Health.Zone Web Search

Search results

  1. Results from the Health.Zone Content Network
  2. Use of Free and Open-Source Software (FOSS) in the U.S ...

    en.wikipedia.org/wiki/Use_of_Free_and_Open...

    The main conclusion of the analysis was that FOSS software plays a more critical role in the DoD than has generally been recognized. FOSS applications are most important in four broad areas: Infrastructure Support, Software Development, Security, and Research. One unexpected result was the degree to which Security depends on FOSS.

  3. Design Criteria Standard for Electronic Records Management ...

    en.wikipedia.org/wiki/Design_Criteria_Standard...

    United States Department of Defense standard 5015.2-STD, the Design Criteria Standard for Electronic Records Management Software Applications, was implemented in June 2002. This standard defines requirements for the management of records within the Department of Defense, which has become the accepted standard for many state, county, and local ...

  4. United States Military Standard - Wikipedia

    en.wikipedia.org/wiki/United_States_Military...

    Related documents, such as defense handbooks and defense specifications, are also addressed. Definition of document types [ edit ] Although the official definitions differentiate between several types of documents, all of these documents go by the general rubric of "military standard", including defense specifications, handbooks, and standards.

  5. FIPS 140 - Wikipedia

    en.wikipedia.org/wiki/FIPS_140

    The 140 series of Federal Information Processing Standards ( FIPS) are U.S. government computer security standards that specify requirements for cryptographic modules . As of October 2020, FIPS 140-2 and FIPS 140-3 are both accepted as current and active. [1] FIPS 140-3 was approved on March 22, 2019 as the successor to FIPS 140-2 and became ...

  6. Host Based Security System - Wikipedia

    en.wikipedia.org/wiki/Host_Based_Security_System

    Host Based Security System. Host Based Security System ( HBSS) is the official name given to the United States Department of Defense (DOD) commercial off-the-shelf (COTS) suite of software applications used within the DOD to monitor, detect, and defend the DOD computer networks and systems. The Enterprise-wide Information Assurance and computer ...

  7. Assured Compliance Assessment Solution - Wikipedia

    en.wikipedia.org/wiki/Assured_Compliance...

    Assured Compliance Assessment Solution (ACAS) is a software set of information security tools used for vulnerability scanning and risk assessment by agencies of the United States Department of Defense (DoD). [1] It performs automated vulnerability scanning and device configuration assessment. ACAS was implemented by the DoD in 2012, with ...

  8. FIPS 140-2 - Wikipedia

    en.wikipedia.org/wiki/FIPS_140-2

    The Federal Information Processing Standard Publication 140-2, ( FIPS PUB 140-2 ), [1] [2] is a U.S. government computer security standard used to approve cryptographic modules. The title is Security Requirements for Cryptographic Modules. Initial publication was on May 25, 2001, and was last updated December 3, 2002.

  9. DoD IPv6 product certification - Wikipedia

    en.wikipedia.org/wiki/DoD_IPv6_Product_Certification

    This list is used by procurement offices in the DoD and the U.S. Federal agencies for ongoing purchases and acquisitions of IT equipment. As of February 2009, the DoD ceased the requirement for IPv6-only testing for certification and entry into the Unified Capabilities Approved Products List (UC APL).