Health.Zone Web Search

Search results

  1. Results from the Health.Zone Content Network
  2. Design Criteria Standard for Electronic Records Management ...

    en.wikipedia.org/wiki/Design_Criteria_Standard...

    United States Department of Defense standard 5015.2-STD, the Design Criteria Standard for Electronic Records Management Software Applications, was implemented in June 2002. This standard defines requirements for the management of records within the Department of Defense, which has become the accepted standard for many state, county, and local ...

  3. Defense Information Systems Agency - Wikipedia

    en.wikipedia.org/wiki/Defense_Information...

    The Defense Information Systems Agency (DISA), known as the Defense Communications Agency (DCA) until 1991, is a United States Department of Defense (DoD) combat support agency composed of military, federal civilians, and contractors. DISA provides information technology (IT) and communications support to the President, Vice President ...

  4. Department of Defense Information Assurance Certification and ...

    en.wikipedia.org/wiki/Department_of_Defense...

    The DoD Information Assurance Certification and Accreditation Process (DIACAP) is a deprecated United States Department of Defense (DoD) process meant to ensure companies and organizations applied risk management to information systems (IS). DIACAP defined a DoD-wide formal and standard set of activities, general tasks and a management ...

  5. Host Based Security System - Wikipedia

    en.wikipedia.org/wiki/Host_Based_Security_System

    Host Based Security System (HBSS) is the official name given to the United States Department of Defense (DOD) commercial off-the-shelf (COTS) suite of software applications used within the DOD to monitor, detect, and defend the DOD computer networks and systems. The Enterprise-wide Information Assurance and computer Network Defense Solutions ...

  6. eMASS - Wikipedia

    en.wikipedia.org/wiki/EMASS

    eMASS is a service-oriented computer application that supports Information Assurance (IA) program management and automates the Risk Management Framework (RMF). [1] The purpose of eMASS is to help the DoD to maintain IA situational awareness, manage risk, and comply with the Federal Information Security Management Act (FISMA 2002) and the Federal Information Security Modernization Act (FISMA ...

  7. Systems Engineering and Technical Assistance - Wikipedia

    en.wikipedia.org/wiki/Systems_Engineering_and...

    SETA is an industry term, which the DoD has used since at least 1995, for example in the Software Engineering Institute; [1] 'Defense Acquisition Deskbook, "S"; the An Acronym List for the Information Age (Armed Forces Communications and Electronics Association); the DoD Guide to Integrated Product and Process Development. [2]

  8. Defense Information System Network - Wikipedia

    en.wikipedia.org/wiki/Defense_Information_System...

    As defined in CJCSI 6211.02C, Defense Information System Network (DISN) Policy and Responsibilities, 9 July 2008, end-to-end is defined as the fusion of requisite components to deliver a defined capability. For the GIG, this implies components from the user access and display devices and sensors to the various levels of networking and ...

  9. Assured Compliance Assessment Solution - Wikipedia

    en.wikipedia.org/wiki/Assured_Compliance...

    Assured Compliance Assessment Solution (ACAS) is a software set of information security tools used for vulnerability scanning and risk assessment by agencies of the United States Department of Defense (DoD). [1] It performs automated vulnerability scanning and device configuration assessment. ACAS was implemented by the DoD in 2012, with ...