Host Based Security System (HBSS) is the official name given to the United States Department of Defense (DOD) commercial off-the-shelf (COTS) suite of...
14 KB (1,702 words) - 00:01, 13 January 2024
A host-based intrusion detection system (HIDS) is an intrusion detection system that is capable of monitoring and analyzing the internals of a computing...
12 KB (1,500 words) - 18:31, 25 May 2025
intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS). A system that monitors important operating system files is an example...
46 KB (5,513 words) - 03:39, 6 June 2025
off-the-shelf Government off-the-shelf Non-developmental item Host Based Security System Independent software vendor Invented here Open Trusted Technology...
12 KB (1,375 words) - 00:02, 9 May 2025
credit/debit card transactions by checking card security codes or by performing host processing components of an EMV based transaction in conjunction with an ATM...
14 KB (1,557 words) - 08:50, 19 May 2025
Firewall (computing) (redirect from Host-based firewall)
firewall is a network security system that monitors and controls incoming and outgoing network traffic based on configurable security rules. A firewall typically...
29 KB (3,129 words) - 07:37, 14 June 2025
In computer security, a sandbox is a security mechanism for separating running programs, usually in an effort to mitigate system failures and/or software...
10 KB (999 words) - 16:44, 26 May 2025
Comparison of host-based intrusion detection system components and systems. As per the Unix philosophy a good HIDS is composed of multiple packages each...
9 KB (425 words) - 10:55, 19 May 2025
mix of name-based and IP-based on one server. In IP-based virtual hosting, also called dedicated IP hosting, each virtual host has a different IP address...
5 KB (679 words) - 13:11, 10 May 2025
services happen to be hosted. There are two main types of virtual hosting, name-based and IP-based. Name-based virtual hosting uses the host name presented by...
9 KB (1,277 words) - 17:41, 24 May 2025
saline solution used to keep the osmotic pressure and pH in cells Host Based Security System, software applications used within the United States Department...
374 bytes (80 words) - 18:06, 2 May 2021
Domain Name System. HIP separates the end-point identifier and locator roles of IP addresses. It introduces a Host Identity (HI) name space, based on a public...
6 KB (675 words) - 15:29, 3 November 2024
through a firewall or other security appliance on the border of a network. Host-based anomalous intrusion detection systems are one of the last layers...
5 KB (554 words) - 16:44, 4 May 2025
Access control (redirect from Access control system)
Rajesh Hardasbhai (17 March 2015), Identity and policy-based network security and management system and method, USPTO Patent Full-Text and Image Database...
51 KB (6,358 words) - 10:12, 29 June 2025
complexity of information systems and the societies they support. Security is particularly crucial for systems that govern large-scale systems with far-reaching...
220 KB (22,327 words) - 15:15, 27 June 2025
solely on host-based checks. Several regulations and standards reference NIST’s logging guidance, including the Federal Information Security Management...
28 KB (3,089 words) - 10:40, 3 June 2025
computer file hosts is an operating system file that maps hostnames to IP addresses. It is a plain text file. Originally a file named HOSTS.TXT was manually...
14 KB (1,300 words) - 13:40, 17 May 2025
"Domain Based Security", abbreviated to "DBSy", is a model-based approach to help analyze information security risks in a business context and provide...
10 KB (1,420 words) - 04:09, 21 January 2025
support for operating systems or applications. Using a dedicated hosting service offers the benefits of high performance, security, email stability, and...
15 KB (1,796 words) - 11:24, 13 May 2025
was developed to supplement CIS. Host-based intrusion prevention system: Comodo's host-based intrusion prevention system (HIPS), named Defense+, is designed...
16 KB (1,384 words) - 08:14, 15 June 2025
bastion host as "a system identified by the firewall administrator as a critical strong point in the network security. Generally, bastion hosts will have...
4 KB (511 words) - 11:59, 24 November 2024
The System Security Services Daemon (SSSD) is software originally developed for the Linux operating system (OS) that provides a set of daemons to manage...
2 KB (177 words) - 04:32, 25 September 2024
Jump server (redirect from Jump host)
A jump server, jump host or jump box is a system on a network used to access and manage devices in a separate security zone. A jump server is a hardened...
7 KB (744 words) - 21:41, 12 May 2025
The Space-Based Infrared System (SBIRS) is a United States Space Force system intended to meet the United States' Department of Defense infrared space...
18 KB (1,907 words) - 18:12, 16 May 2025
Port scanner (category Computer security software)
designed to probe a server or host for open ports. Such an application may be used by administrators to verify security policies of their networks and...
19 KB (2,535 words) - 23:05, 30 June 2025
validate the security in information systems and services. NIST hosts the following: FISMA implementation project Information Security Automation Program...
22 KB (2,196 words) - 08:20, 21 June 2025
computing base (TCB) of a computer system is the set of all hardware, firmware, and/or software components that are critical to its security, in the sense...
12 KB (1,629 words) - 23:23, 11 March 2025
works with Microsoft Windows Server and Unix-based hosts. The product began as a network management system called SeNTry ELM, which was developed by the...
21 KB (1,677 words) - 06:31, 7 March 2025
Advanced persistent threat (category Hacking (computer security))
21 January 2024. "China-Based Threat Actors" (PDF). U.S. Department of Health and Human Services Office of Information Security. 16 August 2023. Archived...
52 KB (4,098 words) - 21:33, 20 June 2025
These are network-based IDS tools that monitor network traffic for suspicious activities. OSSEC: A host-based IDS that monitors system logs and file integrity...
3 KB (217 words) - 21:44, 23 April 2025