Computer Security Institute

Results: 1676



#Item
221Computing / Information technology management / Risk analysis / Information security management system / ISO/IEC 27001 / Vulnerability / Security management / Information security / IT risk / Data security / Security / Computer security

STMI@NUS STRATEGIC TECHNOLOGY MANAGEMENT INSTITUTE NICF-Information Security Management:

Add to Reading List

Source URL: www.stmi.nus.edu.sg

Language: English - Date: 2013-03-04 23:44:21
222Password / Draw a Secret / Phishing / Partial Password / Cognitive password / Security / Access control / Computer security

Exploring the Design Space of Graphical Passwords on Smartphones Florian Schaub, Marcel Walch, Bastian Könings, and Michael Weber Institute of Media Informatics Ulm UniversityUlm, Germany

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-07-03 09:36:38
223Electronic documents / Email / Internet standards / Computer security / Data security / Electronic voting / National Institute of Standards and Technology / Portable Document Format / Authentication / Computing / Internet / Security

P UBLIC C OMMENT ON : NIST-IR 7682: I NFORMATION S YSTEM S ECURITY B EST P RACTICES FOR UOCAVA-S UPPORTING S YSTEMS ; NIST-IR 7711: S ECURITY B EST P RACTICES FOR THE E LECTRONIC T RANSMISSION OF UOCAVA

Add to Reading List

Source URL: accurate-voting.org

Language: English - Date: 2013-06-05 15:32:08
224Data security / Computing / Public safety / NIST Special Publication 800-53 / Federal Information Security Management Act / Security controls / Standards for Security Categorization of Federal Information and Information Systems / Information security / Security risk / Computer security / Security / National Institute of Standards and Technology

NIST Special PublicationRevision 1 Recommended Security Controls for Federal Information Systems Ron Ross

Add to Reading List

Source URL: www.infogard.com

Language: English - Date: 2011-10-13 13:47:31
225Information theory / Receiver

Faculty of Computer Science, Institute of Architecture of Systems, Chair of Data Security and Data Protection Implementability of the Identity Management Part in Pfitzmann/Hansen‘s Terminology for a Complex

Add to Reading List

Source URL: www.cs.kau.se

Language: English - Date: 2010-08-18 04:09:00
226Law / Public administration / Extensible Configuration Checklist Description Format / Computer security / Security Content Automation Protocol / Federal Information Security Management Act

Overview: National Checklist Program Chuck Wergin Booz Allen Hamilton National Institute of Standards and Technology (NIST)

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:53
227National Institute of Standards and Technology / Computing / NIST Special Publication 800-53 / Federal Information Security Management Act / Risk management framework / Information security management system / Security controls / Standards for Security Categorization of Federal Information and Information Systems / Information security / Computer security / Data security / Security

NIST Special Publication 800-53A Guide for Assessing the Security Controls in Federal Information Systems Building Effective Security Assessment Plans

Add to Reading List

Source URL: www.infogard.com

Language: English - Date: 2011-10-18 16:33:14
228Computing / Hacking / FireEye /  Inc. / Federal Information Security Management Act / NIST Special Publication 800-53 / Malware / Consensus audit guidelines / SANS Institute / Vulnerability / Computer security / Cyberwarfare / Computer network security

FireEye Government Solution Mapping Guide for FISMA and SANS Critical Security Controls FISMA and SANS Critical Security Controls Driving Compliance In a bid to bolster cyber security today’s highly networked computing

Add to Reading List

Source URL: www.fireeye.fr

Language: English - Date: 2015-04-30 15:05:36
229Password / Passphrase / John the Ripper / Dictionary attack / Crack / Password manager / Computer security / Security / Cryptography

From Very Weak to Very Strong: Analyzing Password-Strength Meters Xavier de Carné de Carnavalet and Mohammad Mannan Concordia Institute for Information Systems Engineering Concordia University, Montreal, Canada {x_decar

Add to Reading List

Source URL: madiba.encs.concordia.ca

Language: English - Date: 2013-12-07 13:46:37
230Sociolinguistics / Computing / Professional accountancy bodies / Global Information Assurance Certification / Information technology audit / Professional certification / Penetration test / EC-Council / (ISC)² / Standards / Auditing / Computer security

Professional Certifications American College of Forensic Examiners International (ACFEI) – http://www.acfei.com CHS Level I – V – Certified in Homeland Security American Institute for Chartered Property Casualty Un

Add to Reading List

Source URL: www.weebly.com

Language: English - Date: 2014-04-18 01:51:01
UPDATE