Consensus audit guidelines

Results: 59



#Item
51National security / Computer network security / Computer security / Crime prevention / Electronic commerce / Defence Signals Directorate / Consensus audit guidelines / Risk management / Australian Intelligence Community / Security / Australian intelligence agencies / Public safety

Date: 05 April 2013 To, Diane Honeycutt, National Institute of Standards and Technology,

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-08 14:49:33
52Information technology management / Crime prevention / National security / Information security / COBIT / Information Technology Infrastructure Library / Security controls / Certified Information Systems Security Professional / Consensus audit guidelines / Security / Computer security / Data security

From: , Ken Date: Thursday, April 4, 2013 4:17 PM To: cyberframework Subject: Developing a Framework to Improve Critical Infrastructure Cybersecurity Ms. Honeycutt,

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-08 14:49:33
53Data security / Cyberwarfare / National security / Crime prevention / Consensus audit guidelines / Information security / Threat / Certified Information Systems Security Professional / Internet security / Computer security / Security / Computer network security

RFI Comments - Tony Martin

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-08 14:49:33
54Cyberwarfare / National security / Data security / Crime prevention / Consensus audit guidelines / Information security / Security controls / Vulnerability / Penetration test / Computer security / Security / Computer network security

PDF Document

Add to Reading List

Source URL: www.transcom.mil

Language: English - Date: 2013-08-06 10:34:00
55Crime prevention / Data security / Computer network security / Information security / Consensus audit guidelines / Security controls / International Multilateral Partnership Against Cyber Threats / Critical infrastructure protection / National Cyber Security Division / Security / Computer security / National security

Best Practices in Computer Network Defense: Incident Detection and Response M.E. Hathaway (Ed.) IOS Press, 2014 © 2014 The authors and IOS Press. All rights reserved. doi:[removed][removed]

Add to Reading List

Source URL: belfercenter.ksg.harvard.edu

Language: English - Date: 2014-02-03 19:13:57
56Computer security / Malware / Password / Consensus audit guidelines / Internet security / Spyware / Opera / Benchmark / Password manager / Software / Computing / Computer network security

Monthly Cybersecurity Tips NEWSLETTER December[removed]Volume 8, Issue 12

Add to Reading List

Source URL: www.nh.gov

Language: English - Date: 2013-12-23 13:55:05
57Computing / Penetration test / Hacking / Data privacy / White hat / Consensus audit guidelines / Information security / Computer security / Security / Global Information Assurance Certification

Master of Science In Information Security Engineering Course Descriptions

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2014-02-13 13:04:37
58Global Information Assurance Certification / Crime prevention / National security / Computer network security / Penetration test / White hat / Consensus audit guidelines / Information security / Security engineering / Computer security / Security / Computing

Master of Science In Information Security Management Course Descriptions

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2014-03-17 15:43:14
59Data security / National security / Consensus audit guidelines / IT risk / Information security / Honeypot / Physical security / Penetration test / Network security / Security / Computer network security / Computer security

Let’s stop making it easy for the attackers! C U R R I C U L U M

Add to Reading List

Source URL: cyber-defense.sans.org

Language: English - Date: 2013-06-03 11:10:54
UPDATE