Computer security policy

Results: 3514



#Item
631Security / Data management / Computer security / National security / Information security / Data management plan / Classified information / Data sharing / Information sensitivity / Information / Data security / Data

ISSG-14-10_Information_Classification_Policy_1_0

Add to Reading List

Source URL: as.exeter.ac.uk

Language: English - Date: 2015-05-22 07:19:21
632Australian Sports Commission / Politics / Security / Computer security / Data security / Prevention / Humanities / Law / Policy

National Organisational Development Network By laws and Policies

Add to Reading List

Source URL: ausport.gov.au

Language: English - Date: 2014-09-15 21:38:16
633Identification / Social Security / Government / Social Security number / Taxpayer Identification Number / SSN / Computer security / Identity documents in the United States / Taxation in the United States / Universal identifiers / Security

Microsoft WordRev0 Policy on Social Security Numbers.doc

Add to Reading List

Source URL: www.policies.vt.edu

Language: English - Date: 2007-05-29 09:57:49
634National security / Computing / Public safety / Computer network security / Information security / Cloud computing / Computer network / Authorization / Internet privacy / Security / Computer security / Crime prevention

SUBJECT: Effective Date: Policy Number:

Add to Reading List

Source URL: policies.ucf.edu

Language: English - Date: 2014-05-13 15:52:31
635Public safety / Data security / Computing / Computer security / Information security / Internet privacy / Authorization / ISO/IEC 27002 / Internet / Security / Crime prevention / National security

Security Policy Extract This extract from the Western Power Security Policy is published on the Western Power Internet site to promote the policy content to external companies who may use Western Power’s IT facilities.

Add to Reading List

Source URL: westernpower.com.au

Language: English - Date: 2014-05-23 01:05:46
636Confidential / Safeguard / Information security / Public safety / National security / Data security / Security / Computer security

Eze Written Information Security Policy Service

Add to Reading List

Source URL: www.eci.com

Language: English - Date: 2014-05-16 12:26:02
637Computer security / Password policy / Password strength / Cryptographic software / Security / Cryptography / Password

Perfect passwords Q & A 1 What do you think are the most common passwords? A Change it. 2 What is your password? B use letters and numbers

Add to Reading List

Source URL: www.childnet.com

Language: English - Date: 2013-03-07 10:01:52
638Hacking / Military technology / National security / Cyberwarfare / Computer security / Phishing / Malware / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / Cybercrime / Computer crimes / Electronic warfare

POLICY |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| THE NEW PARADIGM IN CYBER SECURITY KEVIN R. BROCK AND DAVID X. MARTIN

Add to Reading List

Source URL: www.centerforfinancialstability.org

Language: English - Date: 2014-03-06 14:13:06
639Password / Usability / User / Password policy / Password strength / Security / Access control / Computer security

Usability and Security Evaluation of GeoPass: a Geographic Location-Password Scheme Julie Thorpe Brent MacRae

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-07-03 09:36:38
640Cyberwarfare / Password / Computer crimes / Passphrase / John the Ripper / Phishing / Crypt / Password policy / Cognitive password / Computer security / Security / Cryptography

Text Entry Method Affects Password Security Yulong Yang† , Janne Lindqvist† , Antti Oulasvirta‡ † Rutgers University, ‡ Aalto University Abstract Background. Text-based passwords continue to be the

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-04-21 23:17:08
UPDATE