<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="ko">
	<id>https://wiki.mathnt.net/index.php?action=history&amp;feed=atom&amp;title=Federal_Information_Processing_Standard</id>
	<title>Federal Information Processing Standard - 편집 역사</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.mathnt.net/index.php?action=history&amp;feed=atom&amp;title=Federal_Information_Processing_Standard"/>
	<link rel="alternate" type="text/html" href="https://wiki.mathnt.net/index.php?title=Federal_Information_Processing_Standard&amp;action=history"/>
	<updated>2026-04-04T21:27:34Z</updated>
	<subtitle>이 문서의 편집 역사</subtitle>
	<generator>MediaWiki 1.35.0</generator>
	<entry>
		<id>https://wiki.mathnt.net/index.php?title=Federal_Information_Processing_Standard&amp;diff=51199&amp;oldid=prev</id>
		<title>2021년 2월 17일 (수) 08:01에 Pythagoras0님의 편집</title>
		<link rel="alternate" type="text/html" href="https://wiki.mathnt.net/index.php?title=Federal_Information_Processing_Standard&amp;diff=51199&amp;oldid=prev"/>
		<updated>2021-02-17T08:01:12Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;ko&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← 이전 판&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;2021년 2월 17일 (수) 08:01 판&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l93&quot; &gt;93번째 줄:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;93번째 줄:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  &amp;lt;references /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  &amp;lt;references /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== 메타데이터 ==&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==메타데이터==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===위키데이터===&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===위키데이터===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* ID :  [https://www.wikidata.org/wiki/Q917824 Q917824]&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* ID :  [https://www.wikidata.org/wiki/Q917824 Q917824]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;===Spacy 패턴 목록===&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [{&amp;#039;LOWER&amp;#039;: &amp;#039;federal&amp;#039;}, {&amp;#039;LOWER&amp;#039;: &amp;#039;information&amp;#039;}, {&amp;#039;LOWER&amp;#039;: &amp;#039;processing&amp;#039;}, {&amp;#039;LEMMA&amp;#039;: &amp;#039;Standard&amp;#039;}]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [{&amp;#039;LEMMA&amp;#039;: &amp;#039;fips&amp;#039;}]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Pythagoras0</name></author>
	</entry>
	<entry>
		<id>https://wiki.mathnt.net/index.php?title=Federal_Information_Processing_Standard&amp;diff=46996&amp;oldid=prev</id>
		<title>Pythagoras0: /* 메타데이터 */ 새 문단</title>
		<link rel="alternate" type="text/html" href="https://wiki.mathnt.net/index.php?title=Federal_Information_Processing_Standard&amp;diff=46996&amp;oldid=prev"/>
		<updated>2020-12-26T12:13:59Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;메타데이터: &lt;/span&gt; 새 문단&lt;/span&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;ko&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← 이전 판&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;2020년 12월 26일 (토) 12:13 판&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l92&quot; &gt;92번째 줄:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;92번째 줄:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===소스===&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===소스===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  &amp;lt;references /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  &amp;lt;references /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;== 메타데이터 ==&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;===위키데이터===&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* ID :  [https://www.wikidata.org/wiki/Q917824 Q917824]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Pythagoras0</name></author>
