enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Trusted Computer System Evaluation Criteria - Wikipedia

    en.wikipedia.org/wiki/Trusted_Computer_System...

    The TCSEC, frequently referred to as the Orange Book, is the centerpiece of the DoD Rainbow Series publications. Initially issued in 1983 by the National Computer Security Center (NCSC), an arm of the National Security Agency , and then updated in 1985, TCSEC was eventually replaced by the Common Criteria international standard, originally ...

  3. Communications security - Wikipedia

    en.wikipedia.org/wiki/Communications_security

    "INFORMATION SECURITY GUIDELINES FOR THE DEPLOYMENT OF DEPLOYABLE SWITCHED SYSTEMS" (PDF). Joint Staff. February 1, 2001. Archived from the original (PDF) on September 16, 2012. "Communications Security (COMSEC) awareness training". U.S. ARMY SIGNAL CENTER AND FORT GORDON. April 17, 2000. Archived from the original on March 30, 2009.

  4. Assured Compliance Assessment Solution - Wikipedia

    en.wikipedia.org/wiki/Assured_Compliance...

    Assured Compliance Assessment Solution (ACAS) is a software set of information security tools used for vulnerability scanning and risk assessment by agencies of the United States Department of Defense (DoD). [1] It performs automated vulnerability scanning and device configuration assessment.

  5. Rainbow Series - Wikipedia

    en.wikipedia.org/wiki/Rainbow_Series

    The Rainbow Series (sometimes known as the Rainbow Books) is a series of computer security standards and guidelines published by the United States government in the 1980s and 1990s. They were originally published by the U.S. Department of Defense Computer Security Center, and then by the National Computer Security Center .

  6. Standard of Good Practice for Information Security - Wikipedia

    en.wikipedia.org/wiki/Standard_of_Good_Practice...

    The Standard of Good Practice for Information Security (SOGP), published by the Information Security Forum (ISF), is a business-focused, practical and comprehensive guide to identifying and managing information security risks in organizations and their supply chains. [1] The most recent edition is 2024, [2] an update of the 2022 edition. The ...

  7. United States Army Command, Control, Communication, Computers ...

    en.wikipedia.org/wiki/United_States_Army_Command...

    As one of the 10 organizations that make up the Combat Capabilities Development Command, a subordinate organization of the Army Futures Command, CCDC C5ISR Centers supplies Command, Control, Communications, Computers, Cyber, Intelligence, Surveillance and Reconnaissance capabilities, technologies and integrated solutions [buzzword] for the Soldier.

  8. Special access program - Wikipedia

    en.wikipedia.org/wiki/Special_access_program

    AR 380-5, Department of the Army Information Security Program, 29 September 2000; AR 380-67, Personnel Security Program, 9 September 1988; AR 380-381, Special Access Programs (SAPs) and Sensitive Activities, 21 April 2004; Authorized Classification and Control Markings Register Version 1.2, 12 May 2008

  9. Intelligence cycle security - Wikipedia

    en.wikipedia.org/wiki/Intelligence_cycle_security

    Information system security (INFOSEC) Security classification; Operations security (OPSEC) These disciplines, along with CI, form intelligence cycle security, which, in turn, is part of intelligence cycle management. Disciplines involved in "positive security", or measures by which one's own society collects information on its actual or ...