Computer Security Institute

Results: 1676



#Item
971Computing / National Institute of Standards and Technology / Risk analysis / Security controls / Standards for Security Categorization of Federal Information and Information Systems / Health Insurance Portability and Accountability Act / NIST Special Publication 800-53 / IT risk management / Computer security / Data security / Security

DATA MANAGEMENT PLAN GUIDELINES The data management plan guidelines contain four steps. You are being asked to describe the actions that you will take to address these protections specific to this research request. The

Add to Reading List

Source URL: www.resdac.org

Language: English - Date: 2013-09-06 11:43:52
972Computing / Privacy / National Institute of Standards and Technology / Information security / Personally identifiable information / Security controls / Internet privacy / Privacy policy / Telecommunications data retention / Computer security / Security / Data security

DATA PRIVACY SAFEGUARD PROGRAM INFORMATION SECURITY AND PRIVACY BEST PRACTICES Information Security and Privacy Best Practices for organizations with access to personally identifiable information (PII) Information Securi

Add to Reading List

Source URL: www.resdac.org

Language: English - Date: 2013-01-28 11:18:42
973Computing / National Institute of Standards and Technology / Computer network security / Security controls / Standards for Security Categorization of Federal Information and Information Systems / Data management plan / Health Insurance Portability and Accountability Act / NIST Special Publication 800-53 / IT risk management / Computer security / Data security / Security

DATA MANAGEMENT PLAN GUIDELINES The data management plan guidelines contain four steps. You are being asked to describe the actions that you will take to address these protections specific to this research request. The f

Add to Reading List

Source URL: www.resdac.org

Language: English - Date: 2014-01-16 12:42:09
974Computing / Telecommunications Industry Association / Data security / National Institute of Standards and Technology / Federal Information Security Management Act / American National Standards Institute / Machine-to-Machine / Information security / FIPS 140-3 / Computer security / Standards organizations / Security

December 14, 2012 Via Electronic Filing to [removed] National Institute of Standards and Technology Attn: Computer Security Division, Information Technology Laboratory 100 Bureau Drive (Mail Stop[removed]Gai

Add to Reading List

Source URL: www.tiaonline.org

Language: English - Date: 2013-01-08 15:08:21
975Identity management / Role-based access control / Access Control Matrix / Separation of mechanism and policy / S10 / Security policy / Security / Computer security / Access control

The Computational Complexity of Enforceability Validation for Generic Access Control Rules Vincent C. Hu, D. Richard Kuhn, and David F. Ferraiolo National Institute of Standards and Technology, Gaithersburg, Maryland 208

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-26 01:00:00
976Law / Electronic commerce / Crime / Cyberwarfare / Cyberspace / Legal aspects of computing / The Information Technology Act / Internet-related prefixes / Cyberterrorism / Computing / Computer crimes / Computer law

1 Lecture in Training Programme on Cyber Law and Cyber Security for Judicial Officers on 10th April,2010 organized by Institute of Management in Government, Thiruvananthapuram, Kerala at IMG

Add to Reading List

Source URL: catindia.gov.in

Language: English - Date: 2012-07-07 08:24:26
977Cross-platform software / Scripting languages / Relational database management systems / Database management systems / Software testing / Vulnerability / Cross-site scripting / SQL injection / Code injection / Computing / Software engineering / Computer programming

Improving Application Security with Data Flow Assertions Alexander Yip, Xi Wang, Nickolai Zeldovich, and M. Frans Kaashoek Massachusetts Institute of Technology – Computer Science and Artificial Intelligence Laboratory

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2014-09-23 03:33:32
978Computer network security / Information technology management / Trustworthy computing / Vulnerability / Attack / Cyber security and countermeasure / Institute for Information Infrastructure Protection / Computer security / Cyberwarfare / Security

Four Grand Challenges in TRUSTWORTHY COMPUTING Second in a Series of Conferences on Grand Research Challenges in Computer Science and Engineering November 16–19, 2003

Add to Reading List

Source URL: cra.org

Language: English - Date: 2010-01-24 23:36:55
979Computer security / Cloud infrastructure / Outsourcing / Federal Information Security Management Act / Service-level agreement / Cloud backup / IBM cloud computing / Cloud computing / Centralized computing / Computing

SafeGov.org’s Cloud Computing Glossary Cloud Computing: According to the National Institute for Standards and Technology, “cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to

Add to Reading List

Source URL: www.safegov.org

Language: English - Date: 2012-03-28 17:56:23
980Cyberwarfare / Risk analysis / Cryptography standards / Information Risk Management / Security controls / National Institute of Standards and Technology / FIPS 140-2 / Standards for Security Categorization of Federal Information and Information Systems / Information security management system / Data security / Computer security / Security

PHIN Certification Security and Availability Assessment Tool Instructions: Use this tool to assist with the assessment of the security controls and availability of the information system(s) / application(s) with the PH

Add to Reading List

Source URL: www.cdc.gov

Language: English - Date: 2011-05-20 09:08:47
UPDATE