	</entry>
	<entry>
		<id>https://wiki.mathnt.net/index.php?title=Federal_Information_Processing_Standard&amp;diff=46331&amp;oldid=prev</id>
		<title>Pythagoras0: /* 노트 */ 새 문단</title>
		<link rel="alternate" type="text/html" href="https://wiki.mathnt.net/index.php?title=Federal_Information_Processing_Standard&amp;diff=46331&amp;oldid=prev"/>
		<updated>2020-12-21T14:29:28Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;노트: &lt;/span&gt; 새 문단&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;새 문서&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== 노트 ==&lt;br /&gt;
&lt;br /&gt;
===위키데이터===&lt;br /&gt;
* ID :  [https://www.wikidata.org/wiki/Q917824 Q917824]&lt;br /&gt;
===말뭉치===&lt;br /&gt;
# The FIPS 140-2 security requirements cover 11 areas related to the design and implementation of a cryptographic module.&amp;lt;ref name=&amp;quot;ref_c0e704b2&amp;quot;&amp;gt;[https://docs.microsoft.com/en-us/compliance/regulatory/offering-fips-140-2 Federal Information Processing Standard (FIPS) Publication 140-2 - Microsoft Compliance]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# “FIPS 140 Validated” means that the cryptographic module, or a product that embeds the module has been validated (“certified”) by the CMVP as meeting the FIPS 140-2 requirements.&amp;lt;ref name=&amp;quot;ref_c0e704b2&amp;quot; /&amp;gt;&lt;br /&gt;
# If you are required to use cryptographic modules validated through FIPS 140-2, you need to verify that the version you use appears on the validation list.&amp;lt;ref name=&amp;quot;ref_c0e704b2&amp;quot; /&amp;gt;&lt;br /&gt;
# This caveat informs the reader that required configuration and security rules must be followed to use the cryptographic module in a way that is consistent with its FIPS 140-2 security policy.&amp;lt;ref name=&amp;quot;ref_c0e704b2&amp;quot; /&amp;gt;&lt;br /&gt;
# Windows has a hidden setting that will enable only government-certified “FIPS-compliant” encryption.&amp;lt;ref name=&amp;quot;ref_f34e8c48&amp;quot;&amp;gt;[https://www.howtogeek.com/245859/why-you-shouldnt-enable-fips-compliant-encryption-on-windows/ Why You Shouldn’t Enable “FIPS-compliant” Encryption on Windows]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# FIPS defines certain specific encryption methods that can be used, as well as methods for generating encryption keys.&amp;lt;ref name=&amp;quot;ref_f34e8c48&amp;quot; /&amp;gt;&lt;br /&gt;
# “FIPS mode” doesn’t make Windows more secure.&amp;lt;ref name=&amp;quot;ref_f34e8c48&amp;quot; /&amp;gt;&lt;br /&gt;
# It just blocks access to newer cryptography schemes that haven’t been FIPS-validated.&amp;lt;ref name=&amp;quot;ref_f34e8c48&amp;quot; /&amp;gt;&lt;br /&gt;
# As geographers and data analysts we are interested in specific FIPS codes developed to assign ID tags for various geographic entities.&amp;lt;ref name=&amp;quot;ref_dff40f9d&amp;quot;&amp;gt;[https://www.policymap.com/2012/07/tips-on-fips-a-quick-guide-to-geographic-place-codes/ Tips on FIPS: A Quick Guide to Geographic Place Codes]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# FIPS codes numbered 5-2 and 6-4 were originally published in the 1970s (as previous versions 5-1 and 6-3) and then updated in 1987 and 1990 respectively.&amp;lt;ref name=&amp;quot;ref_dff40f9d&amp;quot; /&amp;gt;&lt;br /&gt;
# FIPS 5-2 issued a 2-digit numeric value for each U.S. state, the District of Columbia, outlying territories and other affiliated areas.&amp;lt;ref name=&amp;quot;ref_dff40f9d&amp;quot; /&amp;gt;&lt;br /&gt;
# FIPS 6-4 issued a 3-digit numeric value identifying counties and equivalent subdivisions.&amp;lt;ref name=&amp;quot;ref_dff40f9d&amp;quot; /&amp;gt;&lt;br /&gt;
# Codes: for instance, standards for encoding data (such as FIPS county codes or codes to indicate weather conditions or emergency indications).