首页> 外文期刊>CHIPS Magazine >How DoD is using the Risk Management Framework to assess operational risk for decertified cryptographic algorithms
【24h】

How DoD is using the Risk Management Framework to assess operational risk for decertified cryptographic algorithms

机译:国防部如何使用风险管理框架评估非认证密码算法的操作风险

获取原文
       

摘要

There are times where it makes sense to continue to use decertified algorithms to secureoperational data; however, those uses must be analyzed to minimize operational risk and, in thecurrent fiscal environment, system upgrades must be prioritized to systems and areas ofresponsibility (AORs) with the greatest operational risk.This article will illustrate the who, when, why,where, and what of risk assessments for decertified cryptographic key extension requests (KERs).
机译:有时候,继续使用非认证算法来保护操作数据是有意义的;但是,必须对这些用途进行分析以最大程度地降低操作风险,并且在当前的财政环境中,必须将系统升级优先于操作风险最大的系统和责任区(AOR)。本文将说明谁,何时,为什么,在哪里,以及取消认证的密码密钥扩展请求(KER)的风险评估是什么。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号