2.0
Level 2 Description: Cryptographic key management and establishment can be performed using manual procedures or mechanisms supported by manual procedures....
Wed, 26 Jul, 2023 at 8:56 AM
Level 2 Description: Cryptography can be employed to support many security solutions including the protection of controlled unclassified information, the ...
Wed, 26 Jul, 2023 at 9:06 AM
Level 2 Description: Collaborative computing devices include networked white boards, cameras, and microphones. Indication of use includes signals to user...
Wed, 26 Jul, 2023 at 9:17 AM
Level 2 Description: Mobile code technologies include Java, JavaScript, ActiveX, Postscript, PDF, Flash animations, and VBScript. Decisions regarding the ...
Wed, 26 Jul, 2023 at 9:25 AM
Level 2 Description: VoIP has different requirements, features, functionality, availability, and service limitations when compared with the Plain Old Tele...
Wed, 26 Jul, 2023 at 9:38 AM
Level 2 Description: Authenticity protection includes protecting against man-in-the-middle attacks, session hijacking, and the insertion of false informat...
Thu, 27 Jul, 2023 at 4:50 AM