SEARCH RESULTS


Department of Homeland Security – Voice Over IP     3.13 3.13.14 System and Communications Protection

https://www.dhs.gov/sites/default/files/publications/4300A%20Handbook%20Attachment%20Q5%20-%20Voice%20over%20IP.pdf

This document provides techniques and procedures for the secure use of Voice over Internet Protocol (VoIP) within the Department of Homeland Security (DHS) Information Technology (IT) Program. It is published as an Attachment to the DHS 4300A Sensitive Systems Handbook, which is based on DHS Sensitive Systems Policy Directive 4300A.

Department of Homeland Security – Web Content Filtering and Protections     3.13 3.13.1 csc7.4 csc7.5 csc7.6 csc7.7 System and Communications Protection

https://www.dhs.gov/sites/default/files/publications/privacy-pia-nppd-einstein3a-may2016.pdf

Web Content Filtering (WCF) provides protection at the application layer for web traffic by blocking access to suspicious websites, preventing malware from running on systems and networks, and detecting and blocking phishing attempts as well as malicious web content.

Encryption     3.13

Data encryption is the process of translating data into a code (ciphertext) so that only people with access to a secret key can read it. Encrypting data is one of the most popular and effective security methods used by an organization. Implementation Assessment Boston...

Data encryption is the process of translating data into a code (ciphertext) so that only people with access to a secret key can read it. Encrypting data is one of the most popular and effective security methods used by an organization.