Computer Security Institute

Results: 1676



#Item
861Evaluation / Cyberwarfare / Electronic commerce / European Telecommunications Standards Institute / Computer security / XAdES / PAdES / Public key certificate / Accreditation / Cryptography standards / Key management / Public-key cryptography

NIST-Workshop 10 & 11 April 2013 EUROPEAN APPROACH TO OVERSIGHT OF "TRUST SERVICE PROVIDERS" Presented by Arno Fiedler, Member of European Telecommunications Standards Institute Electronic Signatures and Infrastructures,

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-10 16:39:50
862Public safety / Standards organizations / Government / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / National Institute of Standards and Technology / National Strategy for Trusted Identities in Cyberspace / United States Department of Homeland Security / Cloud computing / Computer network security / Security / Computer crimes

Update on the Cybersecurity Framework July 31, 2014 The Framework for Improving Critical Infrastructure Cybersecurity (“The Framework”) was issued on February 12, 2014, as directed by the President in Executive Order

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2014-07-31 16:13:52
863Software quality / Computer network security / Security engineering / Data security / Software assurance / Software security assurance / Vulnerability / Application security / IDIQ / Security / Computer security / Cyberwarfare

Creating More Effective – and Strategic – Solutions SOFTWARE ASSURANCE In 2011, the National Institute for Standards and Technology (NIST) found that more than 92% of current exploitable vulnerabilities are in softw

Add to Reading List

Source URL: www.verisgroup.com

Language: English - Date: 2013-06-02 22:55:00
864Technology / Computer law / Federal Information Security Management Act / Mobile device / Electronics / NIST Special Publication 800-53 / Mobile computers / Computer security / Computing

Special Publication[removed]Draft) Guidelines on HardwareRooted Security in Mobile Devices (Draft) Recommendations of the National Institute

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-25 15:31:15
865Password / Cryptographic software / Password strength / Password cracking / Security / Access control / Computer security

MarineInstituteStudentPasswordPolicy  InterestingFact!  Computerhackersusesoftwareprogramstoobtainuser’’spasswords.Oncepasswordsare““cracked”” unauthorizedpeoplecanpretendtobeyouand

Add to Reading List

Source URL: www.mi.mun.ca

Language: English - Date: 2014-06-06 12:24:05
866Computer network security / Crime prevention / National security / 105th United States Congress / Digital Millennium Copyright Act / Information security / Vulnerability / Internet privacy / Privacy / Security / Computer security / Cyberwarfare

Name and Affiliation I am Shawn Hernan, a senior member of the technical staff at the CERT Coordination Center (CERT/CC). CERT/CC is part of the Software Engineering Institute, a federally funded research and development

Add to Reading List

Source URL: copyright.gov

Language: English - Date: 2012-05-24 14:25:09
867Quality assurance / ISO/IEC JTC1 / American National Standards Institute / ISO 10303 / Information technology management / Standards / Computer security / Standards organizations / Evaluation / Accreditation

Base Standard Program ACEPMS CB Application for Accreditation AUTHORITY: EFFECTIVE DATE:

Add to Reading List

Source URL: www.anab.org

Language: English - Date: 2014-05-19 01:56:07
868Computing / Security Content Automation Protocol / National Vulnerability Database / Federal Information Security Management Act / Vulnerability / Information security management system / National Institute of Standards and Technology / Security controls / Configuration management / Computer security / Security / Cyberwarfare

NIST SP[removed], Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.2 (Draft)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-25 15:15:06
869Computer security / Data security / Professional associations / Government / International Association of Privacy Professionals / Information security / Internet privacy / National Institute of Standards and Technology / Medical privacy / Ethics / Privacy / Security

Agenda Second Workshop on Privacy Engineering Sponsored by NIST and IAPP September 15-16, 2014 San Jose, California This workshop will gather comments and feedback on the draft privacy engineering concepts

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2014-09-09 06:57:31
870Tri-Cities /  Washington / United States Department of Energy National Laboratories / Battelle Memorial Institute / Pacific Northwest National Laboratory / Firewall / Transmission Control Protocol / Port / Deep packet inspection / Network architecture / Computer network security / Computing / Richland /  Washington

HONE Correlating Host activities to Network communications to produce Insight

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2013-09-05 10:53:20
UPDATE