によって José Arévalo 12か月前.
267
もっと見る
Software to convert plaintext to ciphertext through the use of a cryptographic algorithm.
Software to use and manage electronic signatures to support.
Software used to prevent, detect, and remove self-replicating programs that run and spread by modifying other programs or files.
Software that supports obtaining information about parties attempting to log on to a system or application for security purposes and the validation of those users.
Software, processes, and procedures to ensure compliance with applicable laws, rule or order issued by an executive authority, or regulatory agency of a government and having the force of law, as intended through the supervision and oversight of operations and programs, the protection of systems and resources, and the prevention of waste, fraud and abuse.
Software that supports the set of capabilities to provide active response and remediation to a security incident that has allowed unauthorized access to a government information system.
Defines the set of capabilities to support the management of permissions for logging onto a computer, application, service, or network; includes user management and role/privilege management. This includes Identification and Authentication for digital signatures.
Data Integrity and Privacy Management involves the coordination of data collection, storage, dissemination, and destruction as well as managing the policies, guidelines, and standards regarding data management, so that data quality is maintained and information is shared or available in accordance with the law and best practices
Continuous Monitoring includes all activities related to the real-time monitoring of security controls employed within or inherited by a system. (see Appendix G of NIST Special Publication 800-37)
Threat and Vulnerability Management involves all functions pertaining to the protection of federal information and information systems from unauthorized access, use, disclosure, disruptions, modification, or destruction, as well as the creation and implementation of security policies, procedures and controls. It includes all risk and controls tracking for IT systems.
Major category of information security services to protect networks, computers, programs and data from attack, damage or unauthorized access. Services may include: threat and vulnerability management, continuous monitoring, data integrity and privacy management, identification & authorization, cryptography, incident response, audit trail capture & analysis, and certification & accreditation.
Cloud IaaS providers host infrastructure components for users.
A cloud computing form that provides computing resources over the Internet.
A category of cloud computing services that provides a platform allowing customers to develop, run, and manage web applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app.
IT support & maintenance for general enduser technologies (hardware and/or Software).
In computing, virtualization is the creation of a virtual (rather than actual) version of something, such as a hardware platform, Operating System (OS), storage device, or network resources. This section of the IRM categorizes those mechanisms to create virtual platforms.
The purpose of an OS is to provide an environment in which a user can execute applications.
As with other operating systems, a mobile computing device Operating System (OS) is a computer program, implemented in either software or firmware, which acts as an intermediary between users of a computer and the computer hardware.
Communications Hardware refers broadly to hardware intended primarily to create a link to the network from the user or another computational device.
Distributed computing is a field of computer science that studies distributed systems. A distributed system is a software system in which components located on networked computers communicate and coordinate their actions by passing messages. The components interact with each other in order to achieve a common goal.
Formerly called "minicomputers”, which were hosts to dumb terminals connected over dedicated cables, most midrange computers today function as servers in a network.
Midrange computers encompass a very broad range and reside in capacity between high-end PCs and mainframes.
A Mainframe is a high-performance computer used for large-scale computing purposes that require greater availability and security. It often serves many connected terminals and is usually used by large complex organizations.
Operating systems that support the distributed server environment.
A midrange computer operating system is, in simplest terms, a collection of programs that manage a computer system's internal workings - its memory, processors, devices, and file system. Midrange computers are almost universally known as servers to recognize that they often "serve" applications to end users at "client" computers, that they use a client/server computing model.
Mainframe operating systems are tailored to meet the substantially different architectures and purposes of mainframes as high-volume transaction processing devices, or the purposes of supercomputers as high-volume algorithmic processors.
A mainframe or supercomputer operating system is, in simplest terms, a collection of programs that manage a computer system's internal workings - its memory, processors, devices, and file system.
Deduplication is not a capability of this service. No security scanning is offered, resulting in additional customer requirements to use this as a storage solution. The NAS Services are used to support ETS backup services only.
The device is connected to the network, access to the device is controlled by network and firewall configurations.
Use of network attached storage (NAS) to store data, which is infrequently accessed or changed, to provide a lower cost storage solution. NAS Services offer centralized storage of data that provides faster deployment, easier maintenance, and fewer staff requirements for support.
Mainframe storage is available through:
2. Tape – fully redundant, Virtual Tape Storage (VTS).
1. Disk – fully redundant, fastest recovery.
Local Storage is considered dedicated storage: Storage on individual equipment (e.g. solid state drive, external storage array) or on a disk accessible by a single host. Local attached (non SAN) storage is exclusively for the Windows and Linux server environments. This service is mostly consumed in field / remote offices.
Enterprise data storage services provide highly-available, secure, and reliable disk storage for use by system operating systems, applications, application data, and for user files. This service is available to physical and virtual systems.
Software that supports the capture, storage, and manipulation of photographic images.
Software to manage, develop and manipulate content from a combination of different content forms such as text, audio, still images, animation, video, or interactivity.
