Guard (information Security)
   HOME
*





Guard (information Security)
In information security, a guard is a device or system for allowing computers on otherwise separate networks to communicate, subject to configured constraints. In many respects a guard is like a firewall and guards may have similar functionality to a gateway. Whereas a firewall is designed to limit traffic to certain services, a guard aims to control the information exchange that the network communication is supporting at the business level. Further, unlike a firewall a guard provides assurance that it is effective in providing this control even under attack and failure conditions. A guard will typically sit between a protected network and an external network, and ensure the protected network is safe from threats posed by the external network and from leaks of sensitive information to the external network. A guard is usually dual-homed, though guards can connect more than two networks, and acts as a full application layer proxy, engaging in separate communications on each interf ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Information Security
Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized/inappropriate access to data, or the unlawful use, disclosure, disruption, deletion, corruption, modification, inspection, recording, or devaluation of information. It also involves actions intended to reduce the adverse impacts of such incidents. Protected information may take any form, e.g. electronic or physical, tangible (e.g. paperwork) or intangible (e.g. knowledge). Information security's primary focus is the balanced protection of the confidentiality, integrity, and availability of data (also known as the CIA triad) while maintaining a focus on efficient policy implementation, all without hampering organization productivity. This is largely achieved through a structured risk management process that involves: * identifying inform ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Security-Enhanced Linux
Security-Enhanced Linux (SELinux) is a Linux kernel security module that provides a mechanism for supporting access control security policies, including mandatory access controls (MAC). SELinux is a set of kernel modifications and user-space tools that have been added to various Linux distributions. Its architecture strives to separate enforcement of security decisions from the security policy, and streamlines the amount of software involved with security policy enforcement. The key concepts underlying SELinux can be traced to several earlier projects by the United States National Security Agency (NSA). Overview The NSA Security-enhanced Linux Team describes NSA SELinux as a set of patches to the Linux kernel and utilities to provide a strong, flexible, mandatory access control (MAC) architecture into the major subsystems of the kernel. It provides an enhanced mechanism to enforce the separation of information based on confidentiality and integrity requirements, which allows ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Unidirectional Network
A unidirectional network (also referred to as a unidirectional gateway or data diode) is a network appliance or device that allows data to travel in only one direction. Data diodes can be found most commonly in high security environments, such as defense, where they serve as connections between two or more networks of differing security classifications. Given the rise of industrial IoT and digitization, this technology can now be found at the industrial control level for such facilities as nuclear power plants, power generation and safety critical systems like railway networks. After years of development, data diodes have evolved from being only a network appliance or device allowing raw data to travel only in one direction, used in guaranteeing information security or protection of critical digital systems, such as industrial control systems, from inbound cyber attacks, to combinations of hardware and software running in proxy computers in the source and destination networks. The ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