&amp;lt;ref name=&amp;quot;ref_e239364b&amp;quot;&amp;gt;[https://en.wikipedia.org/wiki/Federal_Information_Processing_Standards Federal Information Processing Standards]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# In 1994 NOAA began broadcasting coded signals called FIPS codes along with their standard weather broadcasts from local stations.&amp;lt;ref name=&amp;quot;ref_e239364b&amp;quot; /&amp;gt;&lt;br /&gt;
# Some examples of FIPS Codes for geographical areas include FIPS 10-4 for country codes or region codes and FIPS 5-2 for state codes.&amp;lt;ref name=&amp;quot;ref_e239364b&amp;quot; /&amp;gt;&lt;br /&gt;
# FIPS 140-2 validation is mandatory for use in federal government departments that collect, store, transfer, share and disseminate sensitive but unclassified (SBU) information.&amp;lt;ref name=&amp;quot;ref_01738af0&amp;quot;&amp;gt;[https://www.mcafee.com/enterprise/en-us/about/cloud-compliance/fips-140-2-encryption-compliance-requirements.html FIPS 140-2 Overview &amp;amp; Compliance Requirements]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Anyone deploying systems into a U.S. federal SBU environment – and this includes cloud services – are required to comply with FIPS 140-2 certification.&amp;lt;ref name=&amp;quot;ref_01738af0&amp;quot; /&amp;gt;&lt;br /&gt;
# In other words, the encryption associated with the computer systems, solutions and services used by federal government agencies must meet the minimum standards specified in FIPS PUB 140-2.&amp;lt;ref name=&amp;quot;ref_01738af0&amp;quot; /&amp;gt;&lt;br /&gt;
# FIPS 140-2 has also become the de-facto standard for encryption beyond the federal government and is recognized as an important security standard outside the United States.&amp;lt;ref name=&amp;quot;ref_01738af0&amp;quot; /&amp;gt;&lt;br /&gt;
# VMware has validated various cryptographic modules against the FIPS 140-2 standard.&amp;lt;ref name=&amp;quot;ref_1caa2ea6&amp;quot;&amp;gt;[https://www.vmware.com/kr/security/certifications/fips.html Federal Information Processing Standards (FIPS) - VMware Security]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# The FIPS 140-2 standard specifies and validates the cryptographic and operational requirements for the modules within security systems that protect sensitive information.&amp;lt;ref name=&amp;quot;ref_1caa2ea6&amp;quot; /&amp;gt;&lt;br /&gt;
# The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java.&amp;lt;ref name=&amp;quot;ref_1caa2ea6&amp;quot; /&amp;gt;&lt;br /&gt;
# The Computer Security Act of 1987 contained a waiver process for FIPS; however, this Act was superseded by FISMA of 2002, which no longer allows this practice.&amp;lt;ref name=&amp;quot;ref_c31c88bd&amp;quot;&amp;gt;[https://www.nist.gov/standardsgov/compliance-faqs-federal-information-processing-standards-fips Compliance FAQs: Federal Information Processing Standards (FIPS)]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# When industry standards become available the federal government will withdraw a FIPS.&amp;lt;ref name=&amp;quot;ref_c31c88bd&amp;quot; /&amp;gt;&lt;br /&gt;
# FIPS are applied to the potential use case and align with the government data’s perceived value.&amp;lt;ref name=&amp;quot;ref_d9561958&amp;quot;&amp;gt;[https://www.hypr.com/federal-information-processing-standard/ Whats is the Federal Information Processing Standard (FIPS)?]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# FIPS has been adopted as the de facto security standard by governments and regulated industries around the world, including the healthcare, financial and legal services sectors.