Back to Results
First PageMeta Content
Security / Cyberwarfare / FIPS 140 / Trusted Computing Group / Critical Security Parameter / Trusted Computing / Authentication / Zeroisation / Key management / Computer security / Cryptography standards / Cryptography


Microsoft Word - 22e - Security Policy APK-0.6.docx
Add to Reading List

Document Date: 2015-05-21 15:49:37


Open Document

File Size: 384,77 KB

Share Result on Facebook

City

Secure / /

Company

Download Control Firmware Download CO / AES / HGST Inc. / Required Identification / EMC / Authentication Data CO / Trusted Computing Group / /

Event

FDA Phase / /

IndustryTerm

unauthenticated services / scope services / standardized storage device / /

MusicGroup

Set / Users / /

OperatingSystem

XTS / /

Organization

TCG BandMaster Authority / SID Authority / TCG EraseMaster Authority / EraseMaster Authority / TCG Authority / TCG Maker Authority / International Committee / /

Position

Cryptographic Officer / Initialize Cryptographic Module Cryptographic Officer / /

Product

HDDs 1.2 Security Level The Cryptographic Module / T10 / HDDs 2.2 Approved Algorithms The Cryptographic Module / SP800 / 7K6000 / /

ProvinceOrState

Colorado / /

Technology

Encryption / ECB‐256 Encryption / Allowed algorithm / 5 2.2 Approved Algorithms / Information Technology / 256 Encryption / following FIPS Approved algorithms / 2.2 Approved Algorithms / SCSI / /

SocialTag