Computer security policy

Results: 3514



#Item
471Cryptography / Cyberwarfare / Password strength / Password policy / Password / Security / Computer security

Graphical PasswordsScribe Notes Definition of Graphical Password: Password inputted with the help of graphical input

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-05-18 11:04:56
472Law / Criminology / Convention on Cybercrime / Computer crime / International Multilateral Partnership Against Cyber Threats / Computer security / CyberCrime / Cyber-security regulation / Computer crimes / Crime / International Cybercrime

POLICY BRIEF 73 | JANUARYThe AU’s cybercrime response A positive start, but substantial challenges ahead Eric Tamarkin

Add to Reading List

Source URL: www.issafrica.org

Language: English - Date: 2015-01-20 04:34:35
473Computer security / Internet in Australia / Domain name system / International Space Station / .au / Information security management system / Security controls / Information security / Information technology controls / Spaceflight / Data security / Security

auDA PUBLISHED POLICY Policy Title: auDA INFORMATION SECURITY STANDARD (ISS) FOR ACCREDITED REGISTRARS Policy No: Publication Date: Status: Current

Add to Reading List

Source URL: auda.org.au

Language: English - Date: 2014-09-01 22:09:50
474Cryptography / Password / Passphrase / Crypt / Password strength / Password manager / Security / Computer security / Access control

ABC Company Password Policy Policy Area IT Policy Library

Add to Reading List

Source URL: www.altiusit.com

Language: English - Date: 2015-01-10 16:30:23
475Spyware / Cyberwarfare / Ethiopia / Human Rights Watch / Antoine Wiertz / Security / Earth / Computer network security / Malware / Rogue software

Federica Mogherini High Representative of the European Union for Foreign Affairs and Security Policy and Vice-President of the European Commission Brussels, 25th March 2015 Madam High Representative,

Add to Reading List

Source URL: www.anagomes.eu

Language: English - Date: 2015-03-26 05:56:22
476Hacking / Software testing / Vulnerability / Social vulnerability / United States Computer Emergency Readiness Team / Full disclosure / Responsible disclosure / Computer security / Cyberwarfare / Risk

VERSION DATE: APRIL 14, 2014        VERSION #: 001.0 KORELOGIC – PUBLIC: VULNERABILITY DISCLOSURE POLICY This document addresses KoreLogic’s policy, controls, and organizational responsibili

Add to Reading List

Source URL: korelogic.com

Language: English - Date: 2015-04-27 16:19:21
477Public safety / Computer security / Computing / Computer crimes / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / NIST Special Publication 800-53 / Security Assertion Markup Language / Information security / Security / Crime prevention / National security

This is a Non-Standards Track Work Product. The patent provisions of the OASIS IPR Policy do not apply. This is a Non-Standards Track Work Product. The patent provisions of the OASIS IPR Policy do not apply.

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2014-05-28 12:00:00
478Identity management / Password / Cryptography / Internet privacy / Privacy / Password strength / Password policy / Security / Computer security / Ethics

Volunteer Privacy Educators Program Lesson Plan Outlines © 2014 Fordham Center on Law and Information Policy. These materials may be reproduced in whole or in part for educational and non-commercial purposes provided th

Add to Reading List

Source URL: law.fordham.edu

Language: English - Date: 2015-02-10 12:32:46
479Anti-spam / Spam filtering / Computer network security / Deep packet inspection / Computer networking / Barracuda Networks / Microsoft Forefront Threat Management Gateway / Computer appliance / Cloud computing / Computing / System software / Computer security

Protection for Web users inside and beyond the corporate perimeter with unified policy management and reporting Web security is today’s must-address issue. It is difficult to safeguard all Web users from phishing, mali

Add to Reading List

Source URL: www.cpatechnology.net

Language: English - Date: 2015-04-03 10:08:37
480Computer security / Identity management / Computer crimes / Internet privacy / Privacy / Phishing / Password strength / Password policy / Ethics / Security / Password

Volunteer Privacy Educators Program Teacher Training Manual © 2014 Fordham Center on Law and Information Policy. These materials may be reproduced in whole or in part for educational and non-commercial purposes provided

Add to Reading List

Source URL: law.fordham.edu

Language: English - Date: 2015-02-10 12:32:43
UPDATE