Showing 4 ideas for tag "information security"

National Aeronautics and Space Administration

FDCC/USGCB/CIS-configured operating systems from factory

Per the Federal Information Security Management Act (FISMA), federal information systems must be hardened according to security configuration standards such as the Federal Desktop Core Configuration (FDCC), the U.S. Government Configuration Baseline (USGCB), and the Center for Internet Security (CIS) benchmarks.

Government (and contractor) IT shops spend countless hours configuring new and existing systems to ensure... more »



Department of Homeland Security

Give FEMA Employees More Info

Working at FEMA, we process disaster applicant information. Many times this assistance is delayed because we are waiting to verify information. One piece of information that affects a large number of applicants is their insurance information. Can we have a way that their insurance settlement information populate our computer system with this information? Can we have IRS populate their income, have their employer information... more »



Department of Health and Human Services

Cloud Computing, Dumb Terminals, InfoSec, and Data Archives

Developments by companies utilizing cloud based computing (particularly Google) are resulting in an increasingly robust solution including enterprise class sercurity and online data storage. Firewall, IDS/IPS, Data Leakage Prevention, system wide applications, etc., can all be controlled "in the cloud" by connecting all remote users through dumb terminals. Dumb terminals allow users to connect to a central network without... more »



Legislative Branch

Virtualized Infrastructure for Software Development

Implement virtual software development environments for agency employees and contractors. Proven technology is available for this solution, and it saves money, encourages telework, increases security of the organization network, and decreases the loss of software work product.

1. Saves money: Virtual environments allow thrifty use of computer hardware. The virtualization software allocates centralized resources as necessary,... more »


1 like