Health.Zone Web Search

  1. Ad

    related to: disa approved products list software

Search results

  1. Results from the Health.Zone Content Network
  2. Host Based Security System - Wikipedia

    en.wikipedia.org/wiki/Host_Based_Security_System

    Host Based Security System (HBSS) is the official name given to the United States Department of Defense (DOD) commercial off-the-shelf (COTS) suite of software applications used within the DOD to monitor, detect, and defend the DOD computer networks and systems. The Enterprise-wide Information Assurance and computer Network Defense Solutions ...

  3. Assured Compliance Assessment Solution - Wikipedia

    en.wikipedia.org/wiki/Assured_Compliance...

    Assured Compliance Assessment Solution (ACAS) is a software set of information security tools used for vulnerability scanning and risk assessment by agencies of the United States Department of Defense (DoD). [1] It performs automated vulnerability scanning and device configuration assessment. ACAS was implemented by the DoD in 2012, with ...

  4. Defense Information Systems Agency - Wikipedia

    en.wikipedia.org/wiki/Defense_Information...

    The Defense Information Systems Agency (DISA), known as the Defense Communications Agency (DCA) until 1991, is a United States Department of Defense (DoD) combat support agency composed of military, federal civilians, and contractors. DISA provides information technology (IT) and communications support to the President, Vice President ...

  5. Cross-domain solution - Wikipedia

    en.wikipedia.org/wiki/Cross-domain_solution

    Cross-domain solution. A cross-domain solution (CDS) is an integrated information assurance system composed of specialized software or hardware that provides a controlled interface to manually or automatically enable and/or restrict the access or transfer of information between two or more security domains based on a predetermined security ...

  6. Security Technical Implementation Guide - Wikipedia

    en.wikipedia.org/wiki/Security_Technical...

    The use of STIGs enables a methodology for securing protocols within networks, servers, computers, and logical designs to enhance overall security. These guides, when implemented, enhance security for software, hardware, physical and logical architectures to further reduce vulnerabilities.

  7. DoD IPv6 product certification - Wikipedia

    en.wikipedia.org/wiki/DoD_IPv6_Product_Certification

    As of February 2009, the DoD ceased the requirement for IPv6-only testing for certification and entry into the Unified Capabilities Approved Products List (UC APL). According to Kris Strance, DoD CIO IPv6 Lead, "The testing of IPv6 is a part of all product evaluations — it is much broader in scope now."

  8. eMASS - Wikipedia

    en.wikipedia.org/wiki/EMASS

    eMASS is a service-oriented computer application that supports Information Assurance (IA) program management and automates the Risk Management Framework (RMF). [1] The purpose of eMASS is to help the DoD to maintain IA situational awareness, manage risk, and comply with the Federal Information Security Management Act (FISMA 2002) and the Federal Information Security Modernization Act (FISMA ...

  9. Joint Interoperability Test Command - Wikipedia

    en.wikipedia.org/wiki/Joint_Interoperability...

    The JITC had its roots in the TRI-TAC program of the 1970s, which sought to streamline and test the technology behind field and tactical command systems. The program began officially in 1971, and work started in 1976 at Fort Huachuca in southern Arizona. The TRI-TAC program tested various field equipment for years, but ran into problems with ...

  1. Ad

    related to: disa approved products list software