&amp;lt;ref name=&amp;quot;ref_bf5a3bc1&amp;quot;&amp;gt;[https://www.globenewswire.com/news-release/2020/06/24/2052674/0/en/Cloudian-HyperStore-Obtains-Federal-Information-Processing-Standard-FIPS-Security-Certification.html Cloudian HyperStore Obtains Federal Information Processing Standard (FIPS) Security Certification]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# “The FIPS certification is the latest demonstration of Cloudian’s commitment to providing the most secure object storage platform on the market.&amp;lt;ref name=&amp;quot;ref_bf5a3bc1&amp;quot; /&amp;gt;&lt;br /&gt;
# FIPS PUB 140-2 is a U.S. government computer security standard that is used to approve cryptographic modules and is published by the U.S. National Institute of Standards and Technologies (NIST).&amp;lt;ref name=&amp;quot;ref_bf5a3bc1&amp;quot; /&amp;gt;&lt;br /&gt;
# Vendors can only earn a FIPS 140-2 certification after their software has undergone extensive testing and been independently validated by one of 13 NIST-specified laboratories.&amp;lt;ref name=&amp;quot;ref_bf5a3bc1&amp;quot; /&amp;gt;&lt;br /&gt;
# It is recommended that you verify that the cryptography module used in the applications in your implementation have FIPS 140-1 or FIPS 140-2 certification.&amp;lt;ref name=&amp;quot;ref_f2819961&amp;quot;&amp;gt;[https://docs.oracle.com/cd/E14004_01/books/SecurHarden/SecurHarden_PCI_Standard4.html 8.2: Federal Information Processing Standard (FIPS) 140]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# The RSA BSAFE libraries used in Siebel Business Applications are FIPS 140-2 certified.&amp;lt;ref name=&amp;quot;ref_f2819961&amp;quot; /&amp;gt;&lt;br /&gt;
# FIPS 201 is the technical standard that HSPD-12 required the National Institute of Standards and Technology (NIST) to develop.&amp;lt;ref name=&amp;quot;ref_42b48860&amp;quot;&amp;gt;[https://www.fedidcard.gov/faq/what-federal-information-processing-standard-fips-201 What is the Federal Information Processing Standard (FIPS) - 201?]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# FIPS 201 is entitled _Personal Identity Verification (PIV) for Federal Employees and Contractors.?&amp;lt;ref name=&amp;quot;ref_42b48860&amp;quot; /&amp;gt;&lt;br /&gt;
# FIPS 201 was issued on February 27, 2005.&amp;lt;ref name=&amp;quot;ref_42b48860&amp;quot; /&amp;gt;&lt;br /&gt;
# The first revision of FIPS 201-1 was finalized in June 2006.&amp;lt;ref name=&amp;quot;ref_42b48860&amp;quot; /&amp;gt;&lt;br /&gt;
# For a list of FIPS prerequisites, see FIPS 140-2 Supported Platforms.&amp;lt;ref name=&amp;quot;ref_ff2ca5df&amp;quot;&amp;gt;[https://www.vertica.com/docs/10.0.x/HTML/Content/Authoring/Security/FIPS/FIPSOverview.htm Federal Information Processing Standard]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# FIPS are compulsory and binding for federal agencies.&amp;lt;ref name=&amp;quot;ref_e1d3d5fd&amp;quot;&amp;gt;[https://itlaw.wikia.org/wiki/Federal_Information_Processing_Standards Federal Information Processing Standards]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# AWS is updating all AWS FIPS endpoints to a minimum Transport Layer Security (TLS) version of 1.2 across all AWS Regions, with a targeted completion date of March 31, 2021.&amp;lt;ref name=&amp;quot;ref_a6a20239&amp;quot;&amp;gt;[https://aws.amazon.com/compliance/fips/ Amazon Web Services (AWS)]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Once completed, these updates will revoke the ability to use TLS 1.0 and TLS 1.1 on all FIPS endpoints.&amp;lt;ref name=&amp;quot;ref_a6a20239&amp;quot; /&amp;gt;&lt;br /&gt;
# The FIPS endpoints for the AWS services listed below have been updated and require TLS 1.2 or higher.&amp;lt;ref name=&amp;quot;ref_a6a20239&amp;quot; /&amp;gt;&lt;br /&gt;
# For the secure protection of high-security information, Plasma Ruggedized Solutions offers Level 1-4 Federal Information Processing Standards (FIPS) compliance services.