Computer security policy

Results: 3514



#Item
461Key management / Passphrase / Password / Two-factor authentication / Key / Randomness / Computer network security / Diceware / Password policy / Cryptography / Security / Computer security

OUCH! | April, 2015 IN THIS ISSUE... • Passphrases • Using Passphrases Securely • Resources

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2015-03-31 16:53:29
462Government / Information society / ACCURATE / Voting machine / Avi Rubin / Vote counting system / Voting system / Computer security / Politics / Election technology / Electronic voting

ACCURATE Slide Bundle Avi Rubin, Project Overview Doug Jones, Systems-Level Perspectives Dave Wagner, Role of Cryptography David Dill, Design for Verification Deirdre Mulligan, Relating Technology to Policy

Add to Reading List

Source URL: accurate-voting.org

Language: English - Date: 2013-06-05 15:32:08
463Internet / Acceptable use policy / Computer security / Etiquette / Internet culture / Internet privacy / Email spam / Electronics / Email / Computing / Spamming

ACCEPTABLE USE POLICY This acceptable use policy defines COLO@ ’s policy designed to protect COLO@ and persons and entities using COLO@ products and services, including Internet service (collectively, "customers") from

Add to Reading List

Source URL: www.coloat.com

Language: English - Date: 2012-08-13 12:48:50
464Computer security / Transaction authentication number / Password policy / Password strength / Password / Security / Access control

Understanding and Using Your Client Web Portal Overview - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1 How do I login to the CWP? - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Add to Reading List

Source URL: cwp.morningstar.com

Language: English - Date: 2015-03-21 04:05:39
465Cyberwarfare / Data security / Crime prevention / National security / Information security / Vulnerability / Threat / Security controls / Network security / Security / Computer security / Computer network security

Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat Oliver Buckley, Jason R. C. Nurse, Philip A. Legg, Michael Goldsmith, Sadie Creese Cyber Security Centre, Department of Compute

Add to Reading List

Source URL: www.cs.ox.ac.uk

Language: English - Date: 2015-03-18 10:54:09
466Symantec / Antivirus software / Threat / Malware / Information assurance / Lords of Dharmaraja / Huawei Symantec / Computer security / Computing / Cyberwarfare

Security policy An industry perspective

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-12-14 13:40:49
467National security / Crime prevention / Computer security / Computer network security / Information security / Emergency management / Emergency / Backup / Security / Data security / Public safety

ICHIGAN Security – A Security Architecture that Enables Situation-Based Policy Switching Hiroshi Maruyama∗ , Kiyoshi Watanabe† , Sachiko Yoshihama‡ , Naohiko Uramoto‡ , Yoichiro Takehora§ , Kazuhiro Minami∗

Add to Reading List

Source URL: systemsresilience.org

Language: English - Date: 2013-08-19 03:20:56
468Federated identity / Password / Single sign-on / Form / Login / Password manager / Password policy / Access control / Security / Computer security

TCMM Local Security Administrator Guide

Add to Reading List

Source URL: www.frbservices.org

Language: English - Date: 2011-11-15 13:14:04
469Firewall / System software / DMZ / Check Point VPN-1 / Internet security / Nokia IPSO / Security appliance / Application firewall / Comparison of firewalls / Computer network security / Cyberwarfare / Computing

COVER FEATURE A Quantitative Study of Firewall Configuration Errors The protection that firewalls provide is only as good as the policy they are

Add to Reading List

Source URL: www.eng.tau.ac.il

Language: English - Date: 2004-06-21 07:38:15
470Cryptography / Password / Identity management / Passphrase / Single sign-on / Password policy / Password strength / Security / Computer security / Access control

Usable Privacy and Security Text Passwords Lecture by Sasha Romanosky Scribe notes by Ponnurangam K March 30, 2006

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-04-01 07:13:20
UPDATE