CSRC

Results: 4036



#Item
831Crime prevention / National security / Information technology audit / Computer network security / Public safety / Computer forensics / Certified Information Systems Security Professional / Information security / Department of Defense Cyber Crime Center / Security / Data security / Computer security

Computer Forensics in a LAN Environment Michael J. Corby, CCP, CISSP M Corby & Associates, Inc. Audience: Security Knowledgeable with varying backgrounds The industry has, at long last, accepted Computer Security as a ke

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
832Risk / Information security / Threat / Vulnerability / Asset / Security controls / IT risk management / Information technology audit process / Computer security / Data security / Security

A Method for Quantitative Risk Analysis By James W. Meritt, CISSP I Introduction There are two primary methods of risk analysis and one hybrid method: ·

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
833Cryptographic protocols / X.509 / Public key infrastructure / Public key certificate / Revocation list / Certificate policy / Certificate authority / X.500 / Certification path validation algorithm / Cryptography / Public-key cryptography / Key management

NISSC ’99 Statement for Tutorial Tutorial Title: Usage of Certificate Policies in a PKI to Model Real-World Trust Relationships Instructor: Dr. Sarbari Gupta Director of Information Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
834Personal computers / Mandatory access control / Linux / Access control / Macintosh / Computing / Software / Computer security

Policy-Enhanced Linux An Educational Tool Paul C. Clark [removed] Overview

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
835Security / Encryption / Copy protection / Public-key cryptography / Password / Tamper resistance / Security and safety features new to Windows Vista / Cryptography / Digital rights management / Computer security

Controlling Primary And Secondary Access To Digital Information Marshall D. Abrams The MITRE Corporation, 1820 Dolley Madison Blvd., McLean, VA 22102, [removed] voice: [removed]fax: [removed]Paul B. Schnec

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
836National security / Law / Surveillance / Email privacy / Internet privacy / Employee monitoring / Electronic Communications Privacy Act / Bourke v. Nissan Motor Co. / Computer surveillance in the workplace / Ethics / Email / Privacy

______________________________________________________________________________________ Title: Are Organizations Ready For the Electronic Renaissance in Communication? Email Monitoring & Privacy Issues. Authors: Jim Kate

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
837Security / Data security / Crime prevention / National security / Attack / Vulnerability / Information security / Denial-of-service attack / Threat / Cyberwarfare / Computer network security / Computer security

Visualizing Risks: Icons for Information Attack Scenarios Hilary H. Hosmer Data Security, Inc. Bedford, MA[removed]Email: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
838United States Department of Homeland Security / Computer crimes / Critical infrastructure protection / Infrastructure / Security engineering / International Multilateral Partnership Against Cyber Threats / Computer security / Cyberwarfare / National security / Security / Public safety

October 10, 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD[removed]RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-14 09:53:24
839National security / Public safety / Data security / Risk management framework / Information security / National Cyber Security Division / Security / Computer security / Crime prevention

Current Awareness of the Cybersecurity Framework Recognizing the critical importance of widespread voluntary usage of the Framework in order to achieve the goals of the Executive Order, and that usage initially depends u

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-10 21:21:53
840Computer virus / John Shoch / Virus / Fred Cohen / Software / Macro virus / Malware / System software / Computer worm

The Case for Beneficial Computer Viruses and Worms A Student’s Perspective Definition A beneficial computer virus or worm is a selfreplicating program that has a useful purpose.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
UPDATE