wikipedia

    en.wikipedia.org/wiki/Cryptographic...

    The Cryptographic Modernization program is a tightly integrated partnership between the NSA, the military departments, operational commands, defense agencies, the Joint Staff, federal government entities and industry. The program is a multibillion-dollar, multi-year undertaking that will transform cryptographic security capabilities for ...

  6. eMASS - Wikipedia

    en.wikipedia.org/wiki/EMASS

    eMASS is a service-oriented computer application that supports Information Assurance (IA) program management and automates the Risk Management Framework (RMF). [1] The purpose of eMASS is to help the DoD to maintain IA situational awareness, manage risk, and comply with the Federal Information Security Management Act (FISMA 2002) and the Federal Information Security Modernization Act (FISMA ...

  7. Defense Technical Information Center - Wikipedia

    en.wikipedia.org/wiki/Defense_Technical...

    The Defense Technical Information Center (DTIC, / ˈdiːtɪk / [2]) is the repository for research and engineering information for the United States Department of Defense (DoD). DTIC's services are available to DoD personnel, federal government personnel, federal contractors and selected academic institutions.

  8. Defense Travel System - Wikipedia

    en.wikipedia.org/wiki/Defense_Travel_System

    Defense Travel System. The Defense Travel System (DTS) is a software application used by the U.S. Department of Defense which allows defense travelers to manage their commercial travel in accordance with the government's Joint Travel Regulations. [1]

  9. Lightweight Portable Security - Wikipedia

    en.wikipedia.org/wiki/Lightweight_Portable_Security

    Lightweight Portable Security (LPS) or Trusted End Node Security (TENS) was a Linux LiveCD (or LiveUSB) distribution. The application Encryption Wizard, originally bundled with TENS is still actively maintained. LPS and its successor TENS was developed and publicly distributed by the United States Department of Defense ’s Air Force Research ...

  1. Ad

    related to: dod approved software