Security Protection
CHAPTER 6
GENERAL INFORMATION
1 PURPOSE
This Departmental Manual chapter establishes the policy and procedures for the use of Security Protection for Information Technology (IT) assets within USDA. Security Protection includes the use of Gateways, Firewalls, Intrusion Detection Systems, Public Key Infrastructure (PKI) Technology, IBM/IBM Compatibles Mainframe Security Standards, Identification and Authentication, Vulnerability Scans, and User Logon Identification. Each of these areas will be covered in separate parts of this chapter.
Downloads:
Attachment | Size |
---|---|
![]() | 42.44 KB |
![]() | 42.39 KB |