Security assurance

Results: 2582



#Item
51Computer security / Federal Information Security Management Act / Food and Drug Administration / Configuration management / Oracle Database / Oracle Corporation / Information security / Information system / United States Department of Health and Human Services / Information assurance

Corporate Capabilities: ▪ ▪ ▪ ▪

Add to Reading List

Source URL: www.macf.com

Language: English - Date: 2015-07-20 12:42:18
52Standards organizations / Accreditation / Quality assurance / Professional certification / ISO/IEC JTC 1 / ISO 10303 / Information technology management / ISO/IEC 17025 / Cyber security standards

Extension of Scope Program Scope Extension CB Application for Accreditation FA 5031

Add to Reading List

Source URL: www.anab.org

Language: English - Date: 2016-07-15 09:15:56
53Security / Actuarial science / Project management / Risk management / Probability / Risk / Psychological resilience / Resilience / Resilience assurance

LEVERAGING RISK REGISTER INFORMATION FOR DEVELOPING RESILIENCE THROUGH RISK INTELLIGENCE 1 M.C. Leva and N. Balfe 1,2

Add to Reading List

Source URL: www.resilience-engineering-association.org

Language: English - Date: 2016-03-30 08:29:45
54Identity management / Computer access control / Federated identity / Digital technology / Digital identity / Authentication / Liberty Alliance / Security Assertion Markup Language / Identity theft / Identity / Identity assurance / Electronic authentication

Microsoft PowerPoint - greenwood-OECD-Norway-07-MAY-07.ppt

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2016-03-29 12:11:08
55Cryptography / Computer network security / Computer security / Cyberwarfare / National security / Secure communication / Application security / Communications security / Wireless security / Software-defined radio / Advanced Learning and Research Institute / Software security assurance

NRL BAA Announcement # HIGH ASSURANCE ENGINEERING AND COMPUTING The Center for High Assurance Computer Systems of the Naval Research Laboratory (NRL) is seeking white papers for innovative research, advanced sys

Add to Reading List

Source URL: heron.nrl.navy.mil

Language: English - Date: 2016-02-17 10:17:54
56Data security / System administration / Security / Splunk / Risk management framework / Cyberwarfare / NIST Special Publication 800-53 / Department of Defense Information Assurance Certification and Accreditation Process / Risk management / Computer security

TECH BRIEF SPLUNK FOR RISK MANAGEMENT FRAMEWORK Assessing and Monitoring NISTControls “...Through the process of risk management, leaders must consider risk to U.S. interests from

Add to Reading List

Source URL: www.splunk.com

Language: English - Date: 2016-08-16 18:10:53
57Cyberwarfare / Quality assurance / Software assurance / Software quality / National Security Agency / Computer security

Department of Defense (DoD) Joint Federated Assurance Center (JFAC) Overview

Add to Reading List

Source URL: www.acq.osd.mil

Language: English - Date: 2014-10-23 17:18:12
58Security Target / Networking hardware / Unidirectional network / Crime prevention / Cryptography / Information governance / National security / Evaluation Assurance Level / Common Criteria / Protection Profile / Toe / Nexor

FORT FOX HARDWARE DATA DIODE Security Target Common Criteria FFHDD – EAL4+ Classification INTERNAL

Add to Reading List

Source URL: www.commoncriteria-india.gov.in

Language: English - Date: 2013-01-03 08:44:04
59Standards organizations / ISO/IEC JTC 1 / International Organization for Standardization / Common Criteria / ISO/IEC 27000-series / ISO/IEC JTC 1/SC 36

Extension of Study Period on IT Security Testing, Evaluation and Assurance Standards and Techniques (N1317) - version 1.0 Motivation The inputs to the study period defined in N1258 "Study Period on IT Security Testing, E

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English
60Public-key cryptography / Cryptographic software / Cryptographic hash functions / Key management / Cryptography standards / Hardware security module / Microsoft CryptoAPI / RSA / PKCS / SHA-1 / Hash-based message authentication code / Digital signature

LYNKS Series II Authentication HSM TM High-Assurance Hardware Security Module Specifically Designed for Authentication Applications

Add to Reading List

Source URL: www.spyrus.com

Language: English - Date: 2015-08-05 12:42:41
UPDATE