What is the host security system?

Host security system (HBSS) is a security system of the United States Defense (DOD), which is used to find and analyze the threats for the computer network through the signature and protection of the firewall. As the name suggests, this system is based on the host, which means it is installed on each host on the DOD network and ensures consistent protection. Many smaller programs create a host -based security system and each serves purpose such as detection of new hosts, signatures verification, and checking the firewall principles. Although it is used throughout the DOD, officers and many staff do not learn how to use the system; Only information operators and managers are trained in its use. When the host uses the network, its signature is verified; This ensures that the host is known and has an active AKCISS to the net. Verification of behavior checks the normal behavior of the host. For exampleI will increase the red flag. Each host in the network is reported to the main policy of the firewall gate, which ensures that harmful users can only reach a certain point in the network.

as well as the name of a security system based on the host, this system is based on the host. This means that every server, laptop, and desktop computer must have HBSS installed before allowed to access the DOD network. By ensuring this extended installation, the security remains consistent because each host will follow the HBSS procedures.

HBSS is not a singular program; Rather, it is a software set. This department facilitates each program specializing in a certain task. Since September 2011 there have been six programs in Suite: Political auditor Checks and verifies all computer principles; The device control module is provided by a universal serial bus (USB) in the DOD network; Rogue system detection checks new hosts;The host prevention system is a powerful firewall for blocking malicious users; The baseline assets module helps upgrade the system during increased security; And the assembly service is used to produce messages.

relatively few DOD employees are trained when using HBSS correctly. Officers and managers usually do not interact with the network at this level, so they do not learn how to use HBSS. Information managers and operators directly communicate with network security, so these employees are focused on training.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?