Health.Zone Web Search

Search results

  1. Results from the Health.Zone Content Network
  2. List of U.S. security clearance terms - Wikipedia

    en.wikipedia.org/wiki/List_of_U.S._security...

    T3 or T3R - Tier 3 or Tier 3 Reinvestigation, now replace all NACLC. T5 and T5R - Tier 5 or Tier 5 Reinvestigation, now replace SSBI and SBPR respectively. Yankee White – An investigation required for personnel working with the President and Vice President of the United States. Obtaining such clearance requires, in part, an SSBI.

  3. Multi-factor authentication - Wikipedia

    en.wikipedia.org/wiki/Multi-factor_authentication

    Multi-factor authentication ( MFA; two-factor authentication, or 2FA, along with similar terms) is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism. MFA protects personal data —which ...

  4. Access code - Wikipedia

    en.wikipedia.org/wiki/Access_code

    Access code may refer to: Authentication. Password, a secret word; Personal identification number (PIN), a secret; Telecommunications. Trunk access code, used to dial a domestic call; International access code, used to dial an international call; Area code, a segment of a telephone number; Other. Access Code, a 1984 film with Macdonald Carey

  5. Common Access Card - Wikipedia

    en.wikipedia.org/wiki/Common_Access_Card

    The Common Access Card, also commonly referred to as the CAC, is the standard identification for Active Duty United States Defense personnel. The card itself is a smart card about the size of a credit card. [1] Defense personnel that use the CAC include the Selected Reserve and National Guard, United States Department of Defense (DoD) civilian ...

  6. Discretionary access control - Wikipedia

    en.wikipedia.org/wiki/Discretionary_access_control

    Discretionary access control. In computer security, discretionary access control ( DAC) is a type of access control defined by the Trusted Computer System Evaluation Criteria [1] (TCSEC) as a means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are discretionary in the sense ...

  7. Sensitive compartmented information - Wikipedia

    en.wikipedia.org/wiki/Sensitive_compartmented...

    Sensitive compartmented information. Sensitive compartmented information ( SCI) is a type of United States classified information concerning or derived from sensitive intelligence sources, methods, or analytical processes. All SCI must be handled within formal access control systems established by the Director of National Intelligence.

  8. Standard Carrier Alpha Code - Wikipedia

    en.wikipedia.org/wiki/Standard_Carrier_Alpha_Code

    Standard Carrier Alpha Code. The Standard Carrier Alpha Code ( SCAC) is a privately controlled US code used to identify vessel operating common carriers (VOCC). It is typically two to four letters long. The National Motor Freight Traffic Association developed the SCAC code in the 1960s to help road transport companies computerize data and records.

  9. Access badge - Wikipedia

    en.wikipedia.org/wiki/Access_badge

    An access badge is a credential used to gain entry to an area having automated access control entry points. Entry points may be doors, turnstiles, parking gates or other barriers. Access badges use various technologies to identify the holder of the badge to an access control system. The most common technologies are magnetic stripe, proximity ...