About 25 results
Open links in new tab
  1. 1. The 555 SWES has been tasked to re-host the legacy Launch Transition to Cruise Test System (LTC TS), which is used to evaluate the performance of an Air Launched Cruise Missile …

  2. erate with solutions which intercept and decrypt Secure Socket Layer/Transport Layer Security (SSL/TLS) packets. The Contractor’s solution shall demonstrate how increasing use of SSL in …

  3. This Photo by Unknown Author is licensed under CC BY-NC 1

  4. A strong complex password is required to decrypt after any power cycling or restart. For additional require-ment details see NIST SP 800-124, “Guidelines for Managing the Security of Mobile …

  5. Use the Key Management system on the HHS personal identification verification (PIV) card or establish and use a key recovery mechanism to ensure the ability for authorized personnel to …

  6. Use the Risk Key Management system on the HHS personal identification verification (PIV) card or establish and use a key recovery mechanism to ensure the ability for authorized personnel …

  7. Store my passwords or verify codes in any file on any IT system, unless that file has been encrypted using FIPS 140-3 (or its successor) validated encryption, and I am the only person …

  8. the key required to decrypt the data. Good faith acquisition of personal information by an employee or agent of Contractor for the purposes of performing under the Contract is not a …

  9. The data in these columns are obfuscated and require the use of a function to decrypt the data. Property files that contain sensitive information are also encrypted using the …

  10. Use the Key Management system on the HHS Personal Identification Verification (PIV) card or establish and use a key recovery mechanism to ensure the ability for authorized personnel to …