&amp;lt;ref name=&amp;quot;ref_930c7455&amp;quot;&amp;gt;[https://www.plasmarugged.com/fips-compliance Federal Information Processing Standards (FIPS) Capabilities &amp;amp; Compliance]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Our FIPS capabilities will ensure that your hardware meets or exceeds FIPS compliance certification standards for physical security.&amp;lt;ref name=&amp;quot;ref_930c7455&amp;quot; /&amp;gt;&lt;br /&gt;
# Plasma Ruggedized Solutions (PRS) is one of the industry’s highest-volume producers of FIPS-approved products.&amp;lt;ref name=&amp;quot;ref_930c7455&amp;quot; /&amp;gt;&lt;br /&gt;
# Our FIPS capabilities will protect your products—and the data stored in them—from potential theft or information probing.&amp;lt;ref name=&amp;quot;ref_930c7455&amp;quot; /&amp;gt;&lt;br /&gt;
# A FIPS standard is developed only when there are no voluntary standards in existence to address federal requirements.&amp;lt;ref name=&amp;quot;ref_88582a2c&amp;quot;&amp;gt;[https://docs.genesys.com/Documentation/System/8.5.x/SDG/FIPS Documentation:System:SDG:FIPS:8.5.x]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# These components use the security library directly and require the additional configuration option FIPS Mode Enabled to control their usage.&amp;lt;ref name=&amp;quot;ref_88582a2c&amp;quot; /&amp;gt;&lt;br /&gt;
# FIPS integrity verification is performed when the dracut-fips package is present on the system, regardless of whether the system operates in FIPS mode or not.&amp;lt;ref name=&amp;quot;ref_b4aaf69d&amp;quot;&amp;gt;[https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/sect-security_guide-federal_standards_and_regulations-federal_information_processing_standard 10.2. Federal Information Processing Standard (FIPS) Red Hat Enterprise Linux 6]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# The FIPS 140 2 portion of the standards specifically deals with cryptographic modules.&amp;lt;ref name=&amp;quot;ref_7cf1bb5c&amp;quot;&amp;gt;[https://cipherpoint.com/blog/what-is-fips-140-2/ What is FIPS 140 2? Federal Information Processing Standards]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# All of the federal government departments that interact with sensitive unclassified information must be compliant to FIPS 140-2.&amp;lt;ref name=&amp;quot;ref_7cf1bb5c&amp;quot; /&amp;gt;&lt;br /&gt;
# Each level in the FIPS 140 2 portion of the standards is specifically designed to be appropriate for a given type of task and working environment.&amp;lt;ref name=&amp;quot;ref_7cf1bb5c&amp;quot; /&amp;gt;&lt;br /&gt;
# You may have seen the terms, ‘FIPS Compliant Encryption’, ‘FIPS 140 2 Validated Encryption’ or ‘FIPS 140 2 Certified Encryption’.&amp;lt;ref name=&amp;quot;ref_7cf1bb5c&amp;quot; /&amp;gt;&lt;br /&gt;
# FIPS mandates a number of different types of security and auditing procedures that depend on the type of data being stored and protected.&amp;lt;ref name=&amp;quot;ref_4149cc30&amp;quot;&amp;gt;[https://www.abacusnext.com/blog/federal-information-processing-standards-fips/ Federal Information Processing Standards (FIPS)]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# FIPS works in tandem with other federal data security standards to fill in any compliance gaps or loopholes.&amp;lt;ref name=&amp;quot;ref_4149cc30&amp;quot; /&amp;gt;&lt;br /&gt;
# We have many clients who are using FIPS-compliant Abacus Private Cloud accounts.&amp;lt;ref name=&amp;quot;ref_4149cc30&amp;quot; /&amp;gt;&lt;br /&gt;
# The Uplogix Local Manager can be operated in a secure manner that complies with FIPS 140-2 for customers whose corporate security policy requires it.&amp;lt;ref name=&amp;quot;ref_825d95b6&amp;quot;&amp;gt;[https://uplogix.com/docs/local-manager-user-guide/security/fips-mode Federal Information Processing Standard (FIPS) 140-2 Mode]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# To enable FIPS mode, the Local Manager must be running the -g version of LMS software.