Automated information systems security

Results: 104



#Item
21National security / CACI / Public safety / Security Technical Implementation Guide / Risk management framework / Certification and Accreditation / Defense Information Systems Agency / Department of Defense Information Assurance Certification and Accreditation Process / Information security / Security / Computer security / Crime prevention

CACI Information Solutions and Services CACI Automated Assessment & Authorization (A&A) Solutions Innovating to Keep Pace With Federal Cybersecurity Standards

Add to Reading List

Source URL: www.caci.com

Language: English - Date: 2015-04-01 15:52:10
22Automated Systems Holdings Limited / Computer network security / Public safety / Information security / Security information and event management / Managed security service / Security operations center / PCCW Solutions / Computer security / Security / Data security

[For Immediate Release] AUTOMATED OPENS SECURITY OPERATION CENTER IN HONG KONG TO PROVIDE MANAGED SECURITY SERVICES * *

Add to Reading List

Source URL: www.infosecurityproject.com

Language: English - Date: 2015-02-04 04:23:14
23International Space Station / Spaceflight / Biometrics / E-Channel

LC Paper No. CB[removed]) Panel on Security of the Legislative Council Implementation of Phase II of the updated Information Systems Strategy for the Immigration Department -Automated Passenger Clearance System

Add to Reading List

Source URL: www.legco.gov.hk

Language: English - Date: 2004-03-15 06:37:12
24Payment systems / Identity document / Public key certificate / Automated teller machine / Travel document / 100 point check / Brazilian identity card / Cryptography / Security / Technology

100 Point ID Check Information Sheet To verify your identity to OPEN CHANNEL, please choose your sources of identification from the alternatives listed, noting how many points each document or source is worth. Primary I

Add to Reading List

Source URL: www.openchannel.org.au

Language: English - Date: 2014-02-17 17:23:34
25Security / Crimes / Embedded systems / Credit card / Fraud / Identity document / Automated teller machine / EFTPOS / Bank statement / Payment systems / Business / Law

No. 14 June[removed]Preventing identity-related fraud This unlawful use of another person’s personal information is known as identityrelated fraud.

Add to Reading List

Source URL: www.cpassist.aic.gov.au

Language: English - Date: 2012-05-31 00:10:40
26Security / Crimes / Embedded systems / Credit card / Fraud / Identity document / Automated teller machine / EFTPOS / Bank statement / Payment systems / Business / Law

No. 14 June[removed]Preventing identity-related fraud This unlawful use of another person’s personal information is known as identityrelated fraud.

Add to Reading List

Source URL: cpassist.aic.gov.au

Language: English - Date: 2012-05-31 00:10:40
27Crime prevention / Warning systems / Burglar alarm / Automated teller machine / Closed-circuit television / Vulnerability / Information technology security audit / Physical security / Security / Safety / Public safety

BUSINESS SECURITY AUDIT CRIME PREVENTION TIPS FOR YOU AND YOUR BUSINESS

Add to Reading List

Source URL: communitysafety.police.wa.gov.au

Language: English - Date: 2013-11-11 19:47:50
28Crime prevention / National security / Computer network security / Public safety / Information security / Security controls / Health Insurance Portability and Accountability Act / Security / Data security / Computer security

UTMB HANDBOOK OF OPERATING PROCEDURES Section 2 Subject 2.19 General Administrative Policies and Services Computers/Automated Information Systems

Add to Reading List

Source URL: www.cephbase.utmb.edu

Language: English - Date: 2013-09-19 18:24:46
29Cyberwarfare / Crime prevention / Information security / National security / Authorization / Internet privacy / Internet / Password / Texas / Security / Computer security / Data security

UTMB HANDBOOK OF OPERATING PROCEDURES Section 2 Subject 2.19 General Administrative Policies and Services Computers/Automated Information Systems

Add to Reading List

Source URL: www.cephbase.utmb.edu

Language: English - Date: 2013-09-19 18:24:46
30Crime prevention / Data security / Information security / National security / Internet / Intranet / Website / Technology / University of Texas Medical Branch / Security / Digital media / Computer security

UTMB HANDBOOK OF OPERATING PROCEDURES Section 2 Subject 2.19 General Administrative Policies and Services Computers/Automated Information Systems

Add to Reading List

Source URL: www.cephbase.utmb.edu

Language: English - Date: 2013-09-19 18:24:47
UPDATE