Back to Results
First PageMeta Content
Security / FIPS 140 / Trusted Computing Group / Trusted Computing / Critical Security Parameter / Authentication / Zeroisation / Key management / Cryptography / Computer security / Cryptography standards


Microsoft Word - 2o - Security Policy KCF-1.2 .doc
Add to Reading List

Document Date: 2014-10-09 11:11:13


Open Document

File Size: 378,03 KB

Share Result on Facebook

City

Secure / /

Company

Required Identification / Download Control Firmware Download CO / Authentication Type Authentication Data Well Known CO / AES / EMC / HGST Inc. / Trusted Computing Group / Well Known CO / /

Event

FDA Phase / /

IndustryTerm

unauthenticated services / scope services / standardized storage device / /

MusicGroup

Set / Users / /

OperatingSystem

XTS / /

Organization

TCG Authority / TCG BandMaster Authority / TCG EraseMaster Identity‐based Authority / SID Authority / TCG Maker Authority / International Committee / /

Position

Cryptographic Officer / Initialize Cryptographic Module Cryptographic Officer / /

Product

HDDs 1.2 Security Level The Cryptographic Module / T10 / HDDs 2.2 Approved Algorithms The Cryptographic Module / C15K600 / SP800 / /

ProvinceOrState

Colorado / /

Technology

encryption / following FIPS Approved algorithms / 2.2 Approved Algorithms / Allowed algorithm / 5 2.2 Approved Algorithms / Information Technology / SCSI / /

SocialTag