enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Assured Compliance Assessment Solution - Wikipedia

    en.wikipedia.org/wiki/Assured_Compliance...

    Assured Compliance Assessment Solution (ACAS) is a software set of information security tools used for vulnerability scanning and risk assessment by agencies of the United States Department of Defense (DoD). [1] It performs automated vulnerability scanning and device configuration assessment.

  3. Defense Information Systems Agency - Wikipedia

    en.wikipedia.org/wiki/Defense_Information...

    DISA established the Center for Information Management to provide technical and program execution assistance to the assistant secretary of defense (C3I) and technical products and services to DoD and military components. DISA's role in DoD information management continued to expand with implementation of several Defense Management Report ...

  4. Host Based Security System - Wikipedia

    en.wikipedia.org/wiki/Host_Based_Security_System

    DISA has made HBSS software available for download on their PKI protected patch server. Users attempting to download the software are required to have a Common Access Card (CAC) and be on a .mil network. DISA provides software and updates free of charge to DOD entities.

  5. Information assurance vulnerability alert - Wikipedia

    en.wikipedia.org/wiki/Information_Assurance...

    Establish a date for the corrective action to be implemented, and enable DISA to confirm whether the correction has been implemented. The Deputy Secretary of Defense issued an Information Assurance Vulnerability Alert (IAVA) policy memorandum on December 30, 1999. Current events of the time demonstrated that widely known vulnerabilities exist ...

  6. Defense Technical Information Center - Wikipedia

    en.wikipedia.org/wiki/Defense_Technical...

    The Defense Technical Information Center (DTIC, / ˈ d iː t ɪ k / [2]) is the repository for research and engineering information for the United States Department of Defense (DoD). DTIC's services are available to DoD personnel, federal government personnel, federal contractors and selected academic institutions.

  7. eMASS - Wikipedia

    en.wikipedia.org/wiki/EMASS

    eMASS is a service-oriented computer application that supports Information Assurance (IA) program management and automates the Risk Management Framework (RMF). [1] The purpose of eMASS is to help the DoD to maintain IA situational awareness, manage risk, and comply with the Federal Information Security Management Act (FISMA 2002) and the Federal Information Security Modernization Act (FISMA ...

  8. Department of Defense Discovery Metadata Specification

    en.wikipedia.org/wiki/Department_of_Defense...

    The Department of Defense Discovery Metadata Specification (DoD Discovery Metadata Specification or DDMS) is a Net-Centric Enterprise Services (NCES) metadata initiative. DDMS is loosely based on the Dublin Core vocabulary. DDMS defines discovery metadata elements for resources posted to community and organizational shared spaces.

  9. TAFIM - Wikipedia

    en.wikipedia.org/wiki/TAFIM

    The Defense Information Systems Agency (DISA) is responsible for developing, obtaining from commercial sources, and maintaining the compilation of Defense Information Infrastructure technical standards, and it is responsible for maintaining a Defense data dictionary system as a repository of data requirements and for facilitating the cross ...