Computer Security Institute

Results: 1676



#Item
941Cloud computing / Computing / Computer security / Software architecture / Information technology management / Emerging technologies / NIST Enterprise Architecture Model / Open-system environment reference model / Standards organizations / Gaithersburg /  Maryland / National Institute of Standards and Technology

Microsoft Word - BD_Vol6-RefArchitecture_V1Draft_Pre-release.docx

Add to Reading List

Source URL: jtc1bigdatasg.nist.gov

Language: English - Date: 2014-05-01 23:19:43
942Cyberwarfare / Gaithersburg /  Maryland / National Institute of Standards and Technology / Cloud computing / Threat / Risk analysis / NIST Enterprise Architecture Model / Open-system environment reference model / Computer security / Standards organizations / Computing

Microsoft Word - BD_Vol2_TaxonomyReport_V1Draft_Pre-release.docx

Add to Reading List

Source URL: jtc1bigdatasg.nist.gov

Language: English - Date: 2014-05-01 23:16:20
943Computing / National Institute of Standards and Technology / Standards for Security Categorization of Federal Information and Information Systems / Federal Information Security Management Act / Information security / Security controls / Risk management framework / Information systems / NIST Special Publication 800-53 / Computer security / Data security / Security

Microsoft Word - QSG - Categorize - Implementation[removed]doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-02-11 00:00:00
944Computer law / Data privacy / Security / Caldicott Report / Law / Caldicott guardian / Data Protection Act / Medical privacy / Information security / National Health Service / Privacy / Government

Draft Data Protection Policy

Add to Reading List

Source URL: www.institute.nhs.uk

Language: English - Date: 2010-04-21 09:41:42
945Technology / Idaho National Laboratory / Cyber security standards / Control system security / SCADA / Information security / National Institute of Standards and Technology / Idaho Falls /  Idaho / Computer security / Security / Idaho

INL/EXT[removed]Revision 0 A Comparison of Cross-Sector Cyber Security Standards

Add to Reading List

Source URL: www.inl.gov

Language: English - Date: 2006-04-10 13:55:44
946Centralized computing / Federal Information Security Management Act / National Institute of Standards and Technology / Information security / Security controls / NIST Special Publication 800-53 / IICCRD / Computer security / Computing / Cloud computing

Testimony of Cita M. Furlani Director Information Technology Laboratory National Institute of Standards and Technology United States Department of Commerce

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-12-21 11:01:46
947Information technology / Data security / Technology / Forensic science / Information and communication technologies in education / Information security / Public safety / Computer security / Security / Communication

POLICY & PROCEDURE NO: CM/ICT/9 CORPORATE MANAGEMENT – WHOLE INSTITUTE SUB SET – INFORMATION & COMMUNICATIONS TECHNOLOGY SUBJECT:

Add to Reading List

Source URL: www.institute.nhs.uk

Language: English - Date: 2010-04-21 09:41:58
948Computer security / Cloud computing / Computing / Information technology management / Security / Risk analysis / NIST Enterprise Architecture Model / Standards organizations / Gaithersburg /  Maryland / National Institute of Standards and Technology

Microsoft Word - BD_Vol1-Definitions_V1Draft_Pre-release.docx

Add to Reading List

Source URL: jtc1bigdatasg.nist.gov

Language: English - Date: 2014-05-01 23:15:47
949Cyberwarfare / Standards for Security Categorization of Federal Information and Information Systems / Information security / Security controls / Asset / Vulnerability / Risk management framework / National Institute of Standards and Technology / Federal Information Security Management Act / Data security / Computer security / Security

Microsoft Word - QSG - Categorize - Detailed Implementation[removed]doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-02-11 00:00:00
950Cryptography standards / Cyberwarfare / Gaithersburg /  Maryland / National Institute of Standards and Technology / Federal Information Security Management Act / Security Content Automation Protocol / NIST Special Publication 800-53 / FIPS 140-2 / International Multilateral Partnership Against Cyber Threats / Computer security / Security / Computing

Testimony of Cita M. Furlani Director Information Technology Laboratory National Institute of Standards and Technology United States Department of Commerce

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-12-21 11:02:37
UPDATE