Information Security Automation Program

Results: 36



#Item
1Computer security / Security Content Automation Protocol / Extensible Configuration Checklist Description Format / Federal Information Security Management Act / National Vulnerability Database / National Institute of Standards and Technology / Angela Orebaugh / Open Vulnerability and Assessment Language / Vulnerability / CVSS / Information Security Automation Program

NIST SPRevision 3, The Technical Specification for SCAP Version 1.3

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-18 13:14:41
2Hydrology / Flood control / Cartography / Federal Emergency Management Agency / National Flood Insurance Program / United States Department of Homeland Security / Floodplain / Flood insurance / Flood / United States Geological Survey / Geographic information system / Topographic map

AUTOMATION OF FLOOD HAZARD MAPPING BY THE FEDERAL EMERGENCY MANAGEMENT AGENCY Daniel M. Cotter Federal Emergency Management Agency Federal Insurance Administration

Add to Reading List

Source URL: mapcontext.com

Language: English - Date: 2008-08-30 00:24:50
3Computer security / Information Security Automation Program / National security / Security Content Automation Protocol

SCAP Conformance Testing Request for Information SCAP Conformance Testing Request for Information

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 07:11:13
4Computer security / Security Content Automation Protocol / Evaluation / Federal Desktop Core Configuration / Computing / Federal Information Security Management Act / Validation / National Voluntary Laboratory Accreditation Program

ITL Bulletin, Updates to the NIST SCAP Validation Program and Associated Test Requirements (March 2016)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-03-15 12:05:28
5Law / Public administration / Extensible Configuration Checklist Description Format / Computer security / Security Content Automation Protocol / Federal Information Security Management Act

Overview: National Checklist Program Chuck Wergin Booz Allen Hamilton National Institute of Standards and Technology (NIST)

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:53
6Security Content Automation Protocol / Information Security Automation Program / Computer security / Automation / Federal Desktop Core Configuration

NIST Security Automation Tim Grance – Program Manager September 28, 2010 Agenda

Add to Reading List

Source URL: scap.nist.gov

Language: English
7Reference / Cryptographic Module Validation Program / FIPS 140-2 / FIPS 140 / Cryptographic Module Testing Laboratory / FIPS 140-3 / National Voluntary Laboratory Accreditation Program / FIPS 201 / Federal Information Processing Standard / Cryptography standards / Evaluation / Computer security

Cryptographic Module Validation Program Where security starts …. 5th Annual NIST IT Security Automation Conference Randall J. Easter

Add to Reading List

Source URL: scap.nist.gov

Language: English
8Security Content Automation Protocol / Federal Information Security Management Act / National Institute of Standards and Technology / Information security / NIST Special Publication 800-53 / Security Technical Implementation Guide / Computer security / Security / Computing

National Checklist Program for IT Products

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-26 12:36:42
9Computing / Federal Desktop Core Configuration / Federal Information Security Management Act / Validation / Vulnerability / Computer security / Cyberwarfare / Security Content Automation Protocol

Security Content Automation Protocol (SCAP) Validation and the Federal Desktop Core Configuration (FDCC) Peter Mell, SCAP Validation Program Manager National Institute of Standards and Technology

Add to Reading List

Source URL: nvd.nist.gov

Language: English - Date: 2012-07-31 09:55:06
10Secrecy / National Industrial Security Program / Security clearance / Special access program / Classified information / Government procurement in the United States / Security Content Automation Protocol / Critical Nuclear Weapon Design Information / United States government secrecy / National security / Security

Questions for DSS (AIA/NDIA) October[removed]Does DSS have a time frame established for its shift to the Risk Management Framework (RMF)? Response: There is no definitive time frame for DSS to transition to the RMF. With

Add to Reading List

Source URL: www.dss.mil

Language: English - Date: 2014-12-03 10:30:42
UPDATE