800-171
Description: Authenticity protection includes protecting against man-in-the-middle attacks, session hijacking, and the insertion of false information into ...
Tue, 11 Jul, 2023 at 3:11 AM
Description: Cryptographic standards include FIPS-validated cryptography and NSA-approved cryptography. See [NIST CRYPTO]; [NIST CAVP]; [NIST CMVP]; Nation...
Tue, 11 Jul, 2023 at 1:27 AM
Description: VoIP has different requirements, features, functionality, availability, and service limitations when compared with the Plain Old Telephone Ser...
Tue, 11 Jul, 2023 at 3:33 AM
Description: Routing remote access through managed access control points enhances explicit, organizational control over such connections, reducing the sus...
Tue, 11 Jul, 2023 at 1:36 AM
Description: Mobile code technologies include Java, JavaScript, ActiveX, Postscript, PDF, Flash animations, and VBScript. Decisions regarding the use of mo...
Tue, 11 Jul, 2023 at 4:49 AM
Description: Collaborative computing devices include networked white boards, cameras, and microphones. Indication of use includes signals to users when col...
Tue, 11 Jul, 2023 at 5:01 AM
Description: A privileged command is a human-initiated (interactively or via a process operating on behalf of the human) command executed on a system invo...
Tue, 11 Jul, 2023 at 1:45 AM
Description: Establishing usage restrictions and configuration/connection requirements for wireless access to the system provides criteria for organizatio...
Tue, 11 Jul, 2023 at 1:54 AM
Description: Cryptography can be employed to support many security solutions including the protection of controlled unclassified information, the provision...
Tue, 11 Jul, 2023 at 5:07 AM
Description: Organizations authenticate individuals and devices to help protect wireless access to the system. Special attention is given to the wide vari...
Tue, 11 Jul, 2023 at 2:01 AM