&amp;lt;ref name=&amp;quot;ref_825d95b6&amp;quot; /&amp;gt;&lt;br /&gt;
# ** ** unless the management server is also running in FIPS mode.&amp;lt;ref name=&amp;quot;ref_825d95b6&amp;quot; /&amp;gt;&lt;br /&gt;
# Of most interest to microwave backhaul users are two particular FIPS standards, FIPS 197 and FIPS 140-2.&amp;lt;ref name=&amp;quot;ref_eba9b287&amp;quot;&amp;gt;[https://aviatnetworks.com/tag/federal-information-processing-standards/ Federal Information Processing Standards]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# FIPS 197 is straightforward enough: it provides the definition of the Advanced Encryption Standard (AES), which is the basis of so much of the security industry.&amp;lt;ref name=&amp;quot;ref_eba9b287&amp;quot; /&amp;gt;&lt;br /&gt;
# However, not all FIPS validations are created equal.&amp;lt;ref name=&amp;quot;ref_eba9b287&amp;quot; /&amp;gt;&lt;br /&gt;
# FIPS 140-2 that sets the standard for the Security Requirements for Cryptographic Modules has different levels of validation.&amp;lt;ref name=&amp;quot;ref_eba9b287&amp;quot; /&amp;gt;&lt;br /&gt;
# Typically, FIPS codes deal with US states and counties.&amp;lt;ref name=&amp;quot;ref_08744c0a&amp;quot;&amp;gt;[https://support.esri.com/en/technical-article/000002594 FAQ: What are FIPS codes?]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# FIPS 140-2 is a standard first published in 2001 by the U.S. National Institute of Standards and Technology (NIST), a non-regulatory agency of the U.S. Department of Commerce.&amp;lt;ref name=&amp;quot;ref_c79f0ee9&amp;quot;&amp;gt;[https://www.ipswitch.com/resources/best-practices/fips What is FIPS (Federal Information Processing Standard)]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# The Canadian government also has policies requiring FIPS-validated software, and it cooperates with NIST in establishing FIPS standards.&amp;lt;ref name=&amp;quot;ref_c79f0ee9&amp;quot; /&amp;gt;&lt;br /&gt;
# FIPS includes standards regarding the formatting of location and personal identification information, encryption algorithms, key storage, and other data processing areas.&amp;lt;ref name=&amp;quot;ref_c79f0ee9&amp;quot; /&amp;gt;&lt;br /&gt;
# According to the FIPS specification, &amp;quot;allows the software and firmware components of a cryptographic module to be executed on a general purpose computing system using an unevaluated operating system.&amp;lt;ref name=&amp;quot;ref_c79f0ee9&amp;quot; /&amp;gt;&lt;br /&gt;
# A FIPS 140-2 validation certificate is issued for each validated module.&amp;lt;ref name=&amp;quot;ref_841e7926&amp;quot;&amp;gt;[https://www.cse-cst.gc.ca/en/page/what-fips-140 What is FIPS 140?]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Cisco Unified Border Element is Common Criteria (CC) and The Federal Information Processing Standards (FIPS) certified.&amp;lt;ref name=&amp;quot;ref_b028a029&amp;quot;&amp;gt;[https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/voice/cube/configuration/cube-book/voi-cube-cc-fips-compliance.html Common Criteria (CC) and The Federal Information Processing Standards (FIPS) Compliance [Cisco Unified Border Element]]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# FIPS 200 specifies the minimum security requirements for non-military federal information systems.&amp;lt;ref name=&amp;quot;ref_7e03babf&amp;quot;&amp;gt;[https://www.ssh.com/compliance/fips-200/ Minimum Security Requirements for Federal]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# FIPS 200 addresses the specification of minimum security requirements for federal information and information systems.&amp;lt;ref name=&amp;quot;ref_7e03babf&amp;quot; /&amp;gt;&lt;br /&gt;
# FIPS 199 addresses the classification divides systems.