enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. CENTRIXS - Wikipedia

    en.wikipedia.org/wiki/CENTRIXS

    The Combined Enterprise Regional Information Exchange System (CENTRIXS) is a collection of classified coalition networks, called enclaves, that enable information sharing through the use of email and Web services, instant messaging or chat, the Common Operational Picture service, and Voice over IP.

  3. Use of Free and Open-Source Software (FOSS) in the U.S ...

    en.wikipedia.org/wiki/Use_of_Free_and_Open...

    The FOSS report began in early 2002 as a request relayed to Terry Bollinger of The MITRE Corporation to collect data on how FOSS was being used in U.S. DoD systems. The driver for the request was an ongoing debate within the U.S. DoD about whether to ban the use of FOSS in its systems, and in particular whether to ban GNU General Public License (GPL) software.

  4. Lightweight Portable Security - Wikipedia

    en.wikipedia.org/wiki/Lightweight_Portable_Security

    It supports DoD-approved Common Access Card (CAC) readers, as required for authenticating users into PKI-authenticated gateways to access internal DoD networks. [ 6 ] [ 7 ] [ 8 ] LPS turns an untrusted system (such as a home computer) into a trusted network client.

  5. Army Knowledge Online - Wikipedia

    en.wikipedia.org/wiki/Army_Knowledge_Online

    AKO was established in the late 1990s as an experimental outgrowth of a project of the General Office Management Office.This early project led to A2OL (America's Army Online), but legal concerns over this name and the parallelism to other commercial vendors caused the Army Project team to seek a new name.

  6. Automated Message Handling System - Wikipedia

    en.wikipedia.org/wiki/Automated_Message_Handling...

    The Army has transitioned most of the CONUS organizations, the Coast Guard has completed the transition in 2008, the Navy has begun transitioning in May 2007, and the USMC selected the AMHS and began transitioning in November 2007. In addition to the DoD organizations, other federal agencies (including the DEA and FAA) also use the AMHS.

  7. Assured Compliance Assessment Solution - Wikipedia

    en.wikipedia.org/wiki/Assured_Compliance...

    Assured Compliance Assessment Solution (ACAS) is a software set of information security tools used for vulnerability scanning and risk assessment by agencies of the United States Department of Defense (DoD). [1] It performs automated vulnerability scanning and device configuration assessment.

  8. eMASS - Wikipedia

    en.wikipedia.org/wiki/EMASS

    eMASS is a service-oriented computer application that supports Information Assurance (IA) program management and automates the Risk Management Framework (RMF). [1] The purpose of eMASS is to help the DoD to maintain IA situational awareness, manage risk, and comply with the Federal Information Security Management Act (FISMA 2002) and the Federal Information Security Modernization Act (FISMA ...

  9. Host Based Security System - Wikipedia

    en.wikipedia.org/wiki/Host_Based_Security_System

    Host Based Security System (HBSS) is the official name given to the United States Department of Defense (DOD) commercial off-the-shelf (COTS) suite of software applications used within the DOD to monitor, detect, and defend the DOD computer networks and systems.