Computer security policy

Results: 3514



#Item
831Password / Access control / Cryptography / Phishing / Keystroke logging / Recall / Password strength / Password policy / Security / Computer crimes / Computer security

Multiple Password Interference in Text Passwords and Click-Based Graphical Passwords Sonia Chiasson1 , Alain Forget1 , Elizabeth Stobert2 , P.C. van Oorschot1 , Robert Biddle1 1

Add to Reading List

Source URL: hotsoft.carleton.ca

Language: English - Date: 2009-08-26 18:53:37
832Global Monitoring for Environment and Security / Space / Security / Computer security / Space debris / Space policy of the European Union / Spaceflight / European Space Agency

Draft Final PPaper on Space for Security rev

Add to Reading List

Source URL: eurospace.org

Language: English - Date: 2012-01-12 11:31:59
833Computing / Information security / Security controls / Asset / ISO/IEC 27002 / Vulnerability / TRAC / Security management / IT risk / Data security / Computer security / Security

Information Security Policy (MPF1270) RELEVANT LEGISLATION • • • •

Add to Reading List

Source URL: policy.unimelb.edu.au

Language: English
834Cyberwarfare / Password strength / Password / Password policy / Privileged password management / Security / Cryptography / Computer security

A Spoonful of Sugar? The Impact of Guidance and Feedback on Password-Creation Behavior Richard Shay, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Alain Forget, Saranga Komanduri, Michelle L. Mazurek? , William Meli

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-01-26 11:32:23
835Password / Cryptographic software / Crypt / Password cracking / Password policy / Security / Computer security / Cryptography

Problems with passwords Overview Most current password systems for the Internet are flawed. Designs that were almost acceptable 10 and 15 years ago have not been updated. Instead of moving to integrating authentication s

Add to Reading List

Source URL: www.articsoft.com

Language: English - Date: 2013-12-10 13:50:35
836Year of birth missing / Usability / Crime prevention / National security / Technology / Password / Adversary / Human factors / Computer security / Ethics / Security / Lorrie Cranor

01- Course overview and introductions Engineering & Public Policy

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-03-03 17:53:51
837Security / Oceania / Australian Defence Force / Defence Intelligence Organisation / Defence Signals Directorate / Defence Intelligence / Department of Defence / Computer security / Canberra / Australian intelligence agencies / Military of Australia / Government

Defence & security opportunities 1. Investor proposition FIGURE 1: Government spending per capita Canberra, the defence and security policy and

Add to Reading List

Source URL: investcanberra.com

Language: English - Date: 2013-12-11 18:03:59
838Password / Two-factor authentication / Authentication / Crypt / Password manager / Password policy / Security / Cryptography / Computer security

ID and Passwords or PKI for your security ?

Add to Reading List

Source URL: www.articsoft.com

Language: English - Date: 2013-12-10 13:50:31
839Computer network security / Computer security / Electronic commerce / Secure communication / Public safety / Security / Crime prevention / National security

  MCN OUT OF HOURS POLICY Effective Date: 01 May[removed]Access to MCN laboratories/cleanrooms and use of MCN equipment outside of normal working hours

Add to Reading List

Source URL: nanomelbourne.com

Language: English - Date: 2013-11-17 22:30:27
840Rooms / Semiconductor device fabrication / Computer security / Technology / Public safety / Security / Cleanroom / Filters

  LAB USAGE BY INDUSTRY POLICY Effective Date: Revised 13 September[removed]The purpose of this document is to provide guidance to industry clients about the costs and billing process

Add to Reading List

Source URL: nanomelbourne.com

Language: English - Date: 2013-11-17 22:29:24
UPDATE