Software that is used to create diagrams of relationships between concepts, ideas or other pieces of information.
Software that enables a person to manipulate static, animated or video visual images on a computer.
Software that supports the process of creating data element mappings between two distinct data models. Data mapping is used as a first step for a wide variety of data integration tasks.
Software that supports the use of computer technology for the process of design and design-documentation and includes software or environments which provide the user with input-tools for the purpose of streamlining design processes; drafting, documentation, and manufacturing processes.
A family of web feed formats used to publish frequently updated works, such as blog entries, news headlines, audio, and video, in a standardized format.
Software that provides users with frequently updated content to which they subscribe.
Interactive tools handle mediated interactions between a pair or group of users. They focus on establishing and maintaining a connection among users, facilitating the mechanics of conversation and talk.
Software that supports the capturing, storing and presentation of communication, usually written but may include audio and video as well.
Software that supports text, voice and/or video communications between two or more users.
Software that provides users with an electronic version of a calendar, an appointment book, address book, and/or contact list.
Software that supports the transmission of memos and messages over a network.
Licensing and Permitting involves activities associated with granting, revoking, and the overall management of the documented authority necessary to perform a regulated task or function.
Solution for those who want to host a website that advertises products or services and for which consumer transactions are generated online.
Includes disbursements of funds, via a variety of mechanisms, to government and private individuals, federal agencies, state, local and international governments, and the private sector, to effect payment for goods and services, or distribute entitlements, benefits, grants, subsidies, loans, or claims.
Software that controls the hardware and software environments, as well as documents of an organization.
Software that ensures an organization or product is consistent based on quality planning, quality control, quality assurance and quality improvement.
Software that allows planners to explicitly address uncertainty by identifying and generating metrics, setting parameters, prioritizing, and developing mitigations, and tracking risk.
Software that provides capabilities for cost estimation and planning, scheduling, cost control and budget management, resource allocation, collaboration, communication, quality management and documentation or administration systems, which are used to deal with the complexity of large projects.
Software or business processes of an organization.
Software that controls the process for updates or modifications to the existing documents,
Software that monitors the activities within the business cycle Change Management
Software the supports decisions, actions, business rules and other matters that govern an organization Process Tracking
Software that manages the life cycle of a particular claim or investigation within an organization to include creating, routing, tracing, assignment and closing of a case as well as collaboration among case handlers Governance & Policy Management
Software used to define, deploy, execute, monitor and maintain the variety and complexity of decision logic that is used by operational systems within an organization or enterprise. This logic, also referred to as business rules, includes policies, requirements, and conditional statements that are used to determine the tactical actions that take place in applications and systems.
Software include items such as: Process Engine, Business Analytics, Content Management, and Collaboration Tools.
Software that allows organizations to abstract business process from technology infrastructure and support the managerial approach through enabling technology, bridging organizational and technology silos. Business Process Management applications and
Software that supports the transfer of knowledge to the end customer.
Software that facilitates collection of data and information.
Software to develop descriptions that adequately explain relevant data for the purpose of prediction, pattern detection, exploration or general organization of data.
Software that provides access to data and information for use by an organization and its stakeholders.
Software that provides for the efficient discovery of non-obvious, valuable patterns and relationships within a large collection of data.
Software used for the composition, editing, formatting and/or possibly printing of print material.
Software used to create, update and/or read a two-dimensional matrix of rows and columns.
Software used to display information, normally in the form of a slide show.
Software used to create or edit a graphical object.
Software that supports the collection of information via satellite and aerial photography.
Software that supports the creation of maps.
Supports the application of statistical analysis and other informational techniques to geographically based data.
Software that supports the collection or management of geospatial information.
Software used to track, store and retrieve electronic documents and/or images of paper documents. It is usually capable of keeping track of the different versions created by different users (history tracking).
Software that provides content authoring, content review and approval, tagging and aggregation, content publishing and delivery, and syndication management.
Software that supports the management and stewardship of a type of information by the federal government in order to facilitate communication and information archival.
Software that supports the creation, modification, and usage of physical or electronic documents used to capture information within the business cycle.
On line repository of documents, letters, speeches, web sites, books, or articles to be shared.
Software that supports the document scanning and the interpretation of images into text.
Software that supports a process to swiftly answer multi-dimensional analytical (MDA) queries and enable users to interactively analyze multidimensional data from multiple perspectives. An OLAP consists of three basic analytical operations: consolidation, drill-down, and slicing and dicing.
Software that supports methods to collect information from a sample of individuals in a systematic way for empirical research in social sciences, marketing and official statistics.
Software that provides the set of capabilities to support the administration of a group of investments held by an organization.
Software tools that support the creation and display of individually designed and structured reports with self-service access to meaningful data.
Software to support identifying, extracting, and analyzing business data, such as performance and cost metrics to support better business decision-making.
Software that supports the analysis of electronically stored information and its exchange, including digital forensics analysis.