Ports and services
[DOC File]THE PORTS AUTHORITY
https://info.5y1.org/ports-and-services_1_ff1e79.html
6.3 The Ports Authority shall be entitled to deploy its security services as it wishes throughout the Port including the Concession Area for reasons of national security, which includes the security of the Port, or to perform its statutory obligations or to protect the health or safety of persons or to safeguard the environment or to prevent ...
[DOCX File]Executive Summary - North Carolina
https://info.5y1.org/ports-and-services_1_88054c.html
all ports, protocols, and services. of all inbound and outbound traffic are represented and managed. Separation Measures [AC-4, SC-2, SC-7] ... Vendors are also responsible for meeting the applicable System and Services Acquisition controls as defined in SA-4, SA-10 & SA-11.
[DOCX File]Security and Privacy Control Collaboration Index Template
https://info.5y1.org/ports-and-services_1_84c39d.html
identification of functions, ports, protocols, and services. SA-9(3) establish and maintain trust relationship with providers. SA-9(4) consistent interests of consumers and providers. SA-9(5) processing, storage, and service location. SA-9(6) organization-controlled cryptographic keys. SA-9(7)
[DOCX File]Port Management (Local Ports) Regulations 2015
https://info.5y1.org/ports-and-services_1_eca582.html
The remaining 14 ports, referred to as the local ports, provide services for commercial fishers, some commercial shipping, marine and emergency services, and tourism and related sectors. The geographical location of each of the 14 local ports is shown on the following map, while table 1.1, below, details the port management arrangements for ...
[DOCX File]Security Impact Analysis (SIA) Template - CMS
https://info.5y1.org/ports-and-services_1_99a347.html
Modifications to system ports, protocols, or services; Installation of a new or upgraded hardware platform. Modifications to how information, including PII, is processed; Modifications to cryptographic modules or services; Changes in information types processed, stored, or transmitted by the system; or. Modifications to security and privacy ...
[DOCX File]Table of Contents - CMU - Carnegie Mellon University
https://info.5y1.org/ports-and-services_1_3aadb6.html
Ports, Protocols, and Services. These are the ports protocols and services running on this system. Table 2 - Ports, Protocols and Services. Ports (TCP/UDP) Protocol (s) Services. Purpose. Used By. Minimal Security Controls. These are the minimum required security controls to meet NIST 800-171. The control numbering below is consistent with NIST ...
[DOC File]PORT NUMBERS - Plustek
https://info.5y1.org/ports-and-services_1_b41a41.html
The range for assigned ports managed by the IANA is 0-1023. Ports for Internet Services. Service TCP UDP Notes SSH 22 Secure Shell * HTTP. 80 HyperText Transfer Protocol * (e.g. for web browsing). Currently (2003-07-05) HTTP/1.1 is officially described in . RFC 2616. HOSTS2 Name Server 81 81 * …
[DOCX File]Department of the Interior Security Control Standard ...
https://info.5y1.org/ports-and-services_1_f763de.html
The organization employs the concept of least privilege for specific duties and information systems (including specific ports, protocols, and services) in accordance with risk assessments as necessary to adequately mitigate risk to organizational operations and assets, individuals, other organizations, and …
[DOCX File]FedRAMP System Security Plan (SSP) Moderate Baseline …
https://info.5y1.org/ports-and-services_1_7e5026.html
Ports, Protocols and Services Table 101 Ports, Protocols and Services below lists the ports, protocols and services enabled in this information system. Instruction: In the column labeled “Used By” please indicate the components of the information system that make use of the ports, protocols and services.
[DOCX File]FedRAMP SSP Template - General Services Administration
https://info.5y1.org/ports-and-services_1_6f3d1f.html
The table below lists the Ports, Protocols, and Services enabled in this information system. TCP ports are indicated with a T and UDP ports are indicated with a U. Instruction: In the column labeled “Used By” please indicate the components of the information system that make use of the ports, protocols, and services.
Nearby & related entries:
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.