Users must ensure sensitive data is properly protected in compliance with all VA regulations. ![]() Users must ensure their use of this technology/standard is consistent with VA policies and standards, including, but not limited to, VA Handbooks 61 VA Directives 6004, 6513, and 6517 and National Institute of Standards and Technology (NIST) standards, including Federal Information Processing Standards (FIPS). ![]() This technology finds open network ports and detects different versions of technologies running on them. More information on the proper use of the TRM can be found on theĪdvanced Port Scanner is used for network port scanning. Technologies must be operated and maintained in accordance with Federal and Department security and
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |