Computer security policy

Results: 3514



#Item
401Public safety / United States Department of Homeland Security / Computer crimes / Cyber-security regulation / Computer security / National Cyber Security Division / U.S. Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Security / Government

Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 20:16:48
402Password / Crack / Password policy / Password strength / Identity management systems / Security / Computer security / Cryptography

Nusoft Newsletter - MLS / ML Series No.36 Tech Overview : Creating a Safe Password to Protect Your Mailbox

Add to Reading List

Source URL: www.nusoft.com.tw

Language: English - Date: 2012-10-23 00:46:28
403United States Department of Homeland Security / Cyberwarfare / Public safety / Security engineering / International Multilateral Partnership Against Cyber Threats / Critical infrastructure protection / Computer security / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / National security / Security / Computer crimes

Submission to the National Commission of Audit from the Australian Strategic Policy Institute (ASPI) regarding National Security Overview This submission addresses the National Commission of Audit’s terms of reference

Add to Reading List

Source URL: aspi.org.au

Language: English - Date: 2014-02-13 22:52:14
404Computer crimes / Electronic warfare / Hacking / Military technology / Mass surveillance / International Multilateral Partnership Against Cyber Threats / Cyberwarfare / Personally identifiable information / Internet privacy / Security / Ethics / National security

The Protecting Cyber Networks Act   Undermines Privacy, Enables Cyber­Surveillance, and Threatens Internet Security    By Robyn Greene, Policy Counsel    This month, the House of Representative

Add to Reading List

Source URL: static.newamerica.org

Language: English - Date: 2015-04-20 18:04:23
405Windows / Computer security / Information technology audit / SekChek Local / Group Policy / Windows Server / Password / Microsoft Windows / System software / Active Directory

MS-Windows: Active Directory Password Settings Objects (PSOs) First published: 08-Jul-2010; last amended 20-Oct-2014 Purpose of this Document: The introduction of fine-grained password policies is new to Windows Server 2

Add to Reading List

Source URL: www.sekchek.com

Language: English - Date: 2014-10-21 12:59:46
406Security / Technology / Server / Server hardware / Information security / Internet / Operating system / Acceptable use policy / Backup / Data security / Computer security / Computing

IT Acceptable Use Policy Introduction This document establishes the rules for the acceptable use of the Lincoln College IT facilities and network infrastructure. These rules are necessary to preserve the integrity, avail

Add to Reading List

Source URL: www.lincoln.ox.ac.uk

Language: English - Date: 2015-04-20 08:44:34
407National security / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Computer security / Cyberwarfare / Internet privacy / Personally identifiable information / Security / Computer crimes / Crime prevention

Cybersecurity Information Sharing Act of 2015 Is Cyber­Surveillance, Not Cybersecurity    By Robyn Greene, Policy Counsel    This month, Congress is expected begin consideration of the Cybersec

Add to Reading List

Source URL: static.newamerica.org

Language: English - Date: 2015-04-09 17:37:57
408National security / Information / Information sensitivity / Classified information in the United States / Information security / Security / Data security / Computer security

YOURCAUSE,  LLC  -­‐  INFORMATION  SENSITIVITY  POLICY         YourCause,  LLC  Information  Sensitivity  Policy  

Add to Reading List

Source URL: www.csrconnect.me

Language: English - Date: 2014-10-17 10:20:27
409World Wide Web / Computer security / WS-Addressing / WS-Transfer / WS-Policy / WS-Security / Web Services Description Language / WS-Management / WS-Trust / Computing / Web services / Web standards

Microsoft Word - WS-Management.June.2005.doc

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2005-09-15 21:30:31
410Cyberwarfare / Application firewall / Stateful firewall / Distributed firewall / Firewall / Network security / Network address translation / Computer network / Network switch / Computer network security / Computing / Computer security

DEPEND 2014 : The Seventh International Conference on Dependability Network-Security-Policy Analysis Christian Pitscheider Dip. di Automatica e Informatica

Add to Reading List

Source URL: security.polito.it

Language: English - Date: 2015-02-16 02:27:52
UPDATE