Computer security policy

Results: 3514



#Item
661Crime prevention / National security / Public safety / Quality assurance / Software assurance / Application security / Trustworthy computing / Software engineering / Information Technology Infrastructure Library / Computer security / Information technology management / Security

FOR IMMEDIATE RELEASE Jenny Cleveland, (BITS Releases Guidelines to Financial Industry for Developing Secure Software Washington, D.C. — February 1, 2012 — Today BITS, the technology policy division of

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2012-10-01 16:42:14
662Email / Social information processing / Web 2.0 / Computer security / Acceptable use policy / Internet culture / WatchGuard / Facebook / Internet / Computing / World Wide Web / Technology

Policy - The Foundation to Business Security

Add to Reading List

Source URL: www.getadvanced.net

Language: English - Date: 2013-04-16 08:43:37
663Data Protection Directive / Computer security / Ethics / Personally identifiable information / Information privacy / Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data / Information privacy law / Danish Data Protection Agency / Data privacy / Privacy law / Law

Data protection reform in Scandinavia [Published in Privacy Law & Policy Reporter, 1998, volume 5, pp 9–12] Lee A Bygrave Throughout Europe, countries are in the process of overhauling their current data protection reg

Add to Reading List

Source URL: folk.uio.no

Language: English - Date: 2001-06-25 06:31:26
664Cyberwarfare / Risk / Vulnerability / Threat / Countermeasure / Attack / Factor analysis of information risk / Social vulnerability / Asset / Computer security / Security / Computer network security

Reconciling Malicious and Accidental Risk in Cyber Security Wolter Pieters1,2∗, Zofia Lukszo3 , Dina Hadˇziosmanovi´c1 , and Jan van den Berg1 1 TU Delft; Technology, Policy and Management; ICT; Delft, The Netherland

Add to Reading List

Source URL: isyou.info

Language: English - Date: 2014-05-12 01:06:21
665Internet censorship / Acceptable use policy / Computer security / Email / Etiquette / Internet culture / Cyber-bullying / Internet / World Wide Web / Digital media / Technology / Computing

Microsoft WordBCSC AUP.docx

Add to Reading List

Source URL: www.brownsburg.k12.in.us

Language: English - Date: 2012-06-15 07:18:07
666Risk management / Identity management / Actuarial science / XACML / Role-based access control / Risk / PERMIS / Mandatory access control / Discretionary access control / Security / Computer security / Access control

Towards Attribute-based Access Control Policy Engineering Using Risk∗ Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, and Artsiom Yautsiukhin Istituto di Informatica e Telematica, Consiglio Nazionale delle R

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2014-09-19 11:36:58
667Login / Computer security / Identity management systems / Password policy / Self-service password reset / Security / Access control / Password

Security Questions added to DOI Learn Beginning on April 1, 2015, when you log in to DOI Learn you will be required to perform a one-time task to set up Security Questions. You will be required to provide answers to two

Add to Reading List

Source URL: www.doi.gov

Language: English - Date: 2015-04-07 11:33:40
668XACML / Matrix / Role-based access control / PERMIS / Security / Computer security / Access control

Towards Policy Engineering for Attribute-based Access Control⋆ Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, and Artsiom Yautsiukhin Istituto di Informatica e Telematica Consiglio Nazionale delle Ricerche

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2014-09-19 11:36:58
669Computer security / Email / Etiquette / Internet / Internet culture / Cyber-bullying / Bebo / Social networking service / School governor / Human development / Computing / Acceptable use policy

FURTHER QUESTIONS FOR DISCUSSION These might be used to initiate further staff discussion: These are all areas that are new to us in schools and as a consequence, a matter of judgement. In general, err on the side of cau

Add to Reading List

Source URL: ngfl.northumberland.gov.uk

Language: English - Date: 2013-05-08 05:21:23
670Cyberwarfare / Password / Password policy / Cognitive password / Security / Computer security / Cryptography

A Spoonful of Sugar? The Impact of Guidance and Feedback on Password-Creation Behavior Richard Shay, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Alain Forget, Saranga Komanduri, Michelle L. Mazurek* , William Mel

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2015-01-08 09:25:07
UPDATE