Suchergebnisse
Erscheinungsbild
Der Artikel „Labeled Security Protection Profile“ existiert in der deutschsprachigen Wikipedia nicht. Du kannst den Artikel erstellen (Quelltext-Editor, Anleitung).
Wenn dir die folgenden Suchergebnisse nicht weiterhelfen, wende dich bitte an die Auskunft oder suche nach „Labeled Security Protection Profile“ in anderssprachigen Wikipedias.
- dass insbesondere RHEL 5 den Zertifizierungen EAL4+ und Labeled Security Protection Profile nach dem Common Criteria Standard genügen soll. Red Hat bietet…30 KB (2.340 Wörter) - 14:47, 31. Dez. 2024
Suchergebnisse von der englischsprachigen Wikipedia.
- control protection profile (RBACPP) and labeled security protection profile (LSPP)) to a kernel that is not evaluated to an MLS-capable protection profile. Those…31 KB (4.178 Wörter) - 06:23, 8. Mär. 2025
- Trusted operating system (Kategorie Operating system security)Common Criteria combined with the Security Functional Requirements (SFRs) for Labeled Security Protection Profile (LSPP) and mandatory access control…4 KB (395 Wörter) - 08:48, 14. Feb. 2025
- XTS-400 (Kategorie Operating system security)the protection profiles entitled Labeled Security Protection Profile (LSPP) and Controlled Access Protection Profile (CAPP), though both profiles are…17 KB (2.239 Wörter) - 17:01, 19. Dez. 2024
- paperwork), or intangible (e.g., knowledge). Information security's primary focus is the balanced protection of data confidentiality, integrity, and availability…159 KB (18.159 Wörter) - 20:51, 21. Mär. 2025
- appropriate label to be affixed, labels the packet accordingly, and then forwards the labeled packet into the MPLS domain. Likewise, upon receiving a labeled packet…32 KB (4.650 Wörter) - 03:16, 20. Mär. 2025
- Trusted Solaris (Kategorie Operating system security)Extensions also implements labeled device access and labeled network communication, through the Commercial Internet Protocol Security Option (CIPSO) standard…4 KB (342 Wörter) - 16:28, 2. Apr. 2025
- Mandatory access control (Kategorie Computer security models)Protection Profile, Version 1.d". National Security Agency. 1999-10-08. Archived from the original on 2012-02-07. Retrieved 2008-03-15. "Protection Profile…21 KB (2.427 Wörter) - 16:09, 22. Nov. 2024
- for IP datagrams and provides protection against IP header modification attacks and replay attacks. Encapsulating Security Payload (ESP) provides confidentiality…45 KB (5.318 Wörter) - 06:04, 28. Mär. 2025
- Whistleblowing (Weiterleitung von „Whistleblower protection“)and Consumer Protection Act (Dodd-Frank) in the United States incentivizes and protects whistleblowers. By Dodd-Frank, the U.S. Securities and Exchange…120 KB (13.260 Wörter) - 03:47, 14. Mär. 2025
- United States government group chat leak (Kategorie Security breaches)directors of two Intelligence Community agencies. A high-profile leak occurred when National Security Advisor Mike Waltz erroneously added Jeffrey Goldberg…83 KB (8.170 Wörter) - 08:59, 9. Apr. 2025
- tend to take pride in the title "Security Officer" or "Protection Officer" and disdain the label of "guard". Security jobs vary in pay and duties. There…96 KB (12.236 Wörter) - 14:19, 6. Apr. 2025
- Google Account (Weiterleitung von „Google profile“)the user's normal password. Users who seek an even higher level of security protection, including users whose accounts could be attractive targets for hackers…13 KB (1.275 Wörter) - 05:03, 25. Mär. 2025
- system includes an implementation of the DoD Orange Book B1, Labeled security protection level specification. OS 2200 first obtained a successful B1 evaluation…12 KB (1.096 Wörter) - 21:03, 9. Okt. 2024
- A mortgage-backed security (MBS) is a type of asset-backed security (an "instrument") which is secured by a mortgage or collection of mortgages. The mortgages…40 KB (5.289 Wörter) - 10:26, 3. Mär. 2025
- price discrimination, or identification of security risks (Hildebrandt & Gutwirth 2008) (Elmer 2004). Profiling is being used in fraud prevention, ambient…24 KB (3.111 Wörter) - 17:35, 21. Nov. 2024
- Bernie Madoff (Weiterleitung von „Madoff Investment Securities“)accounts was almost $65 billion, including fabricated gains. The Securities Investor Protection Corporation (SIPC) trustee estimated actual direct losses to…135 KB (12.204 Wörter) - 21:58, 4. Apr. 2025
- Microsoft Windows (Weiterleitung von „Security vulnerabilities in Microsoft Windows“)implementing access privileges and full memory protection, and, while 32-bit programs meeting the DoD's C2 security rating, yet these advantages were nullified[improper…104 KB (9.176 Wörter) - 00:28, 4. Apr. 2025
- "attempted to evade a control point by ramming into military personnel" and labeled them as "terrorists." However, interviews conducted by Human Rights Watch…18 KB (2.129 Wörter) - 20:11, 2. Apr. 2025
- FIPS 140-2 (Kategorie Computer security standards)include both hardware and software components. Protection of a cryptographic module within a security system is necessary to maintain the confidentiality…16 KB (1.902 Wörter) - 12:27, 1. Dez. 2024
- Environmental protection, or environment protection, refers to the taking of measures to protecting the natural environment, prevent pollution and maintain…54 KB (5.959 Wörter) - 09:51, 24. Mär. 2025
- HTTPS (Kategorie Transport Layer Security)as packet sizes. The researchers found that, despite HTTPS protection in several high-profile, top-of-the-line web applications in healthcare, taxation…42 KB (4.286 Wörter) - 03:46, 2. Apr. 2025