Computer security policy

Results: 3514



#Item
421Password strength / Password / Randomness / John the Ripper / Entropy / Password policy / OTPW / Cryptography / Security / Computer security

Of Passwords and People: Measuring the Effect of Password-Composition Policies Saranga Komanduri1 , Richard Shay1 , Patrick Gage Kelley1 , Michelle L. Mazurek1 , Lujo Bauer1 , Nicolas Christin1 , Lorrie Faith Cranor1 , a

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2011-05-15 21:51:24
422Crime prevention / National security / Computing / Computer security / Identity management / Information security / Internet privacy / Privacy policy / Information privacy / Privacy / Security / Ethics

Information Security Tools Your participants trust you with their data. You can trust SpotMe to protect that data. SpotMe follows industry best practices and takes a comprehensive approach to information security through

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2015-04-24 05:02:09
423Privacy / Computing / Data security / Computer law / Internet privacy / Privacy policy / Information privacy / Backup / Data protection (privacy) laws in Russia / Data privacy / Privacy law / Law

PRIVACY POLICY AND THE TERMS OF USE OF THE WEBSITE OF MPAY AND THE PROTECTION OF PERSONAL DATA INTRODUCTION Dear Visitor, We thank you for visiting our website. Your privacy is really important to us. This document const

Add to Reading List

Source URL: www.mpay.al

Language: English - Date: 2014-11-06 08:23:05
424Persuasion / Public safety / Social psychology / Computer network security / Persuasive technology / Theory of planned behavior / Computer security / Information security / Motivation / Security / Crime prevention / National security

Poster: Designing a Persuasive Application to Improve Organizational Information Security Policy Awareness, Attitudes and Behavior Marc Busch1, Peter Wolkerstorfer1, Christina Hochleitner1, Georg Regal1, Manfred Tschelig

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2014-07-06 08:47:40
425Hacking / Software testing / Vulnerability / Social vulnerability / United States Computer Emergency Readiness Team / Full disclosure / Responsible disclosure / Computer security / Cyberwarfare / Risk

VERSION DATE: APRIL 14, 2014        VERSION #: 001.0 KORELOGIC – PUBLIC: VULNERABILITY DISCLOSURE POLICY This document addresses KoreLogic’s policy, controls, and organizational responsibili

Add to Reading List

Source URL: www.korelogic.com

Language: English
426Computing / Law / Computer law / Policy / Privacy policy / Information privacy / Internet privacy / Personally identifiable information / Data Protection Act / Ethics / Privacy / Data privacy

SAMI Data Protection Policy The Security Association for the Maritime Industry Limited (“SAMI” or “we” or “our’’ or “us”) is committed to protecting and respecting the privacy of the visitors to this we

Add to Reading List

Source URL: www.seasecurity.org

Language: English - Date: 2012-09-13 05:38:58
427Public safety / Human security / Humanitarian aid / RedR / ECHO / Aid / Social issues / International development / Computer security / Security / Geneva Centre for Security Policy / Peace

ABOUT THE SECURITY MANAGEMENT INITIATIVE The Security Management Initiative (SMI) was created to address the challenges in security and risk management faced by non-profit and international organisations in hazardous en

Add to Reading List

Source URL: www.bond.org.uk

Language: English - Date: 2012-07-23 11:15:29
428Electric power transmission systems / Computer security / Information technology management / Electric power distribution / Document management system / Electrical grid / Acceptable use policy / GLite / Computing / Concurrent computing / Grid computing

CERN-EDMSVersion 5.7a Joint Security Policy Group

Add to Reading List

Source URL: www.biggrid.nl

Language: English - Date: 2013-10-24 08:44:27
429Etiquette / Internet / Internet culture / National Virtual Observatory / European Southern Observatory / Science / Computing / Knowledge / Acceptable use policy / Computer security / Email

Virtual Organisation Member...

Add to Reading List

Source URL: www.biggrid.nl

Language: English - Date: 2013-10-24 08:44:27
430Password / One-time password / Authentication / Cryptography / Password strength / Password policy / Security / Computer security / Access control

Weak and strong passwords When to use them and how to protect them Prof Audun Jøsang

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-07 02:48:00
UPDATE