Computer security policy

Results: 3514



#Item
331Infrastructure / United States Department of Homeland Security / Humanitarian aid / Resilience / Critical infrastructure protection / Emergency management / Psychological resilience / Critical infrastructure / Computer security / National security / Public safety / Security

Critical Infrastructure Resilience Strategy Policy Statement

Add to Reading List

Source URL: www.tisn.gov.au

Language: English - Date: 2015-05-25 22:01:44
332Computer security / Internet / Password / Information security / Internet privacy / Acceptable use policy / Email privacy / Anti-spam techniques / Email / Computing / Computer-mediated communication

Microsoft WordIT Acceptable Use Policy BOC Approved

Add to Reading List

Source URL: fultoncountyga.gov

Language: English - Date: 2011-10-07 16:12:31
333Cryptography / Internet protocols / Computer security / Cryptography standards / Tunneling protocols / Transport Layer Security / Secure Shell / Fortinet / FIPS 140-2 / Computing / Computer network security / Cryptographic protocols

FIPSSecurity Policy FortiOS™ 5.0 STATUS ALARM HA

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-29 10:54:02
334Computer security / Identity management systems / Password policy / Password strength / Password / Security / System software

Password Reset for Providers on EXT.LOCAL April 2015 Purpose Password reset procedures for Contract Providers who use the Missouri Department of Mental Health ext.local domain to access CIMOR. Procedure

Add to Reading List

Source URL: dmh.mo.gov

Language: English - Date: 2015-04-13 09:08:15
335Identity management / Kernel / Operating system / Ring / Capability-based security / Microsoft Access / Authorization / Mandatory access control / Security and safety features new to Windows Vista / Security / Computer security / Access control

Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems ROBERT GRIMM and BRIAN N. BERSHAD University of Washington

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2002-10-18 14:01:21
336Computer security / Password manager / Password policy / Password / Access control / Security

[Online annual report questions] – [November 7, Topic: Online annual report questions

Add to Reading List

Source URL: www.iaca.org

Language: English - Date: 2014-01-29 19:32:09
337Wireless networking / Acceptable use policy / Computer security / Email / Etiquette / Internet culture / Computer network / Network security / Internet / Technology / Electronics / Electronic engineering

Network Security & Connection Policy Effective from 17 February 2015 Version Number: 2.0 Author: Network Manager, IT Services

Add to Reading List

Source URL: www.salford.ac.uk

Language: English - Date: 2015-02-17 06:29:48
338Crime prevention / Data security / Information security / National security / Freedom of Information Act / Freedom of information legislation / Government procurement in the United States / Policy / Public safety / Security / Politics / Computer security

Higher education institutions Freedom of Information Act 2000 Definition document for universities and other higher education institutions. This guidance gives examples of the kinds of information that we

Add to Reading List

Source URL: uso.southwales.ac.uk

Language: English - Date: 2014-08-01 05:06:57
339Crime prevention / National security / Authorization / E4 / Computer security / Data security / Password / Section 8 / Privacy / Security / Ethics / Computer network security

APPENDIX V Albuquerque Housing Authority EIV Security and Procedure Policy

Add to Reading List

Source URL: www.abqha.org

Language: English - Date: 2015-05-07 16:01:56
340Infrastructure / United States Department of Homeland Security / Humanitarian aid / Resilience / Critical infrastructure protection / Emergency management / Psychological resilience / Critical infrastructure / Computer security / National security / Public safety / Security

The Australian Government’s Critical Infrastructure Resilience Strategy: Policy Statement A STRONG FOUNDATION In the wake of the 11 September 2001 terrorist attacks in the United States and the 2002 Bali Bombings, t

Add to Reading List

Source URL: www.tisn.gov.au

Language: English - Date: 2015-05-25 22:01:44
UPDATE