Information / Vulnerability Management / DoD Information Systems / IAW National Security Telecommunications / A-4 Monitoring Information Systems / Information Assurance Vulnerability Management / IA-Enabled Information Technology / /
Country
United States / /
Event
M&A / FDA Phase / Product Issues / /
IndustryTerm
Internet access / maintained ensuring technology / government systems / storage media / Web portals / security applications / intrusion detection systems / Mobile code technologies / software components / removable media / technology obsolescence / isolated local area network / file sharing software / flash media / systems technology / data-at-rest solutions / Web site owner / intrusion prevention systems / Public domain software products / classified information systems / cross domain solutions / Wireless Devices / /
OperatingSystem
Microsoft Windows / /
Organization
United States Coast Guard / Designated Accrediting Authority / National Security Agency / Defense Agency / Defense Security Service / U.S. Government / Committee on National Security Systems Instruction / Defense Information Systems Agency / National Intelligence / Defense Intelligence Agency / Central Security Service / Site Administration / Combatant Command / Department of Defense Directive / Department of Defense / CC/S/A mission / U.S. Strategic Command / /
Person
CRAIG A. FRANKLIN / /
Position
Information Systems Security Officer / Information Systems Security Manager / Chief Information Officer (CIO) / Manager / CC/S/A Headquarters-level Authorizing Official / Officer / contractor / CHAIRMAN / Director / Assistant Secretary / Major General / USAF Vice Director / Executive / CIO / Commander / Director / Joint Staff Enclosures / Authorizing Official / /
Product
C-23 Network Suspensions / vulnerability potential / DoD Information / /
ProgrammingLanguage
Java / C / HTML / J / /
PublishedMedium
Restoration / /
Technology
Virtual Machine / universal serial bus / LAN / Hypertext Markup Language / Wireless Devices / Peer-to-Peer / P2P / HTML / Mobile code technologies / Encryption / Public Key / 2011 technology / Java / maintained ensuring technology / Mobile Computing / file sharing / cell phones / operating systems technology / flash / /