Department of Defense Information Technology Security Certification and Accreditation Process

Results: 25



#Item
1Computer security / Security / Prevention / Data security / Department of Defense Information Assurance Certification and Accreditation Process / Crime prevention / Cryptography / National security / Certified Information Systems Security Professional / Risk management framework / Information assurance / Vulnerability

Technology Service Corporation an employee-owned company 1983 S. Liberty Drive, Bloomington, INPhone: (

Add to Reading List

Source URL: www.tsc.com

Language: English - Date: 2015-08-31 15:51:13
2United States Department of Defense / Certification and Accreditation / Multiple Independent Levels of Security / System Security Authorization Agreement / National Security Agency / Department of Defense Information Technology Security Certification and Accreditation Process / Accreditation / Multiple single-level / Computer security / Quality assurance / Multilevel security

The Challenge of Multilevel Security Rick Smith, Ph.D., CISSP http://www.cryptosmith.com/ October 2003

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:30
3Data security / National security / Department of Defense Information Technology Security Certification and Accreditation Process / Department of Defense Information Assurance Certification and Accreditation Process / System Security Authorization Agreement / National Industrial Security Program / Defense Information Systems Agency / Information security / Information assurance / Security / Computer security / United States Department of Defense

Department of Defense INSTRUCTION NUMBERDecember 30, 1997 ASD(C3I)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
4Threat model / Two-factor authentication / Payment Card Industry Data Security Standard / Data center / Software development process / Security Technical Implementation Guide / Department of Defense Information Assurance Certification and Accreditation Process / Computer security / Computing / Information technology management

Security Datasheet Ensure Security Without Compromise with Nutanix Defense in Depth Strategy Security Development Lifecycle The Nutanix Security Development Lifecycle (SecDL) incorporates security into every

Add to Reading List

Source URL: go.nutanix.com

Language: English - Date: 2015-04-26 02:19:47
5Information technology management / Department of Defense Information Assurance Certification and Accreditation Process / Security controls / Database security / Information assurance / Risk management framework / Computer security / Security Technical Implementation Guide / Security

ELC 2015 Security Architecture in the IoT Age Stephen L Arnold Principal Scientist, VCT Labs Gentoo Linux Developer,

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2015-03-16 19:46:19
6Security Technical Implementation Guide / Department of Defense Information Assurance Certification and Accreditation Process / Information technology management / Cyberwarfare / Computer security / Security / Configuration management

Security Advisor Cybernet Security Advisor Compliance in minutes… Not days… Cybersecurity/Information Assurance compliance regulations are confusing and time consuming to apply. It can take days per system for an ave

Add to Reading List

Source URL: cybersecurity.cybernet.com

Language: English - Date: 2015-03-31 10:56:29
7Information Risk Management / Risk management / Department of Defense Information Technology Security Certification and Accreditation Process / Risk / Information assurance / Parameter / Rader / Vulnerability / Grace Communion International / Computer security / Management / Ethics

The Rader Network Joint Institute for Computational Sciences

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-04-22 09:55:12
8Data security / Department of Defense Information Assurance Certification and Accreditation Process / Geography of California / National security / Certification and Accreditation / Federal Information Security Management Act / Information security / Risk management framework / San Diego / Computer security / Security / Technology

Cyber Infrastructure Security Presentation Moderator: Col. Ron Torgerson, PE, PMP, CHS-V, F.SAME, USAF (Ret.), and Chair, Cyber Security Infrastructure Task Force (CSITF) Speakers:

Add to Reading List

Source URL: www.same.org

Language: English - Date: 2013-05-29 12:05:13
9Department of Defense Information Assurance Certification and Accreditation Process / National security / Security controls / Defense Technical Information Center / Defense Information Systems Agency / Information assurance / Certification and Accreditation / Risk management framework / Department of Defense Information Technology Security Certification and Accreditation Process / United States Department of Defense / Computer security / Security

DoD Instruction[removed], March 12, 2014

Add to Reading List

Source URL: dtic.mil

Language: English - Date: 2014-03-19 16:37:33
10Threat model / Two-factor authentication / Payment Card Industry Data Security Standard / Data center / Software development process / Security Technical Implementation Guide / Department of Defense Information Assurance Certification and Accreditation Process / Computer security / Computing / Information technology management

Security Technical Brief Ensure Security Without Compromise with Nutanix Defense in Depth Strategy Security Development Lifecycle The Nutanix Security Development Lifecycle (SecDL) incorporates security into every

Add to Reading List

Source URL: go.nutanix.com

Language: English - Date: 2014-12-13 18:32:35
UPDATE