BAE Systems
BAE Systems plc (BAE) is a British multinational arms, security, and aerospace company based in London, England. It is the largest defence contractor in Europe, and ranked the seventh-largest in the world based on applicable 2021 revenues. As of 2017, it is the biggest manufacturer in Britain. Its largest operations are in the United Kingdom and United States, where its BAE Systems Inc. subsidiary is one of the six largest suppliers to the US Department of Defense. Other major markets include Australia, Canada, Japan, India, Saudi Arabia, Turkey, Qatar, Oman and Sweden, where Saudi Arabia is regularly among its top three sources of revenue. The company was formed on 30 November 1999 by the £7.7 billion purchase of and merger with Marconi Electronic Systems (MES), the defence electronics and naval shipbuilding subsidiary of the General Electric Company plc (GEC), by British Aerospace, an aircraft, munitions and naval systems manufacturer. BAE is the successor to vari ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Raytheon
Raytheon Technologies Corporation is an American multinational aerospace and defense conglomerate headquartered in Arlington, Virginia. It is one of the largest aerospace and defense manufacturers in the world by revenue and market capitalization. In addition, it is one of the largest providers of intelligence services. Raytheon Technologies manufactures aircraft engines, avionics, aerostructures, cybersecurity, guided missiles, air defense systems, satellites, and drones. The company is also a large military contractor, getting a significant portion of its revenue from the U.S. government. The company is the result of the merger of equals between the aerospace subsidiaries of United Technologies Corporation (UTC) and the Raytheon Company, which was completed on April 3, 2020. Before the merger, UTC spun off its non-aerospace subsidiaries Otis Elevator Company and Carrier Corporation. UTC is the nominal survivor of the merger but it changed its name to Raytheon Technologies ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Rockwell Collins
Rockwell Collins was a multinational corporation headquartered in Cedar Rapids, Iowa, providing avionics and information technology systems and services to government agencies and aircraft manufacturers. It was formed when the Collins Radio Company, facing financial difficulties, was purchased by Rockwell International in 1973. In 2001, the avionics division of Rockwell International was spun off to form the current Rockwell Collins, Inc, retaining its name. The company was acquired by United Technologies Corporation on November 27, 2018, and now operates as part of Collins Aerospace, a subsidiary of Raytheon Technologies. History Arthur A. Collins founded Collins Radio Company in 1933 in Cedar Rapids, Iowa. It designed and produced both shortwave radio equipment and equipment for the burgeoning AM radio broadcast industry. Collins was solicited by the military, the scientific community, and the larger AM radio stations for special equipment. Collins supplied the equipment t ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Radiant Mercury
Radiant Mercury is a cross-domain solution (CDS) software application developed by Lockheed Martin primarily in use by the US Navy. As a CDS, it is designed to allow communications between higher-level classified networks and lower-level, unclassified networks. See also *Guard (information security) In information security, a guard is a device or system for allowing computers on otherwise separate networks to communicate, subject to configured constraints. In many respects a guard is like a firewall and guards may have similar functionality to ... References Computer security software Lockheed Martin {{Security-software-stub ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Solaris 10
Solaris is a proprietary software, proprietary Unix operating system originally developed by Sun Microsystems. After the Acquisition of Sun Microsystems by Oracle Corporation, Sun acquisition by Oracle in 2010, it was renamed Oracle Solaris. Solaris superseded the company's earlier SunOS in 1993, and became known for its scalability, especially on SPARC systems, and for originating many innovative features such as DTrace, ZFS and Time Slider. Solaris supports SPARC and x86-64 workstations and computer server, servers from Oracle and other vendors. Solaris was registered as compliant with the Single UNIX Specification until 29 April 2019. Historically, Solaris was developed as proprietary software. In June 2005, Sun Microsystems released most of the codebase under the CDDL license, and founded the OpenSolaris Open-source software, open-source project. With OpenSolaris, Sun wanted to build a developer and user community around the software. After the acquisition of Sun Microsyste ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Nexor
Nexor Limited is a privately held company based in Nottingham, providing product and services to safeguard government, defence and critical national infrastructure computer systems. It was originally known as X-Tel Services Limited. History Nexor Limited was founded in 1989 as X-Tel Services Limited out of the University of Nottingham and UCL, following research into X.400 and X.500 systems for the ISODE project. In 1992 Stephen Kingan joined the business as CEO. In 1993 X-Tel Services Limited was renamed Nexor Limited. In 1996 3i invested in the business to launch Nexor Inc. In 2004 Kingan and Nigel Fasey acquired the business. In 2008 Colin Robbins was appointed to the board as CTO. In 2012 Kingan acquired 100% ownership of Nexor. October 2013, the company moved headquarters from Nottingham Science Park to the NG2 Business Park. Nexor customers include NATO, European Defence Agency, UK MoD, US DOD, Canadian DND, Foreign and Commonwealth Office and Met Office. Nexor d ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

DMZ (computing)
In computer security, a DMZ or demilitarized zone (sometimes referred to as a perimeter network or screened subnet) is a physical or logical subnetwork that contains and exposes an organization's external-facing services to an untrusted, usually larger, network such as the Internet. The purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN): an external network node can access only what is exposed in the DMZ, while the rest of the organization's network is protected behind a firewall. The DMZ functions as a small, isolated network positioned between the Internet and the private network. This is not to be confused with a DMZ host, a feature present in some home routers which frequently differs greatly from an ordinary DMZ. The name is from the term ''demilitarized zone'', an area between states in which military operations are not permitted. Rationale The DMZ is seen as not belonging to either network bordering it. This metaphor a ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]