Homeland Open Security Technology
Encyclopedia
Homeland Open Security Technology (HOST) is a five-year, $10 million program by the Department of Homeland Security
United States Department of Homeland Security
The United States Department of Homeland Security is a cabinet department of the United States federal government, created in response to the September 11 attacks, and with the primary responsibilities of protecting the territory of the United States and protectorates from and responding to...

's Science and Technology Directorate to promote the creation and use of open security
Open Security
Open security is an initiative to approach application security challenges using open source philosophies and methodologies. Traditional application security is based on the premise that any application or service relies on security through obscurity.On the developer side, legitimate software and...

 and open-source software
Open-source software
Open-source software is computer software that is available in source code form: the source code and certain other rights normally reserved for copyright holders are provided under a software license that permits users to study, change, improve and at times also to distribute the software.Open...

 in the United States government and military, especially in areas pertaining to computer security
Computer security
Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to...

. In October 2011, the project won the Open Source for America
Open Source for America
Open Source for America consortium of various organizations established to advocate for and support the use of free and open-source software in the U.S. Federal government. It consists of various open source foundations, and companies, including GNOME, Mozilla, and Canonical. The organization...

 2011 Government Deployment Open Source Award.

Participants

The project is contracted to the Open Technology Research Consortium which consists of the Georgia Tech Research Institute
Georgia Tech Research Institute
The Georgia Tech Research Institute is the nonprofit applied research arm of the Georgia Institute of Technology in Atlanta, Georgia, United States...

 (primary), the Center for Agile Technology
Center for Agile Technology
The Center for Agile Technology is an applied research unit of the University of Texas at Austin. Its director is David A. Brant....

 at the University of Texas at Austin
University of Texas at Austin
The University of Texas at Austin is a state research university located in Austin, Texas, USA, and is the flagship institution of the The University of Texas System. Founded in 1883, its campus is located approximately from the Texas State Capitol in Austin...

, the Open Source Software Institute
Open Source Software Institute
The Open Source Software Institute is a U.S.-based 501, non-profit organization whose mission is to promote the development and implementation of open-source software solutions within US Federal, state and municipal government agencies...

, and the Open Information Security Foundation. So far, the project has contributed funding towards the OpenSSL Software Foundation and the Open Information Security Foundation.

Investments

  • Suricata
    Suricata (software)
    Suricata is an open source-based intrusion detection system . It was developed by the Open Information Security Foundation . A beta version was released in December 2009, with the first standard release following in July 2010.-Features:...

     - An open source-based intrusion detection system (IDS). It was developed by the Open Information Security Foundation (OISF). A beta version was released in December 2009, with the first standard release following in July 2010.
  • OpenSSL
    OpenSSL
    OpenSSL is an open source implementation of the SSL and TLS protocols. The core library implements the basic cryptographic functions and provides various utility functions...

     FIPS 140-2 Validation
    FIPS 140-2
    The Federal Information Processing Standard Publication 140-2, , is a U.S. government computer security standard used to accredit cryptographic modules. The title is Security Requirements for Cryptographic Modules...

    - The Federal Information Processing Standard (FIPS) Publication 140-2, FIPS PUB 140-2, is a U.S. government computer security standard used to accredit cryptographic modules. The title is Security Requirements for Cryptographic Modules. Initial publication was on May 25, 2001 and was last updated December 3, 2002.

External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK