×
Whitepaper - Zero Trust, FIPS and FedRAMP for Cloud Native Applications - Download Today
The YubiHSM 2 is a secure keystore for the manufacturing industry. Download the whitepaper
140 - 2 =
138

FIPS 140-2

FIPS 140-2, или Федеральный стандарт по обработке информации 140-2 — стандарт компьютерной безопасности правительства США, используемый для утверждения криптографических модулей. Первоначальная публикация состоялась 25 мая 2001 года и была... Википедия
Вопросы по теме
25 мая 2001 г. · This Federal Information Processing Standard (140-2) specifies the security requirements that will be satisfied by a cryptographic module, ...
"140    -   2", источник: en.m.wikipedia.org
The Federal Information Processing Standard Publication 140-2, (FIPS PUB 140-2), is a U.S. government computer security standard used to approve ...
FIPS (Federal Information Processing Standard) 140-2 is the benchmark for validating the effectiveness of cryptographic hardware. If a product has a FIPS ...
FIPS (Federal Information Processing Standard) 140-2 is the benchmark for validating the effectiveness of cryptographic hardware. If a product has a FIPS 140-2 ...
7 дек. 2023 г. · The Federal Information Processing Standard (FIPS) Publication 140-2 is a U.S. government standard that defines minimum security ...
25 янв. 2024 г. · This post will discuss the reasons behind NIST's transition and the benefit of FIPS 140-3 validation for data transfer.
"140    -   2", источник: www.preveil.com
20 мар. 2024 г. · FIPS 140-2, Security Requirements for Cryptographic Modules, specifies security standards that must be met when encryption is used to ...
FIPS 140-2 (ending Sept-22-2021) Security Requirements for Cryptographic Modules NVLAP accredited Cryptographic and Security Testing (CST) Laboratories ...
22 апр. 2021 г. · FIPS 140-2 compliance applies to all federal agencies using cryptographic security measures to protect sensitive but unclassified information.
"140    -   2", источник: ciphertex.com
26 нояб. 2023 г. · This level of certification ensures that the encryption modules used by an organization are capable of withstanding advanced intrusion attempts, ...