Back to Results
First PageMeta Content
Data security / United States government secrecy / Military communications / Committee on National Security Systems / Critical infrastructure protection / Department of Defense Architecture Framework / National Information Assurance Glossary / Communications security / Global Information Grid / Security / National security / Computer security


Build and Operate a Trusted GIG
Add to Reading List

Document Date: 2015-04-27 13:16:03


Open Document

File Size: 334,40 KB

Share Result on Facebook

Company

National Security Systems / IA-Enable IT DFARS Subpart 208 / Senior Systems / Resilience DoDD / Adobe / Cybersecurity CNSSP / Security Telecom / Report DoD Defending Networks / Protective Distribution Systems / /

Country

United States / /

Currency

USD / /

/

Event

FDA Phase / /

Facility

Pub Standards / /

IndustryTerm

Internet Services / Wireless Local Area Networks / Wireless Communications / Voice Over Internet Protocol / Wireless Devices / /

Organization

office of Primary Responsibility / National Guard / US Federal Reserve / Committee on National Security Systems DoDD / Information Assurance NSA IA Directorate / Department of Defense Biometrics DoDI / Department of Defense / DoD Command / /

Person

Nat / Min Stds / /

/

Position

CTO / Contractor / Executive / CIO / CIO G&PM / Chief Information Officer / CIO and ODNI CIO / Private Sector / Deputy CIO / /

Product

Apple iPod Touch Portable Audio Device / iPhone / iPad / Public Release / CNSSI-5000 / /

ProvinceOrState

Iowa / /

Technology

IPv6 / Public Key Infrastructure / Public Key / Computer Telephony / Wireless Devices / Peer-to-Peer / Wireless Communications / PKI / File Sharing / Mobile Device / html / Local Area Networks / VOIP / Mobile Devices / /

URL

http /

SocialTag