![]() | This article's use of external links may not follow Wikipedia's policies or guidelines. (April 2025) |
In computing, security-evaluated operating systems have achieved certification from an external security-auditing organization, the most popular evaluations are Common Criteria (CC) and FIPS 140-2.
© MMXXIII Rich X Search. We shall prevail. All rights reserved. Rich X Search