&amp;lt;ref name=&amp;quot;ref_7e03babf&amp;quot; /&amp;gt;&lt;br /&gt;
# The Federal Information Processing Standards (FIPS) are standards published by NIST for use by the United States federal government and government contractors in relation to computer systems.&amp;lt;ref name=&amp;quot;ref_7e03babf&amp;quot; /&amp;gt;&lt;br /&gt;
# FIPS 140-2 is a statement that is titled &amp;quot;Security Requirements for Cryptographic Modules.&amp;lt;ref name=&amp;quot;ref_ba911531&amp;quot;&amp;gt;[https://docs.logrhythm.com/docs/enterprise/client-console-administrator-guide/deployment-security/federal-information-processing-standards-fips Federal Information Processing Standards (FIPS)]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# It is insufficient to use an algorithm just because it is listed on the approved lists in FIPS 140-2.&amp;lt;ref name=&amp;quot;ref_ba911531&amp;quot; /&amp;gt;&lt;br /&gt;
# FIPS mode does not support Acrobat versions earlier than 7.0.&amp;lt;ref name=&amp;quot;ref_45b8cfab&amp;quot;&amp;gt;[https://help.adobe.com/en_US/livecycle/10.0/UpgradeTurnkey/WS624e3cba99b79e12-7bd2337c12f028b239e-7fff.html Adobe LiveCycle ES3 * 6.1 Enabling Federal Information Processing Standard (FIPS)]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# In general, when FIPS is enabled, the Assembler service does not apply password encryption to any document.&amp;lt;ref name=&amp;quot;ref_45b8cfab&amp;quot; /&amp;gt;&lt;br /&gt;
# Additionally, the PDFsFromBookmarks element is not supported in FIPS mode when the base document is password-encrypted.&amp;lt;ref name=&amp;quot;ref_45b8cfab&amp;quot; /&amp;gt;&lt;br /&gt;
# Definition - What does Federal Information Processing Standards (FIPS) mean?&amp;lt;ref name=&amp;quot;ref_25460008&amp;quot;&amp;gt;[https://www.techopedia.com/definition/24742/federal-information-processing-standards-fips What are Federal Information Processing Standards (FIPS)?]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# We are very pleased to announce that we have received Federal Information Processing Standards (FIPS) Validation (CMVP Cert #3702) for the D2iQ Kubernetes Platform (DKP).&amp;lt;ref name=&amp;quot;ref_e974cf5f&amp;quot;&amp;gt;[https://d2iq.com/blog/why-we-care-about-fips-and-you-should-too Why We Care About FIPS (And You Should Too) UPDATE!]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Many government agencies in the United States require Federal Information Processing Standards (FIPS) compliance or validation for deployed software.&amp;lt;ref name=&amp;quot;ref_e974cf5f&amp;quot; /&amp;gt;&lt;br /&gt;
# D2iQ works with many U.S. government agencies and has a history of delivering FIPS compliant platforms as part of these partnerships.&amp;lt;ref name=&amp;quot;ref_e974cf5f&amp;quot; /&amp;gt;&lt;br /&gt;
# Products can either be FIPS compliant or validated/certified.&amp;lt;ref name=&amp;quot;ref_e974cf5f&amp;quot; /&amp;gt;&lt;br /&gt;
# FIPS 140-2 is the mandatory standard associated with encryption of unclassified information.&amp;lt;ref name=&amp;quot;ref_e60a33db&amp;quot;&amp;gt;[https://kemptechnologies.com/au/products/industry/government/fips/ What is FIPS and Why Should You Care?]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# There are two basic approaches to achieving compliance with FIPS 140-2.&amp;lt;ref name=&amp;quot;ref_e60a33db&amp;quot; /&amp;gt;&lt;br /&gt;
# B, FIPS 140-2 Level 1 can be achieved by incorporating a software- based certified encryption module.&amp;lt;ref name=&amp;quot;ref_e60a33db&amp;quot; /&amp;gt;&lt;br /&gt;
# FIPS 140-2 Level 2 and above can be achieved by incorporating an embedded hardware based certified encryption module.&amp;lt;ref name=&amp;quot;ref_e60a33db&amp;quot; /&amp;gt;&lt;br /&gt;
===소스===&lt;br /&gt;
 &amp;lt;references /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pythagoras0</name></author>
	</entry>
</feed>