Department of Defense Information Assurance Certification and Accreditation Process

Results: 117



#Item
11United States federal executive departments / Department of Defense Information Assurance Certification and Accreditation Process / Security controls / Assistant Secretary of Defense for Networks and Information Integration / IUID / Defense Technical Information Center / Mission assurance / Information assurance / Government procurement in the United States / Computer security / United States Department of Defense / Security

DoD Instruction, November 5, 2012

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2012-11-24 07:03:14
12United States Department of Defense / Certification and Accreditation / Multiple Independent Levels of Security / System Security Authorization Agreement / National Security Agency / Department of Defense Information Technology Security Certification and Accreditation Process / Accreditation / Multiple single-level / Computer security / Quality assurance / Multilevel security

The Challenge of Multilevel Security Rick Smith, Ph.D., CISSP http://www.cryptosmith.com/ October 2003

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:30
13Cyberwarfare / Privileged Identity Management / Cryptography / Lieberman Software / Data security / Department of Defense Information Assurance Certification and Accreditation Process / Password / Security token / Security controls / Security / Computer security / Identity management

DIACAP Compliance Enterprise Random Password Manager Introduction Lieberman Software’s Privileged Identity Management solutions help federal government organizations comply with the DoD Information

Add to Reading List

Source URL: www.liebsoft.com

Language: English - Date: 2011-06-28 11:24:58
14Data security / National security / Department of Defense Information Technology Security Certification and Accreditation Process / Department of Defense Information Assurance Certification and Accreditation Process / System Security Authorization Agreement / National Industrial Security Program / Defense Information Systems Agency / Information security / Information assurance / Security / Computer security / United States Department of Defense

Department of Defense INSTRUCTION NUMBERDecember 30, 1997 ASD(C3I)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
15Threat model / Two-factor authentication / Payment Card Industry Data Security Standard / Data center / Software development process / Security Technical Implementation Guide / Department of Defense Information Assurance Certification and Accreditation Process / Computer security / Computing / Information technology management

Security Datasheet Ensure Security Without Compromise with Nutanix Defense in Depth Strategy Security Development Lifecycle The Nutanix Security Development Lifecycle (SecDL) incorporates security into every

Add to Reading List

Source URL: go.nutanix.com

Language: English - Date: 2015-04-26 02:19:47
16Computing / Evaluation / Host Based Security System / Security Technical Implementation Guide / Certification and Accreditation / Information assurance / EMASS / DOD Information Assurance Certification and Accreditation Program / Computer security / United States Department of Defense / Department of Defense Information Assurance Certification and Accreditation Process

Senior Network Security Officer (Security Specialist 3) Title: Location: Reports to:

Add to Reading List

Source URL: ealliant.com

Language: English - Date: 2012-09-17 01:03:21
17Evaluation / Crime prevention / National security / Public safety / CACI / Department of Defense Information Assurance Certification and Accreditation Process / Medical informatics / Certification and Accreditation / Accreditation / Computer security / Security / Quality assurance

CACI Information Solutions and Services CACI Health Information Assurance Solutions Ensuring the Integrity of Healthcare Systems and Patient Data

Add to Reading List

Source URL: www.caci.com

Language: English - Date: 2015-04-03 09:55:56
18Security engineering / United States Department of Homeland Security / United States Department of Defense / Defense Technical Information Center / United States Intelligence Community / Defense Intelligence Agency / Under Secretary of Defense for Intelligence / Department of Defense Information Assurance Certification and Accreditation Process / EMASS / National security / Critical infrastructure protection / Infrastructure

DoD Instruction[removed], March 2, 2015

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2015-03-28 08:05:54
19Computing / Department of Defense Information Assurance Certification and Accreditation Process / Federal Information Security Management Act / Backup / Host Based Security System / Security / Computer security / Data security

Security Manager Cybernet Security Manager A Proven Solution to Cybersecurity Challenges at Competitive Prices Cybernet’s Security Manager delivers solutions to your Cybersecurity and Information Assurance (IA) managem

Add to Reading List

Source URL: cybersecurity.cybernet.com

Language: English - Date: 2015-03-31 10:56:30
20Information technology management / Department of Defense Information Assurance Certification and Accreditation Process / Security controls / Database security / Information assurance / Risk management framework / Computer security / Security Technical Implementation Guide / Security

ELC 2015 Security Architecture in the IoT Age Stephen L Arnold Principal Scientist, VCT Labs Gentoo Linux Developer,

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2015-03-16 19:46:19
UPDATE