Computer security policy

Results: 3514



#Item
371Cyberwarfare / Computer network security / Crime prevention / National security / Information security / Asset / Vulnerability / Threat / Privacy / Security / Computer security / Data security

Fiscal Year 2015 Information Security for Executives  Introduction  Information Security Overview  Information Security Policy and Governance

Add to Reading List

Source URL: www.hhs.gov

Language: English - Date: 2015-05-30 00:33:52
372United States Department of Homeland Security / Computer security / Privacy / Internet privacy / Cyber-security regulation / National Cyber Security Division / Ethics / Security / Public safety

Statement of Administration Policy on H.RCyber Intelligence Sharing and Protection Act

Add to Reading List

Source URL: www.lawfareblog.com

Language: English - Date: 2012-04-25 15:55:42
373Law / Computer security / Federal Trade Commission / Data security / Security breach notification laws / FTC Fair Information Practice / Identity theft / Privacy policy / Internet privacy / Security / Privacy / Ethics

Statement of Justin Brookman Director, Consumer Privacy Center for Democracy & Technology Before the House Committee of Energy and Commerce, Subcommittee on Commerce, Manufacturing, and Trade Hearing on

Add to Reading List

Source URL: www.cdt.org

Language: English - Date: 2011-05-04 10:06:39
374HTTP / Scripting languages / Cross-site scripting / Cross-site request forgery / JavaScript / HTTP cookie / Same origin policy / World Wide Web / Web server / Software / Computing / Computer network security

SOMA: Mutual Approval for Included Content in Web Pages Terri Oda Glenn Wurster P. C. van Oorschot Anil Somayaji Carleton Computer Security Lab School of Computer Science Carleton University, Canada

Add to Reading List

Source URL: terri.zone12.com

Language: English - Date: 2008-11-02 21:28:43
375Public safety / Prevention / Information security / Risk management / Security controls / Data security / Security / Computer security

Information and ICT Services Protection Policy 1.1 The CSIR recognises that information and information systems and supporting infrastructure are critical to its success and effectiveness as an organisation. It

Add to Reading List

Source URL: www.csir.co.za

Language: English - Date: 2007-12-06 09:23:00
376Security / Data security / Risk analysis / Vulnerability / Threat / Asset / Countermeasure / Firewall / Attack / Computer network security / Cyberwarfare / Computer security

An Approach to Security Policy Configuration Using Semantic Threat Graphs Simon N. Foley and William M. Fitzgerald Cork Constraint Computation Centre, Computer Science Department, University College Cork, Ireland s.foley

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2009-07-27 08:02:51
377Espionage / Remote sensing / Cartography / Geospatial intelligence / Central Intelligence Agency / Space policy / National Geospatial-Intelligence Agency / Satellite / Classified information / Computer vision / Intelligence gathering disciplines / National security

U.S. National Security and Economic Interests in Remote Sensing: The Evolution of Civil and Commercial Policy

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 20:30:44
378Hacking / Software testing / Vulnerability / Social vulnerability / United States Computer Emergency Readiness Team / Full disclosure / Responsible disclosure / Computer security / Cyberwarfare / Risk

VERSION DATE: APRIL 14, 2014        VERSION #: 001.0 KORELOGIC – PUBLIC: VULNERABILITY DISCLOSURE POLICY This document addresses KoreLogic’s policy, controls, and organizational responsibili

Add to Reading List

Source URL: www.korelogic.com

Language: English - Date: 2015-05-18 15:05:43
379National security / Ethics / Cryptography / Trusted Computing Group / Trusted Computing / Privacy / Intel / European Network and Information Security Agency / Information security / Security / Computer security / Crime prevention

Claire Vishik Trust & Security Technology & Policy Manager Intel Corporation Dr. Claire Vishik works at Intel Corporation focuses on hardware security, trusted computing, privacy enhancing technologies, some aspects of e

Add to Reading List

Source URL: www.trustindigitallife.eu

Language: English - Date: 2015-03-19 08:36:15
380Computing / Information security / ISO/IEC 27002 / Vulnerability / Information technology audit / NHS Scotland / Information technology controls / Asset / National Health Service / Security / Computer security / Data security

NHS SCOTLAND INFORMATION SECURITY POLICY NHS SCOTLAND INFORMATION SECURITY POLICY STATEMENT The objective of this Information Security Policy is to safeguard the confidentiality, integrity and 1 availability of all forms

Add to Reading List

Source URL: www.hfs.scot.nhs.uk

Language: English
UPDATE